A botnet-for-hire service known as Aisuru has been identified as the force behind a new record-setting Distributed Denial-of-Service (DDoS) attack, which peaked at an unprecedented 29.7 Terabits per second (Tbps). The botnet, comprised of millions of compromised Internet of Things (IoT) devices and consumer-grade routers, is being rented out to cybercriminals, lowering the barrier for launching catastrophic-level attacks. In a three-month span during late 2025, Aisuru was linked to over 1,300 distinct DDoS attacks, primarily targeting organizations in the gaming, telecommunications, and financial services industries. The sheer power of this botnet poses a threat not just to direct targets, but to the stability of regional internet infrastructure.
The Aisuru botnet operates by exploiting a fundamental and widespread security weakness: insecure IoT devices. The attack lifecycle is as follows:
T1190 - Exploit Public-Facing Application).T1498 - Network Denial of Service): When a customer rents the botnet, the C2 server issues a command to a large number of bots, instructing them to flood a target IP address with a massive volume of network traffic. This can be a volumetric attack (e.g., UDP flood) or a more complex application-layer attack.The 29.7 Tbps peak indicates an extremely large and powerful botnet, capable of overwhelming the defenses of even well-prepared organizations and ISPs.
The impact of Aisuru is critical. The availability of such a powerful DDoS weapon for hire has several major consequences:
For Victims/Targets:
Response:
For Organizations (Potential Targets):
For the Internet Ecosystem (Device Owners & Manufacturers):
D3-SU).Use a cloud-based DDoS mitigation service to scrub attack traffic before it reaches your network perimeter.
Mapped D3FEND Techniques:
Implement BCP38 / ingress filtering to prevent devices on your network from sending traffic with spoofed source IP addresses.
For IoT device owners, changing default passwords is the most critical step to prevent compromise and enlistment into a botnet.
Against a 29.7 Tbps attack from the Aisuru botnet, on-premise defenses are futile. The only effective countermeasure is to contract with a cloud-based DDoS scrubbing provider. This service works by redirecting all incoming traffic through the provider's global network, which has the massive capacity to absorb the attack. The provider's systems analyze the traffic, filter out the malicious packets from the botnet, and forward only the legitimate user traffic to the organization's servers. This should be configured in an 'always-on' mode for critical services to ensure immediate protection.
DDoS mitigation services heavily rely on Inbound Session Volume Analysis to distinguish attack traffic from legitimate users. By baselining normal traffic volumes, protocols, and packet sizes for a given service, the system can detect the massive spike in traffic that characterizes a volumetric attack like those from Aisuru. Advanced systems can also perform challenge-response tests (e.g., SYN cookies) to validate that a connection is coming from a real client and not a simple bot, allowing them to precisely filter out the attack traffic while minimizing impact on real users.
The root cause of botnets like Aisuru is insecure IoT devices. To solve this problem long-term, manufacturers must prioritize Platform Hardening. This means shipping every device with a unique, randomly generated password instead of a universal default like 'admin'. Unnecessary services like Telnet and UPnP should be disabled by default. Furthermore, devices must have a secure, automated mechanism to receive and apply firmware updates to patch vulnerabilities. Until these practices become standard, consumers must be educated to manually change default passwords and disable risky features on their routers and IoT gadgets.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats