Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Authorities Dismantle IoT Botnets Behind Massive DDoS Attacks

Authorities Dismantle IoT Botnets Behind Massive DDoS Attacks

Posted on March 20, 2026 By CWS

Authorities have taken down the command and control infrastructure of four significant Internet of Things (IoT) botnets, marking a major step in combating cybercrime. This operation was a joint effort led by the U.S. Justice Department, alongside Canadian and German agencies, targeting the masterminds and framework of the Aisuru, KimWolf, JackSkid, and Mossad botnets.

Global Impact of IoT Botnets

These botnets collectively compromised over three million devices worldwide, launching Distributed Denial of Service (DDoS) attacks with traffic surging up to an unprecedented 30 Terabits per second (Tbps). Exploiting weaknesses in IoT devices such as webcams and routers, threat actors amassed a vast network by leveraging poor security configurations and existing vulnerabilities.

Particularly, the operators of KimWolf and JackSkid demonstrated advanced evasion techniques, targeting devices usually secured behind network firewalls. Once compromised, these devices became part of a large-scale “cybercrime-as-a-service” network, which was rented out to other cybercriminals for launching disruptive DDoS attacks.

Targeted Operations and Seizures

The botnets’ attacks were aimed at servers globally, significantly affecting critical infrastructure, including assets of the Department of Defense Information Network (DoDIN). The botnets were responsible for issuing numerous attack commands, with Aisuru and JackSkid alone directing over 290,000 commands towards global targets.

The operational strategy focused on disrupting communication lines between compromised IoT devices and the C2 infrastructure. The Defense Criminal Investigative Service (DCIS) and the FBI’s Anchorage Field Office executed seizure warrants on U.S.-based domains and virtual servers, effectively crippling the botnet operations.

International Collaboration and Future Outlook

Simultaneous actions by Germany’s Bundeskriminalamt (BKA) and Canada’s Royal Canadian Mounted Police (RCMP) were crucial in apprehending individuals behind these networks. This coordinated effort highlights the essential role of public-private partnerships in threat intelligence sharing.

A coalition of tech and security firms, including Akamai, Amazon Web Services, Cloudflare, The Shadowserver Foundation, and Team Cymru, played a pivotal role in mapping the C2 networks. Their collaboration enabled authorities to effectively dismantle these networks, preventing future attacks and infections.

This operation underscores the importance of continued international cooperation and intelligence sharing to safeguard against evolving cybersecurity threats. Stay updated on the latest developments by following our coverage.

Cyber Security News Tags:Botnets, C2 infrastructure, Cybercrime, Cybersecurity, DDoS attacks, global collaboration, IoT, Justice Department, public-private partnership, security threats

Post navigation

Previous Post: Russian Cyber Group Targets Ukraine via Zimbra Flaw
Next Post: Apple Urges iOS Update to Combat Exploit Kit Threats

Related Posts

VMware vCenter and NSX Vulnerabilities Let Attackers Enumerate Valid Usernames VMware vCenter and NSX Vulnerabilities Let Attackers Enumerate Valid Usernames Cyber Security News
System Admins Beware! Weaponized Putty Ads in Bing Installs Remote Access Tools System Admins Beware! Weaponized Putty Ads in Bing Installs Remote Access Tools Cyber Security News
Top 10 Smart Contract Risks in 2026 by OWASP Top 10 Smart Contract Risks in 2026 by OWASP Cyber Security News
Microsoft September 2025 Patch Tuesday Microsoft September 2025 Patch Tuesday Cyber Security News
BlackNevas Ransomware Encrypts Files and Steals Sensitive Data From Affected Companies BlackNevas Ransomware Encrypts Files and Steals Sensitive Data From Affected Companies Cyber Security News
Critical Vulnerabilities Uncovered in Zero Trust Network Access Products of Check Point, Zscale,r and NetSkope Critical Vulnerabilities Uncovered in Zero Trust Network Access Products of Check Point, Zscale,r and NetSkope Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Langflow Vulnerability Exploited Rapidly After Disclosure
  • SILENTCONNECT Malware Threatens Windows Security
  • Global Crackdown on Aisuru and Kimwolf Botnets
  • DoJ Dismantles IoT Botnets Behind Huge Global DDoS Attacks
  • Russian APT Exploits Zimbra Vulnerability in Ukraine Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Langflow Vulnerability Exploited Rapidly After Disclosure
  • SILENTCONNECT Malware Threatens Windows Security
  • Global Crackdown on Aisuru and Kimwolf Botnets
  • DoJ Dismantles IoT Botnets Behind Huge Global DDoS Attacks
  • Russian APT Exploits Zimbra Vulnerability in Ukraine Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark