Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Mitigates Record 15.72 Tbps DDoS Attack Driven by AISURU Botnet

Posted on November 18, 2025November 18, 2025 By CWS

Nov 18, 2025Ravie LakshmananIoT Safety / Botnet
Microsoft on Monday disclosed that it routinely detected and neutralized a distributed denial-of-service (DDoS) assault focusing on a single endpoint in Australia that measured 15.72 terabits per second (Tbps) and practically 3.64 billion packets per second (pps).
The tech big stated it was the biggest DDoS assault ever noticed within the cloud, and that it originated from a TurboMirai-class Web of Issues (IoT botnet often known as AISURU. It is at the moment not recognized who was focused by the assault.
“The assault concerned extraordinarily high-rate UDP floods focusing on a particular public IP tackle, launched from over 500,000 supply IPs throughout numerous areas,” Microsoft’s Sean Whalen stated.

“These sudden UDP bursts had minimal supply spoofing and used random supply ports, which helped simplify traceback and facilitated supplier enforcement.”
Based on knowledge from QiAnXin XLab, the AISURU botnet is powered by practically 300,000 contaminated gadgets, most of that are routers, safety cameras, and DVR programs. It has been attributed to among the largest DDoS assaults recorded to this point. In a report printed final month, NETSCOUT categorised the DDoS-for-hire botnet as working with a restricted clientele.
“Operators have reportedly carried out preventive measures to keep away from attacking governmental, regulation enforcement, army, and different nationwide safety properties,” the corporate stated. “Most noticed Aisuru assaults to this point look like associated to on-line gaming.”
Botnets like AISURU additionally allow multi-use features, going past DDoS assaults exceeding 20Tbps to facilitate different illicit actions like credential stuffing, synthetic intelligence (AI)-driven net scraping, spamming, and phishing. AISURU additionally incorporates a residential proxy service.
“Attackers are scaling with the web itself. As fiber-to-the-home speeds rise and IoT gadgets get extra highly effective, the baseline for assault measurement retains climbing,” Microsoft stated.
The disclosure comes as NETSCOUT detailed one other TurboMirai botnet referred to as Eleven11 (aka RapperBot) that is estimated to have launched about 3,600 DDoS assaults powered by hijacked IoT gadgets between late February and August 2025, across the similar time authorities disclosed an arrest and the dismantling of the botnet.

A number of the command-and-control (C2) servers related to the botnet are registered with the “.libre” top-level area (TLD), which is a part of OpenNIC, another DNS root operated independently of ICANN and has been embraced by different DDoS botnets like CatDDoS and Fodcha.
“Though the botnet has doubtless been rendered inoperable, compromised gadgets stay susceptible,” it stated. “It’s doubtless a matter of time till hosts are hijacked once more and conscripted as a compromised node for the subsequent botnet.”

The Hacker News Tags:Aisuru, Attack, Botnet, DDoS, Driven, Microsoft, Mitigates, Record, Tbps

Post navigation

Previous Post: Google Announces Public Preview of Alert Triage and Investigation Agent used in Google Security Operations
Next Post: Everest Ransomware Group Allegedly Exposes 343 GB of Sensitive Data in Major Under Armour Breach

Related Posts

Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure The Hacker News
Eurojust Arrests 5 in €100M Cryptocurrency Investment Fraud Spanning 23 Countries The Hacker News
TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution The Hacker News
Tech Overtakes Gaming as Top DDoS Attack Target, New Gcore Radar Report Finds The Hacker News
5 Critical Questions For Adopting an AI Security Solution The Hacker News
Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases Using Sui Blockchain The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark