Feds Disrupt IoT Botnets Behind Huge DDoS Attacks
đ āϏāĻžāĻāĻŦāĻžāϰ āύāĻŋāϰāĻžāĻĒāϤā§āϤāĻž
Image: Shutterstock, @Elzicon.
The Justice Department said the Department of Defense Office of Inspector Generalâs (DoDIG)Defense Criminal Investigative Service(DCIS) executed seizure warrants targeting multiple U.S.-registered domains, virtual servers, and other infrastructure involved in DDoS attacks against Internet addresses owned by the DoD.
The government alleges the unnamed people in control of the four botnets used their crime machines to launch hundreds of thousands of DDoS attacks, often demanding extortion payments from victims. Some victims reported tens of thousands of dollars in losses and remediation expenses.
The oldest of the botnets â Aisuru â issued more than 200,000 attacks commands, while JackSkid hurled at least 90,000 attacks. Kimwolf issued more than 25,000 attack commands, the government said, while Mossad was blamed for roughy 1,000 digital sieges.
The DOJsaidthe law enforcement action was designed to prevent further infection to victim devices and to limit or eliminate the ability of the botnets to launch future attacks. The case is being investigated by the DCIS with help from the FBIâs field office in Anchorage, Alaska, and the DOJâs statement credits nearly two dozen technology companies with assisting in the operation.
âBy working closely with DCIS and our international law enforcement partners, we collectively identified and disrupted criminal infrastructure used to carry out large-scale DDoS attacks,â said Special Agent in ChargeRebecca Dayof the FBI Anchorage Field Office.
Aisuru emerged in late 2024, and by mid-2025 it was launchingrecord-breaking DDoS attacksas it rapidly infected new IoT devices. In October 2025, Aisuru was used to seed Kimwolf, an Aisuru variant which introduced a novel spreading mechanism that allowed the botnet to infect devices hidden behind the protection of the userâs internal network.
On January 2, 2026, the security firmSynthientpublicly disclosedthe vulnerability Kimwolf was using to propagate so quickly. That disclosure helped curtail Kimwolfâs spread somewhat, but since then several other IoT botnets have emerged that effectively copy Kimwolfâs spreading methods while competing for the same pool of vulnerable devices. According to the DOJ, the JackSkid botnet also sought out systems on internal networks just like Kimwolf.
The DOJ said its disruption of the four botnets coincided with âlaw enforcement actionsâ conducted in Canada and Germany targeting individuals who allegedly operated those botnets, although