International Law Enforcement Operation Dismantles Major IoT DDoS Botnets

Global Operation Disrupts Aisuru, Kimwolf, and Other IoT Botnets Used in 30 Tbps DDoS Attacks

INFORMATIONAL
March 21, 2026
4m read
CyberattackThreat IntelligenceIoT Security

Related Entities

Organizations

U.S. Department of JusticeDepartment of Defense

Other

AisuruKimwolfJackSkidMossad

Full Report

Executive Summary

On March 20, 2026, the U.S. Department of Justice announced a successful international law enforcement operation that disrupted the infrastructure of several prolific Internet of Things (IoT) botnets. The coordinated effort, involving authorities in the United States, Canada, and Germany, targeted the command-and-control (C2) servers of botnets known as Aisuru, Kimwolf, JackSkid, and Mossad. These botnets had enslaved over 3 million IoT devices globally, including routers and cameras, and were used to launch massive Distributed Denial-of-Service (DDoS) attacks. The operators ran a 'cybercrime-as-a-service' platform, renting out their botnets for hire. The operation involved the court-authorized seizure of domains and servers, crippling the botnets' ability to operate.


Threat Overview

This operation targeted the core of the modern DDoS-for-hire ecosystem, which relies on massive botnets of insecure IoT devices.

  • The Botnets: The named botnets—Aisuru, Kimwolf, JackSkid, and Mossad—are malware families designed to infect and control a large number of devices. They primarily target IoT devices because these devices are numerous, often have weak or default credentials, and are rarely patched.
  • The Business Model: The botnet operators ran a 'cybercrime-as-a-service' or 'booter/stresser' service. They would rent out access to their botnet, allowing paying customers to launch powerful DDoS attacks against any target of their choice. This lowers the barrier to entry for conducting large-scale cyberattacks.
  • The Impact: The primary use of these botnets was for DDoS attacks (T1498 - Network Denial of Service). These attacks, reportedly reaching speeds of 30 Terabits per second (Tbps), can knock any website or service offline. The infrastructure was also used for extortion, where criminals would threaten a DDoS attack unless a payment was made.

Technical Analysis

The operation focused on dismantling the C2 infrastructure, which is the Achilles' heel of a botnet.

  1. Botnet Creation: The operators would scan the internet for vulnerable IoT devices (T1595 - Active Scanning), typically exploiting default credentials or unpatched vulnerabilities to install their malware.
  2. Command and Control: Each infected device (a 'bot') would connect back to a C2 server controlled by the operators. This server is used to issue commands to the botnet, such as 'attack this IP address'.
  3. Disruption Operation: The law enforcement operation identified and seized these C2 servers and the domains used to access them (T1583.001 - Acquire Infrastructure: Domains). Without the C2 server, the bots are orphaned and cannot receive new commands, effectively neutralizing the botnet.

Impact Assessment

  • Disruption of Criminal Services: The primary impact is the immediate shutdown of these DDoS-for-hire services. This prevents further attacks from these specific botnets and disrupts the business operations of the criminals.
  • Degradation of DDoS Capabilities: Taking down botnets that control 3 million devices and are capable of 30 Tbps attacks significantly reduces the total firepower available to cybercriminals on the black market.
  • Deterrence: Successful international operations like this serve as a deterrent to other cybercriminals, showing that they can be identified and their infrastructure dismantled.
  • Intelligence Gathering: The seized servers will provide a wealth of intelligence for law enforcement, potentially revealing the identities of the operators and their customers.

Cyber Observables for Detection

For organizations, detecting if you are being targeted by such a botnet is straightforward—you will experience a DDoS attack. Detecting if your devices are part of a botnet is more challenging.

Type Value Description
network_traffic_pattern (unusual outbound traffic) An IoT device like a camera suddenly sending a large volume of traffic to a single IP address is a strong indicator it is part of a DDoS attack.
network_traffic_pattern (C2 beaconing) Monitor for IoT devices making regular, repeated outbound connections to unknown servers on the internet.
log_source Firewall Logs A massive flood of inbound traffic from a wide range of disparate IP addresses targeting a specific service is a DDoS attack.

Detection & Response

  • DDoS Protection Services: The primary defense against large-scale DDoS attacks is to use a cloud-based DDoS mitigation service (e.g., from Akamai, Cloudflare, AWS Shield). These services have the capacity to absorb and filter malicious traffic before it reaches your network.
  • Network Monitoring: Monitor your own network for IoT devices exhibiting suspicious outbound traffic patterns. Isolate any device that appears to be participating in an attack.

Mitigation

  • Secure IoT Devices: The root cause of these botnets is insecure IoT devices. To prevent your devices from being enslaved:
    • Change default usernames and passwords immediately upon installation.
    • Use strong, unique passwords for each device.
    • Keep firmware updated to patch vulnerabilities. This is an application of MITRE Mitigation M1051 - Update Software.
  • Network Segmentation: Place IoT devices on a separate, isolated network segment that does not have access to critical internal systems. This prevents a compromised camera from being used to pivot into your corporate network. This is a core principle of D3FEND Network Isolation (D3-NI).

Timeline of Events

1
March 20, 2026
The U.S. Department of Justice announces the successful disruption of several major IoT botnet C2 infrastructures.
2
March 21, 2026
This article was published

MITRE ATT&CK Mitigations

Change default passwords on all IoT devices and use strong, unique passwords.

Keep IoT device firmware up to date to patch known vulnerabilities.

Isolate IoT devices on a separate network segment to limit their ability to attack internal systems or be reached from the internet.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

DDoSbotnetIoTlaw enforcementtakedowncybercrime-as-a-service

📢 Share This Article

Help others stay informed about cybersecurity threats