Aisuru botnet behind new record-breaking 29.7 Tbps DDoS attack
Recorded: Dec. 3, 2025, 4:02 p.m.
| Original | Summarized |
Aisuru botnet behind new record-breaking 29.7 Tbps DDoS attack News Featured North Korea lures engineers to rent identities in fake IT worker scheme Fake Calendly invites spoof top brands to hijack ad manager accounts University of Pennsylvania confirms new data breach after Oracle hack Google fixes two Android zero days exploited in attacks, 107 flaws Deep dive into DragonForce ransomware and its Scattered Spider connection Aisuru botnet behind new record-breaking 29.7 Tbps DDoS attack University of Phoenix discloses data breach after Oracle hack Score 65% off a Microsoft Surface with impressive performance Tutorials Latest How to access the Dark Web using the Tor Browser How to enable Kernel-mode Hardware-enforced Stack Protection in Windows 11 How to use the Windows Registry Editor How to backup and restore the Windows Registry How to start Windows in Safe Mode How to remove a Trojan, Virus, Worm, or other Malware How to show hidden files in Windows 7 How to see hidden files in Windows Webinars Latest Qualys BrowserCheck STOPDecrypter AuroraDecrypter FilesLockerDecrypter AdwCleaner ComboFix RKill Junkware Removal Tool Deals Categories eLearning IT Certification Courses Gear + Gadgets Security VPNs Popular Best VPNs How to change IP address Access the dark web safely Best VPN for YouTube Forums Startup Database HomeNewsSecurityAisuru botnet behind new record-breaking 29.7 Tbps DDoS attack Aisuru botnet behind new record-breaking 29.7 Tbps DDoS attack By Bill Toulas December 3, 2025 In just three months, the massive Aisuru botnet launched more than 1,300 distributed denial-of-service attacks, one of them setting a new record with a peak at 29.7 terabits per second. Graph from the record-breaking Aisuru attackSource: Cloudflare Hypervolumetric DDoS attacks per quarterSource: Cloudflare Number of DDoS attacks as of October 2025Source: Cloudflare Break down IAM silos like Bitpanda, KnowBe4, and PathAI Related Articles: Aisuru Bill Toulas Previous Article Post a Comment Community Rules You need to login in order to post a comment You may also like: Popular Stories ChatGPT is down worldwide, conversations disappeared for users Glassworm malware returns in third wave of malicious VS Code packages Google deletes X post after getting caught using a ‘stolen’ AI recipe infographic Sponsor Posts Empowering IT teams with intelligence driven cyber threat research. AI is a data-breach time bomb: Read the new report Hackers love the holidays! Share FREE Security Awareness Training to keep family & friends cyber-safe! Follow us: Main Sections News Community Forums Useful Resources Welcome Guide Company About BleepingComputer Terms of Use - Privacy Policy - Ethics Statement - Affiliate Disclosure Copyright @ 2003 - 2025 Bleeping Computer® LLC - All Rights Reserved Login Username Password Remember Me Sign in anonymously Sign in with Twitter Not a member yet? Register Now Help us understand the problem. What is going on with this comment? Spam Abusive or Harmful Inappropriate content Strong language Other Read our posting guidelinese to learn what content is prohibited. Submitting... |
Aisuru, a for-hire botnet service, achieved a new record in December 2025 with a peak Distributed Denial-of-Service (DDoS) attack volume of 29.7 terabits per second (Tbps). This attack, orchestrated by the botnet, highlights the escalating sophistication and scale of cyber threats. According to Cloudflare, which played a crucial role in mitigating the attack, Aisuru operates between one and four million compromised hosts globally, utilizing routers and Internet of Things (IoT) devices acquired through known vulnerabilities or brute-force credentialing. The incident occurred as part of a broader trend demonstrating a rise in hyper-volumetric DDoS attacks attributed to Aisuru. Specifically, in the third quarter of 2025, the botnet launched 1,304 incidents exceeding this threshold, representing a significant increase compared to previous periods. Cloudflare’s analysis indicated that attacks exceeding 100 million packets per second (Mpps) increased by 189% quarter-over-quarter (QoQ), while those exceeding 1 terabit per second (Tbps) more than doubled (227%) QoQ. The record-breaking attack itself lasted 69 seconds, deploying UDP "carpet-bombing" to direct a massive number of “garbage” traffic—an average of 15,000 destination ports per second. This demonstrates a targeted approach aimed at overwhelming target systems. The company pinpointed Indonesia, Thailand, Bangladesh, and Ecuador as leading sources of the Aisuru botnet’s attacks, with the primary targets being China, Turkey, Germany, Brazil, and the United States. Cloudflare reported mitigating an average of 3,780 DDoS attacks each hour during this period, and the attacks frequently ended within 10 minutes, providing limited time for defenders to respond. This underscores the urgency of proactive defenses and rapid incident response capabilities. The surge in Aisuru’s activity is linked to the botnet’s growing portfolio of targets, encompassing gaming companies, hosting providers, telecommunications entities, and financial services organizations. The increased scale of these attacks poses a heightened risk to critical infrastructure, healthcare services, emergency response systems, and military networks. The record-breaking 29.7 Tbps attack, a key indicator of the evolving threat landscape, emphasized the vulnerabilities inherent in poorly secured IoT devices and the importance of robust DDoS mitigation strategies, alongside rapid response systems. Aisuru’s operations exemplify a contemporary cybercrime trend, posing a continuous and significant risk. |