Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Mitigates Record 15.72 Tbps DDoS Attack Driven by AISURU Botnet

Posted on November 18, 2025November 18, 2025 By CWS

Nov 18, 2025Ravie LakshmananIoT Safety / Botnet
Microsoft on Monday disclosed that it routinely detected and neutralized a distributed denial-of-service (DDoS) assault focusing on a single endpoint in Australia that measured 15.72 terabits per second (Tbps) and practically 3.64 billion packets per second (pps).
The tech big stated it was the biggest DDoS assault ever noticed within the cloud, and that it originated from a TurboMirai-class Web of Issues (IoT botnet often known as AISURU. It is at the moment not recognized who was focused by the assault.
“The assault concerned extraordinarily high-rate UDP floods focusing on a particular public IP tackle, launched from over 500,000 supply IPs throughout numerous areas,” Microsoft’s Sean Whalen stated.

“These sudden UDP bursts had minimal supply spoofing and used random supply ports, which helped simplify traceback and facilitated supplier enforcement.”
Based on knowledge from QiAnXin XLab, the AISURU botnet is powered by practically 300,000 contaminated gadgets, most of that are routers, safety cameras, and DVR programs. It has been attributed to among the largest DDoS assaults recorded to this point. In a report printed final month, NETSCOUT categorised the DDoS-for-hire botnet as working with a restricted clientele.
“Operators have reportedly carried out preventive measures to keep away from attacking governmental, regulation enforcement, army, and different nationwide safety properties,” the corporate stated. “Most noticed Aisuru assaults to this point look like associated to on-line gaming.”
Botnets like AISURU additionally allow multi-use features, going past DDoS assaults exceeding 20Tbps to facilitate different illicit actions like credential stuffing, synthetic intelligence (AI)-driven net scraping, spamming, and phishing. AISURU additionally incorporates a residential proxy service.
“Attackers are scaling with the web itself. As fiber-to-the-home speeds rise and IoT gadgets get extra highly effective, the baseline for assault measurement retains climbing,” Microsoft stated.
The disclosure comes as NETSCOUT detailed one other TurboMirai botnet referred to as Eleven11 (aka RapperBot) that is estimated to have launched about 3,600 DDoS assaults powered by hijacked IoT gadgets between late February and August 2025, across the similar time authorities disclosed an arrest and the dismantling of the botnet.

A number of the command-and-control (C2) servers related to the botnet are registered with the “.libre” top-level area (TLD), which is a part of OpenNIC, another DNS root operated independently of ICANN and has been embraced by different DDoS botnets like CatDDoS and Fodcha.
“Though the botnet has doubtless been rendered inoperable, compromised gadgets stay susceptible,” it stated. “It’s doubtless a matter of time till hosts are hijacked once more and conscripted as a compromised node for the subsequent botnet.”

The Hacker News Tags:Aisuru, Attack, Botnet, DDoS, Driven, Microsoft, Mitigates, Record, Tbps

Post navigation

Previous Post: Google Announces Public Preview of Alert Triage and Investigation Agent used in Google Security Operations
Next Post: Everest Ransomware Group Allegedly Exposes 343 GB of Sensitive Data in Major Under Armour Breach

Related Posts

New PathWiper Data Wiper Malware Disrupts Ukrainian Critical Infrastructure in 2025 Attack The Hacker News
New Coyote Malware Variant Exploits Windows UI Automation to Steal Banking Credentials The Hacker News
Microsoft Patches Critical Entra ID Flaw Enabling Global Admin Impersonation Across Tenants The Hacker News
Over 80,000 Microsoft Entra ID Accounts Targeted Using Open-Source TeamFiltration Tool The Hacker News
Critical Flaws in Niagara Framework Threaten Smart Buildings and Industrial Systems Worldwide The Hacker News
Pentests once a year? Nope. It’s time to build an offensive SOC The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Solve Alert Overload in Your SOC
  • Amazon Details Iran’s Cyber-Enabled Kinetic Attacks Linking Digital Spying to Physical Strikes
  • Secure.com Raises $4.5 Million for Agentic Security
  • Seraphic Becomes the First and Only Secure Enterprise Browser Solution to Protect Electron-Based Applications
  • Hackers Actively Exploiting 7-Zip RCE Vulnerability in the Wild

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Solve Alert Overload in Your SOC
  • Amazon Details Iran’s Cyber-Enabled Kinetic Attacks Linking Digital Spying to Physical Strikes
  • Secure.com Raises $4.5 Million for Agentic Security
  • Seraphic Becomes the First and Only Secure Enterprise Browser Solution to Protect Electron-Based Applications
  • Hackers Actively Exploiting 7-Zip RCE Vulnerability in the Wild

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News