The US Department of Justice announced successful dismantling of infrastructure supporting 4 prominent IoT botnets including Aisuru and KimWolf. The operation targeted command and control servers and disrupted cybercrime as a service platforms that enabled thousands of DDoS attacks affecting businesses and critical infrastructure.
The botnets operated under a criminal business model where operators sold attack capacity to other cybercriminals, enabling widespread DDoS attacks that caused tens of thousands of dollars in losses and remediation costs per incident. Cloud security firm Akamai, which participated in the joint operation, stated these botnets can cripple core internet infrastructure and overwhelm even high capacity mitigation services.
Botnet Capabilities
The disrupted botnets infected thousands of IoT devices including routers, cameras, and network attached storage systems, turning them into unwitting participants in coordinated attacks. The operators exploited default credentials, unpatched vulnerabilities, and weak security configurations to build their attack infrastructure.
Security researchers noted the botnets demonstrated advanced evasion techniques including encrypted command channels, rapid proxy rotation, and distributed control architectures designed to survive partial takedowns. The sophistication suggests organized cybercrime operations rather than individual actors.
Temporary Reprieve
Cybersecurity professionals warned the disruption likely provides only temporary reprieve from IoT botnet threats. The takedown removes current infrastructure but does not address the underlying ecosystem of vulnerable devices that enable rapid botnet reconstruction.
Akamai emphasized that millions of poorly secured IoT devices remain online and accessible to attackers. Without fundamental improvements in device security standards and automatic patching mechanisms, new botnets will inevitably emerge to replace the disrupted operations.








