Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Authorities Dismantle IoT Botnets Behind Massive DDoS Attacks

Authorities Dismantle IoT Botnets Behind Massive DDoS Attacks

Posted on March 20, 2026 By CWS

Authorities have taken down the command and control infrastructure of four significant Internet of Things (IoT) botnets, marking a major step in combating cybercrime. This operation was a joint effort led by the U.S. Justice Department, alongside Canadian and German agencies, targeting the masterminds and framework of the Aisuru, KimWolf, JackSkid, and Mossad botnets.

Global Impact of IoT Botnets

These botnets collectively compromised over three million devices worldwide, launching Distributed Denial of Service (DDoS) attacks with traffic surging up to an unprecedented 30 Terabits per second (Tbps). Exploiting weaknesses in IoT devices such as webcams and routers, threat actors amassed a vast network by leveraging poor security configurations and existing vulnerabilities.

Particularly, the operators of KimWolf and JackSkid demonstrated advanced evasion techniques, targeting devices usually secured behind network firewalls. Once compromised, these devices became part of a large-scale “cybercrime-as-a-service” network, which was rented out to other cybercriminals for launching disruptive DDoS attacks.

Targeted Operations and Seizures

The botnets’ attacks were aimed at servers globally, significantly affecting critical infrastructure, including assets of the Department of Defense Information Network (DoDIN). The botnets were responsible for issuing numerous attack commands, with Aisuru and JackSkid alone directing over 290,000 commands towards global targets.

The operational strategy focused on disrupting communication lines between compromised IoT devices and the C2 infrastructure. The Defense Criminal Investigative Service (DCIS) and the FBI’s Anchorage Field Office executed seizure warrants on U.S.-based domains and virtual servers, effectively crippling the botnet operations.

International Collaboration and Future Outlook

Simultaneous actions by Germany’s Bundeskriminalamt (BKA) and Canada’s Royal Canadian Mounted Police (RCMP) were crucial in apprehending individuals behind these networks. This coordinated effort highlights the essential role of public-private partnerships in threat intelligence sharing.

A coalition of tech and security firms, including Akamai, Amazon Web Services, Cloudflare, The Shadowserver Foundation, and Team Cymru, played a pivotal role in mapping the C2 networks. Their collaboration enabled authorities to effectively dismantle these networks, preventing future attacks and infections.

This operation underscores the importance of continued international cooperation and intelligence sharing to safeguard against evolving cybersecurity threats. Stay updated on the latest developments by following our coverage.

Cyber Security News Tags:Botnets, C2 infrastructure, Cybercrime, Cybersecurity, DDoS attacks, global collaboration, IoT, Justice Department, public-private partnership, security threats

Post navigation

Previous Post: Russian Cyber Group Targets Ukraine via Zimbra Flaw
Next Post: Apple Urges iOS Update to Combat Exploit Kit Threats

Related Posts

Top 10 Best Autonomous Endpoint Management Tools in 2025 Top 10 Best Autonomous Endpoint Management Tools in 2025 Cyber Security News
Hackers Actively Compromising Databases Using Legitimate Commands Hackers Actively Compromising Databases Using Legitimate Commands Cyber Security News
Multiple GitLab Vulnerabilities Let Attackers Inject Malicious Prompts to Steal Sensitive Data Multiple GitLab Vulnerabilities Let Attackers Inject Malicious Prompts to Steal Sensitive Data Cyber Security News
Windows Remote Access Connection Manager 0-Day Vulnerability Exploited in Attacks Windows Remote Access Connection Manager 0-Day Vulnerability Exploited in Attacks Cyber Security News
Cloudflare API Outage Linked to React useEffect Bug Causes Service Overload and Recovery Failure Cloudflare API Outage Linked to React useEffect Bug Causes Service Overload and Recovery Failure Cyber Security News
Grafana Vulnerabilities Allow User Redirection to Malicious Sites and Code Execution in Dashboards Grafana Vulnerabilities Allow User Redirection to Malicious Sites and Code Execution in Dashboards Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Iranian Cyber Threat Poses as Ransomware Attack
  • MuddyWater Exploits Teams for Credential Theft in Covert Attack
  • Herd Security Secures $3M to Enhance AI Training Platform
  • Announcing Cybersecurity Stars Awards 2026
  • Vimeo Data Breach Affects Thousands with Email Exposure

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Iranian Cyber Threat Poses as Ransomware Attack
  • MuddyWater Exploits Teams for Credential Theft in Covert Attack
  • Herd Security Secures $3M to Enhance AI Training Platform
  • Announcing Cybersecurity Stars Awards 2026
  • Vimeo Data Breach Affects Thousands with Email Exposure

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark