Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Largest Azure DDoS Attack Powered by Aisuru Botnet

Largest Azure DDoS Attack Powered by Aisuru Botnet

Posted on November 19, 2025November 19, 2025 By CWS

Microsoft this week reported that it lately mitigated a record-breaking distributed denial-of-service (DDoS) assault geared toward its Azure cloud service.

The tech large stated it was the “largest DDoS assault ever noticed within the cloud”, peaking at 15.72 terabits per second (Tbps) and almost 3.64 billion packets per second (Bpps).

Nonetheless, Microsoft confirmed to SecurityWeek that the determine referred to the most important assault ever recorded focusing on Azure, and never the most important DDoS assault recorded globally.

The most important publicly reported DDoS assault so far was geared toward a European community infrastructure firm, and it peaked at 22.2 Tbps and 10.6 Bpps, based on Cloudflare. The assault was powered by the Aisuru botnet.

The assault on Azure was carried out on October 24 and it focused a single endpoint in Australia. Much like the 22 Tbps assault noticed by Cloudflare, the Azure assault was powered by Aisuru.

“The assault concerned extraordinarily high-rate UDP floods focusing on a selected public IP tackle, launched from over 500,000 supply IPs throughout numerous areas,” defined Microsoft’s Sean Whalen. “These sudden UDP bursts had minimal supply spoofing and used random supply ports, which helped simplify traceback and facilitated supplier enforcement.”

Aisuru has been described as a TurboMirai-class IoT botnet powered by compromised consumer-grade units resembling routers, CCTV cameras, and DVR techniques.

Aisuru, supplied as a DDoS-for-hire service, has been accountable for giant DDoS assaults, notably ones geared toward on-line gaming platforms. The botnet will also be used for credential stuffing, internet scraping, phishing, and spamming. Commercial. Scroll to proceed studying.

Netscout reported lately that TurboMirai-class botnets “can not generate spoofed DDoS assault site visitors, permitting traceback and correlation with subscriber data that may be utilized to establish, quarantine, and remediate compromised units”.

Associated: Cloudflare Outage Not Brought on by Cyberattack

Associated: Document-Breaking 7.3 Tbps DDoS Assault Targets Internet hosting Supplier

Associated: DDoS Assaults Blocked by Cloudflare in 2025 Already Surpass 2024 Complete

Security Week News Tags:Aisuru, Attack, Azure, Botnet, DDoS, Largest, Powered

Post navigation

Previous Post: New Sneaky 2FA Phishing Kit with BitB Technique Attacking Users to Steal Microsoft Account Credentials
Next Post: How to Use Ringfencing to Prevent the Weaponization of Trusted Software

Related Posts

CISO Conversations: Are Microsoft’s Deputy CISOs a Signpost to the Future? CISO Conversations: Are Microsoft’s Deputy CISOs a Signpost to the Future? Security Week News
CISA Warns of Attacks Exploiting N-able Vulnerabilities CISA Warns of Attacks Exploiting N-able Vulnerabilities Security Week News
Opti Raises  Million for Identity Security Platform Opti Raises $20 Million for Identity Security Platform Security Week News
Telnyx Python SDK Faces Supply Chain Attack Telnyx Python SDK Faces Supply Chain Attack Security Week News
Half of 2025’s Zero-Day Exploits Target Businesses: Google Half of 2025’s Zero-Day Exploits Target Businesses: Google Security Week News
Cerby Raises  Million for Identity Automation Platform Cerby Raises $40 Million for Identity Automation Platform Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark