Aisuru botnet behind new record-breaking 29.7 Tbps DDoS attack
Recorded: Dec. 3, 2025, 4:02 p.m.
| Original | Summarized |
Aisuru botnet behind new record-breaking 29.7 Tbps DDoS attack News Featured Critical React, Next.js flaw lets hackers execute code on servers North Korea lures engineers to rent identities in fake IT worker scheme CISA warns of Chinese "BrickStorm" malware attacks on VMware servers Marquis data breach impacts over 74 US banks, credit unions Hackers are exploiting ArrayOS AG VPN flaw to plant webshells NCSC's ‘Proactive Notifications’ warns orgs of flaws in exposed devices Predator spyware uses new infection vector for zero-click attacks Russia blocks FaceTime and Snapchat for alleged use by terrorists Tutorials Latest How to access the Dark Web using the Tor Browser How to enable Kernel-mode Hardware-enforced Stack Protection in Windows 11 How to use the Windows Registry Editor How to backup and restore the Windows Registry How to start Windows in Safe Mode How to remove a Trojan, Virus, Worm, or other Malware How to show hidden files in Windows 7 How to see hidden files in Windows Webinars Latest Qualys BrowserCheck STOPDecrypter AuroraDecrypter FilesLockerDecrypter AdwCleaner ComboFix RKill Junkware Removal Tool Deals Categories eLearning IT Certification Courses Gear + Gadgets Security VPNs Popular Best VPNs How to change IP address Access the dark web safely Best VPN for YouTube Forums Virus Removal Guides HomeNewsSecurityAisuru botnet behind new record-breaking 29.7 Tbps DDoS attack Aisuru botnet behind new record-breaking 29.7 Tbps DDoS attack By Bill Toulas December 3, 2025 In just three months, the massive Aisuru botnet launched more than 1,300 distributed denial-of-service attacks, one of them setting a new record with a peak at 29.7 terabits per second. Graph from the record-breaking Aisuru attackSource: Cloudflare Hypervolumetric DDoS attacks per quarterSource: Cloudflare Number of DDoS attacks as of October 2025Source: Cloudflare Break down IAM silos like Bitpanda, KnowBe4, and PathAI Related Articles: Aisuru Bill Toulas Previous Article Post a Comment Community Rules You need to login in order to post a comment You may also like: Popular Stories ChatGPT is down worldwide, conversations disappeared for users Marquis data breach impacts over 74 US banks, credit unions North Korea lures engineers to rent identities in fake IT worker scheme Sponsor Posts Overdue a password health-check? Audit your Active Directory for free Empowering IT teams with intelligence driven cyber threat research. AI is a data-breach time bomb: Read the new report Hackers love the holidays! Share FREE Security Awareness Training to keep family & friends cyber-safe! Follow us: Main Sections News Community Forums Useful Resources Welcome Guide Company About BleepingComputer Terms of Use - Privacy Policy - Ethics Statement - Affiliate Disclosure Copyright @ 2003 - 2025 Bleeping Computer® LLC - All Rights Reserved Login Username Password Remember Me Sign in anonymously Sign in with Twitter Not a member yet? Register Now Help us understand the problem. What is going on with this comment? Spam Abusive or Harmful Inappropriate content Strong language Other Read our posting guidelinese to learn what content is prohibited. Submitting... |
The Aisuru botnet achieved a new record in December 2025, launching a distributed denial-of-service (DDoS) attack peaking at 29.7 terabits per second (Tbps). This attack, orchestrated by the commercially available Aisuru botnet-for-hire service, represents a significant escalation in DDoS attack capabilities. Cloudflare, a leading DDoS mitigation provider, successfully mitigated the attack, demonstrating the ongoing challenge posed by these types of threats. Prior to this record-breaking incident, Aisuru had already been identified as a prolific source of DDoS attacks, utilizing a network of compromised routers and Internet of Things (IoT) devices. Cloudflare reported mitigating approximately 2,867 Aisuru attacks since the beginning of the year, with nearly 45% of those classified as “hyper-volumetric,” exceeding 1 terabit per second (Tbps). This trend of increasingly large and complex DDoS attacks has been steadily rising throughout 2025. The attack on December 3rd, 2025, demonstrated a key characteristic of Aisuru’s operations: the utilization of UDP carpet-bombing, a technique that directed massive amounts of “garbage” traffic towards an average of 15,000 destination ports per second. This approach, according to Cloudflare, overwhelms target systems, disrupting services and potentially causing widespread network instability. The attack lasted 69 seconds, and was successfully mitigated, but highlights the potential vulnerability of infrastructure and sensitive systems. Statistical data from Cloudflare revealed a troubling rise in hyper-volumetric attacks originating from the Aisuru botnet. In the third quarter of 2025 alone, there were 1,304 incidents, a significant increase compared to previous quarters. Notably, attacks exceeding 100 million packets per second (Mpps) increased by 189% quarter-over-quarter (QoQ), and those exceeding 1 Tbps more than doubled (227%) QoQ. These evolving attack patterns underscore the need for robust mitigation strategies. The majority of Aisuru attacks concluded within 10 minutes, leaving limited time for defensive responses. Cloudflare emphasizes that such short attacks pose a severe risk, demanding swift and comprehensive recovery processes. The ensuing disruption and subsequent restoration efforts, including examining data for consistency across distributed systems and re-establishing secure service, can be a lengthy and complex undertaking by engineering and operational teams. Geographically, Cloudflare observed that the majority of Aisuru attacks originated from Indonesia, Thailand, Bangladesh, and Ecuador, targeting China, Turkey, Germany, Brazil, and the United States. This distribution highlights the global reach and potential impact of such botnets. The significant increase in attacks in Q3 2025 compared to Q1 2025 shows that these attacks are continuing to escalate in both the volume and their sophistication, demonstrating the ongoing need for enhanced cybersecurity measures. |