Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

A Global Effort to Disrupt IoT Botnets: The AISURU and Kimwolf Cases



A recent global operation has targeted AISURU, Kimwolf, JackSkid, and other notorious IoT botnet operators. The U.S. Department of Justice played a significant role in this effort, disrupting command-and-control infrastructure used by these botnets. This operation marks an important milestone in the fight against IoT botnets and highlights the growing threat posed by these networks. To combat this issue, law enforcement agencies around the world must continue to work together to protect victims worldwide.

  • A global operation has targeted AISURU, Kimwolf, JackSkid, and other notorious IoT botnet operators in a collaborative effort by law enforcement agencies.
  • The operation disrupted the command-and-control infrastructure used by these botnets, highlighting the strength of collaboration between law enforcement agencies.
  • AISURU, one of the most notorious IoT botnets, was linked to a record-breaking DDoS attack that peaked at 31.4 Tbps and lasted just 35 seconds in November 2025.
  • Kimwolf, another notable IoT botnet, has infected over 1.8 million devices and issued more than 1.7 billion DDoS attack commands.
  • The global operation demonstrates the effectiveness of collaboration between law enforcement agencies in combating cybercrime and protecting victims worldwide.



  • The world of cybersecurity has witnessed numerous threats over the years, but one of the most concerning trends is the rise of Internet of Things (IoT) botnets. These networks have been wreaking havoc on individuals and organizations alike, causing significant disruptions to critical infrastructure and services. In a recent development that highlights the collaborative efforts of law enforcement agencies around the world, a global operation has targeted AISURU, Kimwolf, JackSkid, and other notorious IoT botnet operators.

    The operation, which involved authorities from Canada and Germany, as well as major tech companies, aimed to disrupt the command-and-control infrastructure used by these botnets. The U.S. Department of Justice (DoJ) played a significant role in this effort, with Special Agent in Charge Rebecca Day stating that the operation reflected the strength of collaboration between law enforcement agencies and their commitment to combating cybercrime.

    AISURU, one of the most notorious IoT botnets, has been linked to several high-profile attacks. In November 2025, it was involved in a record-breaking DDoS attack that peaked at 31.4 Tbps and lasted just 35 seconds. This attack was part of a surge in hyper-volumetric HTTP DDoS attacks observed in late 2025, which were automatically detected and mitigated by Cloudflare. The AISURU botnet also incorporates additional dedicated DDoS attack capabilities and multi-use functions, enabling operators to carry out other illicit activities such as credential stuffing, artificial intelligence-driven web scraping, spamming, and phishing.

    Another notable IoT botnet is Kimwolf, which has infected over 1.8 million devices and issued more than 1.7 billion DDoS attack commands. This Android-based botnet primarily targets TV boxes, compiled using the NDK and equipped with DDoS, proxy forwarding, reverse shell, and file management functions. Its infrastructure spans multiple command-and-control domains, global time zones, and versions, making it challenging to estimate the total number of infections.

    The Kimwolf botnet also follows a naming pattern of 'unniggabox + v[number]'; versions v4 and v5 have been tracked. By taking over one C2 domain, researchers observed around 2.7 million IPs interacting over three days, indicating a likely infection scale exceeding 1.8 million devices. Its primary function is traffic proxying, though it can execute massive DDoS attacks, as seen in a three-day period issuing 1.7 billion commands between November 19 and 22.

    The global operation to disrupt these botnets was the result of a long-standing effort by law enforcement agencies to combat cybercrime. The U.S. DoJ worked closely with DCIS and international law enforcement partners to identify and disrupt criminal infrastructure used to carry out large-scale DDoS attacks. This operation is a significant step forward in the fight against IoT botnets, as it demonstrates the effectiveness of collaboration between law enforcement agencies and their commitment to protecting victims worldwide.

    In conclusion, the AISURU and Kimwolf cases highlight the growing threat posed by IoT botnets and the need for concerted efforts from law enforcement agencies around the world to combat this issue. The global operation described in this article marks an important milestone in the fight against these notorious networks, as it demonstrates the strength of collaboration between law enforcement agencies and their commitment to protecting victims worldwide.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/A-Global-Effort-to-Disrupt-IoT-Botnets-The-AISURU-and-Kimwolf-Cases-ehn.shtml

  • https://securityaffairs.com/189710/cyber-crime/global-law-enforcement-operation-targets-aisuru-kimwolf-jackskid-botnet-operators.html

  • https://www.justice.gov/usao-ak/pr/authorities-disrupt-worlds-largest-iot-ddos-botnets-responsible-record-breaking-attacks

  • https://www.securityweek.com/aisuru-and-kimwolf-ddos-botnets-disrupted-in-international-operation/

  • https://www.protoslabs.io/resources/aisuru-botnet-deep-dive

  • https://cybersecuritynews.com/aisuru-botnet-with-300000-hijacked-routers/

  • https://krebsonsecurity.com/2026/01/the-kimwolf-botnet-is-stalking-your-local-network/

  • https://thehackernews.com/2025/12/kimwolf-botnet-hijacks-18-million.html

  • https://blog.xlab.qianxin.com/super-large-scale-botnet-aisuru-en/


  • Published: Fri Mar 20 08:09:48 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us