Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
DoJ Dismantles IoT Botnets Behind Huge Global DDoS Attacks

DoJ Dismantles IoT Botnets Behind Huge Global DDoS Attacks

Posted on March 20, 2026 By CWS

The U.S. Department of Justice (DoJ) has successfully dismantled the command-and-control structures of several notorious Internet of Things (IoT) botnets. This operation, announced on Thursday, targeted botnets including AISURU, Kimwolf, JackSkid, and Mossad, following a court-approved enforcement action. The coordinated effort also involved authorities from Canada and Germany, with substantial support from private sector companies such as Akamai, Amazon Web Services, and Cloudflare.

International Collaboration in Cybercrime Combat

Numerous tech giants, including Google, Lumen, Nokia, and Oracle, contributed to the investigation, underscoring the global nature of this cybersecurity threat. The DoJ highlighted that these botnets were responsible for orchestrating distributed denial-of-service (DDoS) attacks globally, with some attacks peaking at an unprecedented 30 Terabits per second.

Cloudflare had previously linked the AISURU/Kimwolf botnets to a colossal 31.4 Tbps DDoS attack in November 2025. These botnets have been involved in hyper-volumetric attacks, with metrics reaching 3 billion packets per second and 54 million requests per second.

Identifying Key Suspects

Investigations have pointed to Jacob Butler, a 23-year-old from Ottawa, Canada, as a key figure behind Kimwolf. Despite Butler’s claims of being impersonated, cybersecurity journalist Brian Krebs identified him as a potential administrator. Another suspect is believed to be a 15-year-old residing in Germany, although no arrests have been reported yet.

The botnets have allegedly integrated over 2 million compromised Android devices, primarily off-brand TVs, into their networks. Across the board, these botnets have infected no fewer than 3 million devices worldwide, including digital video recorders and Wi-Fi routers.

Botnets’ Impact on Global Cybersecurity

The Kimwolf and JackSkid botnets have been noted for targeting devices usually well-protected by firewalls. The operators used a ‘cybercrime as a service’ model, selling access to these compromised devices to other cybercriminals. This strategy enabled the launch of numerous DDoS attacks, with AISURU alone responsible for over 200,000 attack commands.

Tom Scholl from AWS highlighted a significant evolution in botnet operations, with Kimwolf exploiting residential proxy networks by compromising home devices. Akamai confirmed these botnets’ capacity to generate attacks exceeding 30 Tbps, potentially crippling essential internet infrastructure and imposing severe strains on ISPs and cloud-based services.

As cyber threats continue to evolve, this operation by the DoJ and its international partners marks a critical step in mitigating the impact of IoT-based cybercrime, reinforcing the need for ongoing vigilance and collaboration in the cybersecurity community.

The Hacker News Tags:Akamai, AWS, Botnets, Cloudflare, command-and-control, cyber threats, Cybercrime, Cybersecurity, DDoS attacks, DoJ, internet security, IoT, network security

Post navigation

Previous Post: Russian APT Exploits Zimbra Vulnerability in Ukraine Attack
Next Post: Global Crackdown on Aisuru and Kimwolf Botnets

Related Posts

Identity Security Has an Automation Problem—And It’s Bigger Than You Think Identity Security Has an Automation Problem—And It’s Bigger Than You Think The Hacker News
Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign The Hacker News
Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more The Hacker News
Ivanti EPMM Security Flaw Exploited by Single IP Source Ivanti EPMM Security Flaw Exploited by Single IP Source The Hacker News
OpenClaw Security Flaw Allows AI Agent Hijacking OpenClaw Security Flaw Allows AI Agent Hijacking The Hacker News
React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Langflow Vulnerability Exploited Rapidly After Disclosure
  • SILENTCONNECT Malware Threatens Windows Security
  • Global Crackdown on Aisuru and Kimwolf Botnets
  • DoJ Dismantles IoT Botnets Behind Huge Global DDoS Attacks
  • Russian APT Exploits Zimbra Vulnerability in Ukraine Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Langflow Vulnerability Exploited Rapidly After Disclosure
  • SILENTCONNECT Malware Threatens Windows Security
  • Global Crackdown on Aisuru and Kimwolf Botnets
  • DoJ Dismantles IoT Botnets Behind Huge Global DDoS Attacks
  • Russian APT Exploits Zimbra Vulnerability in Ukraine Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark