HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔍 ThreatIntel

Global Law Enforcement Disrupts AISURU, Kimwolf, JackSkid IoT Botnets, Halting 30+ Tbps DDoS Campaigns

U.S., Canadian and German authorities dismantled the command‑and‑control infrastructure of four major IoT botnets, cutting off control of over 3 million hijacked devices that had been used for record‑breaking DDoS attacks. The takedown highlights the risk of third‑party IoT exposure for organizations relying on external vendors.

🛡️ LiveThreat™ Intelligence · 📅 March 20, 2026· 📰 securityaffairs.com
🟠
Severity
High
🔍
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
5 sector(s)
Actions
3 recommended
📰
Source
securityaffairs.com

Global Law Enforcement Disrupts AISURU, Kimwolf, JackSkid IoT Botnets, Halting 30+ Tbps DDoS Campaigns

What Happened — The U.S. Department of Justice, together with Canadian and German authorities and major tech firms, seized command‑and‑control (C2) servers used by the AISURU, Kimwolf, JackSkid and Mossad IoT botnets. The operation cut off control of more than 3 million compromised cameras, routers and other IoT devices that had been used to launch record‑breaking DDoS attacks of up to 31.4 Tbps.

Why It Matters for TPRM

  • Large‑scale DDoS‑for‑hire services can be rented through compromised third‑party IoT devices, exposing your supply chain to service disruption.
  • The takedown shows that botnet operators rely on weakly managed infrastructure that may be hosted by third‑party cloud or hosting providers you use.
  • Ongoing risk remains as new botnets emerge; continuous monitoring of vendor security posture is essential.

Who Is Affected — Organizations across all sectors that depend on internet‑facing services, especially those in technology/SaaS, manufacturing, energy/utilities, government, and any business that outsources IoT device management.

Recommended Actions

  • Review DDoS mitigation and incident‑response capabilities of your critical vendors.
  • Verify that vendors enforce strict IoT device hygiene and patching policies.
  • Incorporate botnet‑related threat intelligence into your third‑party risk assessments.

Technical Notes — The botnets leveraged compromised IoT firmware and default credentials to build a “cybercrime‑as‑a‑service” platform. Attacks were delivered via volumetric HTTP floods, reaching 31.4 Tbps in a 35‑second burst. No specific CVEs were disclosed; the primary vector was insecure IoT devices and poorly protected C2 infrastructure. Source: SecurityAffairs

📰 Original Source
https://securityaffairs.com/189710/cyber-crime/global-law-enforcement-operation-targets-aisuru-kimwolf-jackskid-botnet-operators.html

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.