Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Authorities Dismantle IoT Botnets Behind Massive DDoS Attacks

Authorities Dismantle IoT Botnets Behind Massive DDoS Attacks

Posted on March 20, 2026 By CWS

Authorities have taken down the command and control infrastructure of four significant Internet of Things (IoT) botnets, marking a major step in combating cybercrime. This operation was a joint effort led by the U.S. Justice Department, alongside Canadian and German agencies, targeting the masterminds and framework of the Aisuru, KimWolf, JackSkid, and Mossad botnets.

Global Impact of IoT Botnets

These botnets collectively compromised over three million devices worldwide, launching Distributed Denial of Service (DDoS) attacks with traffic surging up to an unprecedented 30 Terabits per second (Tbps). Exploiting weaknesses in IoT devices such as webcams and routers, threat actors amassed a vast network by leveraging poor security configurations and existing vulnerabilities.

Particularly, the operators of KimWolf and JackSkid demonstrated advanced evasion techniques, targeting devices usually secured behind network firewalls. Once compromised, these devices became part of a large-scale “cybercrime-as-a-service” network, which was rented out to other cybercriminals for launching disruptive DDoS attacks.

Targeted Operations and Seizures

The botnets’ attacks were aimed at servers globally, significantly affecting critical infrastructure, including assets of the Department of Defense Information Network (DoDIN). The botnets were responsible for issuing numerous attack commands, with Aisuru and JackSkid alone directing over 290,000 commands towards global targets.

The operational strategy focused on disrupting communication lines between compromised IoT devices and the C2 infrastructure. The Defense Criminal Investigative Service (DCIS) and the FBI’s Anchorage Field Office executed seizure warrants on U.S.-based domains and virtual servers, effectively crippling the botnet operations.

International Collaboration and Future Outlook

Simultaneous actions by Germany’s Bundeskriminalamt (BKA) and Canada’s Royal Canadian Mounted Police (RCMP) were crucial in apprehending individuals behind these networks. This coordinated effort highlights the essential role of public-private partnerships in threat intelligence sharing.

A coalition of tech and security firms, including Akamai, Amazon Web Services, Cloudflare, The Shadowserver Foundation, and Team Cymru, played a pivotal role in mapping the C2 networks. Their collaboration enabled authorities to effectively dismantle these networks, preventing future attacks and infections.

This operation underscores the importance of continued international cooperation and intelligence sharing to safeguard against evolving cybersecurity threats. Stay updated on the latest developments by following our coverage.

Cyber Security News Tags:Botnets, C2 infrastructure, Cybercrime, Cybersecurity, DDoS attacks, global collaboration, IoT, Justice Department, public-private partnership, security threats

Post navigation

Previous Post: Russian Cyber Group Targets Ukraine via Zimbra Flaw
Next Post: Apple Urges iOS Update to Combat Exploit Kit Threats

Related Posts

North Korean Kimsuky Hackers Leveraged GitHub to Attack Foreign Embassies with XenoRAT Malware North Korean Kimsuky Hackers Leveraged GitHub to Attack Foreign Embassies with XenoRAT Malware Cyber Security News
China-Linked Silver Dragon Uses Google Drive in Cyberattacks China-Linked Silver Dragon Uses Google Drive in Cyberattacks Cyber Security News
IRGC-Linked APT35 Structure, Tools, and Espionage Operations Disclosed IRGC-Linked APT35 Structure, Tools, and Espionage Operations Disclosed Cyber Security News
Blockchain Security – Protecting Decentralized Applications Blockchain Security – Protecting Decentralized Applications Cyber Security News
Encrypting Data to Meet Global Privacy Law Requirements Encrypting Data to Meet Global Privacy Law Requirements Cyber Security News
Red Hat Openshift AI Service Vulnerability Allow Attackers to Take Control of the Infrastructure Red Hat Openshift AI Service Vulnerability Allow Attackers to Take Control of the Infrastructure Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Global Crackdown on Aisuru and Kimwolf Botnets
  • DoJ Dismantles IoT Botnets Behind Huge Global DDoS Attacks
  • Russian APT Exploits Zimbra Vulnerability in Ukraine Attack
  • Apple Urges iOS Update to Combat Exploit Kit Threats
  • Authorities Dismantle IoT Botnets Behind Massive DDoS Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Global Crackdown on Aisuru and Kimwolf Botnets
  • DoJ Dismantles IoT Botnets Behind Huge Global DDoS Attacks
  • Russian APT Exploits Zimbra Vulnerability in Ukraine Attack
  • Apple Urges iOS Update to Combat Exploit Kit Threats
  • Authorities Dismantle IoT Botnets Behind Massive DDoS Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark