Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Mirai Botnets Escalate Global Cyber Threats

Mirai Botnets Escalate Global Cyber Threats

Posted on March 25, 2026 By CWS

Significant Increase in Botnet Threats

The past year has witnessed a substantial surge in botnet-fueled cyber threats, with a significant portion linked to the notorious Mirai malware family. Initially identified in 2016, Mirai was designed to exploit vulnerabilities in Internet of Things (IoT) devices, particularly those operating on ARC processors with a limited Linux version.

Cyber attackers capitalize on these devices by taking advantage of existing security flaws or using unchanged default factory credentials. Originally a tool for Distributed Denial of Service (DDoS) attacks, Mirai has since evolved, spawning numerous variants that target millions of devices globally.

Proliferation of Mirai Variants

The open-source release of Mirai’s code has enabled a multitude of cybercriminals to develop their own variants. Data from Spamhaus indicates a 26% increase in botnet command and control (C2) servers in the first half of 2025, followed by an additional 24% rise in the latter half of the year. This has resulted in the United States surpassing China as the leading host of botnet C2 servers, a position China held since 2023.

This proliferation underscores how easily the Mirai code is dispersed among cybercriminals and the minimal effort required to create new variants. Researchers from Pulsedive have identified several active Mirai-based botnets, with Aisuru and Kimwolf being particularly destructive.

Impact and Scale of Aisuru-Kimwolf Botnets

The Aisuru and Kimwolf variants, collectively known as Aisuru-Kimwolf, have compromised between one and four million hosts worldwide. According to Cloudflare, they are responsible for some of the largest recorded DDoS attacks, including a 31.4 terabit-per-second flood and a 14.1 billion packet-per-second assault, showcasing their formidable threat level.

The operators of Aisuru-Kimwolf have turned their network into a commercial enterprise, selling access to compromised devices via platforms like Discord and Telegram. Despite disruptions announced by the U.S. Department of Justice on March 19, 2026, these botnets continue to find new ways to operate.

Adaptive Strategies of Kimwolf Botnet

Kimwolf, a subvariant targeting Android devices and Smart TVs, has infected approximately two million mobile devices globally. It utilizes a similar DDoS strategy as Aisuru but is optimized for Android systems, employing scripts to download and execute malicious files across various CPU architectures.

Following enforcement actions by Google and the DOJ, the botnet transitioned to The Invisible Project (I2P), a decentralized, encrypted network that is more challenging to monitor or dismantle, reflecting its operators’ adaptability to law enforcement pressures.

Enhancing Cyber Defense

Organizations can bolster their defenses by utilizing network providers’ DDoS protection services and implementing protective DNS services to block suspicious domain queries. Regularly updating network device firmware and replacing default credentials with strong passwords are crucial steps in preventing unauthorized access.

Cyber Security News Tags:botnet variants, cyber threats, Cybercrime, Cybersecurity, DDoS attacks, internet security, IoT security, Malware, Mirai botnets, mobile security, network security, residential proxy abuse

Post navigation

Previous Post: Stealthy Malware Campaign Utilizes VBS and Remote Trojans
Next Post: Infostealer Malware: Rapid Path to Dark Web Exposure

Related Posts

Web-to-App Funnels: Pros And Cons Web-to-App Funnels: Pros And Cons Cyber Security News
PDFSIDER Malware Actively Used by Threat Actors to Bypass Antivirus and EDR Systems PDFSIDER Malware Actively Used by Threat Actors to Bypass Antivirus and EDR Systems Cyber Security News
Microsoft Warns of OneDrive Bug that Causes Searches to Appear Blank Microsoft Warns of OneDrive Bug that Causes Searches to Appear Blank Cyber Security News
Essential E-Signature Solutions for Cybersecurity in 2026 Essential E-Signature Solutions for Cybersecurity in 2026 Cyber Security News
Phishing Scams Exploit LiveChat to Extract User Data Phishing Scams Exploit LiveChat to Extract User Data Cyber Security News
Hackers Leveraging Microsoft Edge Internet Explorer Mode to Gain Access to Users’ Devices Hackers Leveraging Microsoft Edge Internet Explorer Mode to Gain Access to Users’ Devices Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Infostealer Malware: Rapid Path to Dark Web Exposure
  • Mirai Botnets Escalate Global Cyber Threats
  • Stealthy Malware Campaign Utilizes VBS and Remote Trojans
  • China-Linked Cyberattack Targets Southeast Asian Military
  • SmartApeSG Campaign Exploits ClickFix for Malware Spread

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Infostealer Malware: Rapid Path to Dark Web Exposure
  • Mirai Botnets Escalate Global Cyber Threats
  • Stealthy Malware Campaign Utilizes VBS and Remote Trojans
  • China-Linked Cyberattack Targets Southeast Asian Military
  • SmartApeSG Campaign Exploits ClickFix for Malware Spread

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark