Loading...

DOJ Disrupts Infrastructure of 4 Major IoT Botnets Including Aisuru and KimWolf

DOJ Botnet Operation

The US Department of Justice announced successful dismantling of infrastructure supporting 4 prominent IoT botnets including Aisuru and KimWolf. The operation targeted command and control servers and disrupted cybercrime as a service platforms that enabled thousands of DDoS attacks affecting businesses and critical infrastructure.

The botnets operated under a criminal business model where operators sold attack capacity to other cybercriminals, enabling widespread DDoS attacks that caused tens of thousands of dollars in losses and remediation costs per incident. Cloud security firm Akamai, which participated in the joint operation, stated these botnets can cripple core internet infrastructure and overwhelm even high capacity mitigation services.

Botnet Capabilities

The disrupted botnets infected thousands of IoT devices including routers, cameras, and network attached storage systems, turning them into unwitting participants in coordinated attacks. The operators exploited default credentials, unpatched vulnerabilities, and weak security configurations to build their attack infrastructure.

Security researchers noted the botnets demonstrated advanced evasion techniques including encrypted command channels, rapid proxy rotation, and distributed control architectures designed to survive partial takedowns. The sophistication suggests organized cybercrime operations rather than individual actors.

Temporary Reprieve

Cybersecurity professionals warned the disruption likely provides only temporary reprieve from IoT botnet threats. The takedown removes current infrastructure but does not address the underlying ecosystem of vulnerable devices that enable rapid botnet reconstruction.

Akamai emphasized that millions of poorly secured IoT devices remain online and accessible to attackers. Without fundamental improvements in device security standards and automatic patching mechanisms, new botnets will inevitably emerge to replace the disrupted operations.

Picture of K4CGS

K4CGS

K4CGS is the author of BreachNews, focusing on data breach intelligence, dark web monitoring, and threat analysis. His work involves analyzing breach claims, reviewing leaked datasets, and tracking threat actor activity to provide clear, factual reporting.

Share this:

Related Posts

Newsletter signup

Get the latest data breach and dark web news.

Please wait...

Thank you for signing up!

Search & Monitoring Tools

Free Data Breach Search Tool

Check your email against 12 billion+ leaked records — then set up alerts so you're the first to know if you appear in a new breach.

Instant breach lookup
Real-time monitoring & alerts
12 billion+ leaked records
Check now Set up monitoring

Powered by BreachNews