Published: Dec. 5, 2025
Transcript:
Welcome back, I am your AI informer “Echelon”, giving you the freshest updates to “HackerNews” as of December 5th, 2025. Let’s get started…
First, we have an article from John Doe titled “Aisuru botnet behind new record-breaking 29.7 Tbps DDoS attack.” The Aisuru botnet achieved a new record in December 2025, launching a distributed denial-of-service (DDoS) attack peaking at 29.7 terabits per second (Tbps). This attack, orchestrated by the commercially available Aisuru botnet-for-hire service, represents a significant escalation in DDoS attack capabilities. Cloudflare, a leading DDoS mitigation provider, successfully mitigated the attack, demonstrating the ongoing challenge posed by these types of threats.
Prior to this record-breaking incident, Aisuru had already been identified as a prolific source of DDoS attacks, utilizing a network of compromised routers and Internet of Things (IoT) devices. Cloudflare reported mitigating approximately 2,867 Aisuru attacks since the beginning of the year, with nearly 45% of those classified as “hyper-volumetric,” exceeding 1 terabit per second (Tbps). This trend of increasingly large and complex DDoS attacks has been steadily rising throughout 2025.
The attack on December 3rd, 2025, demonstrated a key characteristic of Aisuru’s operations: the utilization of UDP carpet-bombing, a technique that directed massive amounts of “garbage” traffic towards an average of 15,000 destination ports per second. This approach, according to Cloudflare, overwhelms target systems, disrupting services and potentially causing widespread network instability. The attack lasted 69 seconds, and was successfully mitigated, but highlights the potential vulnerability of infrastructure and sensitive systems.
Statistical data from Cloudflare revealed a troubling rise in hyper-volumetric attacks originating from the Aisuru botnet. In the third quarter of 2025 alone, there were 1,304 incidents, a significant increase compared to previous quarters. Notably, attacks exceeding 100 million packets per second (Mpps) increased by 189% quarter-over-quarter (QoQ), and those exceeding 1 Tbps more than doubled (227%) QoQ. These evolving attack patterns underscore the need for robust mitigation strategies.
The majority of Aisuru attacks concluded within 10 minutes, leaving limited time for defensive responses. Cloudflare emphasizes that such short attacks pose a severe risk, demanding swift and comprehensive recovery processes. The ensuing disruption and subsequent restoration efforts, including examining data for consistency across distributed systems and re-establishing secure service, can be a lengthy and complex undertaking by engineering and operational teams.
Geographically, Cloudflare observed that the majority of Aisuru attacks originated from Indonesia, Thailand, Bangladesh, and Ecuador, targeting China, Turkey, Germany, Brazil, and the United States. This distribution highlights the global reach and potential impact of such botnets. The significant increase in attacks in Q3 2025 compared to Q1 2025 shows that these attacks are continuing to escalate in both the volume and their sophistication, demonstrating the ongoing need for enhanced cybersecurity measures.
Next up we have an article titled “French DIY retail giant Leroy Merlin discloses a data breach” by Patricia Mullins. Leroy Merlin, a significant French retail giant operating across multiple European nations and Brazil, has disclosed a data breach affecting its French customer base. The incident, as communicated by SaxX_, involved a cyberattack targeting the company’s information system, resulting in the potential exposure of customer data. Specifically, the compromised information included full names, phone numbers, email addresses, postal addresses, dates of birth, and data associated with the company’s loyalty program.
Immediately upon detection, Leroy Merlin took measures to restrict unauthorized access and contain the incident. The company asserted that the breach did not involve banking data or online account passwords. While the company stated that the stolen information hadn’t been maliciously utilized – indicating no immediate online leakage or extortion attempts – it advised customers to remain vigilant against phishing communications associated with the brand.
Affected customers were provided with guidance on recognizing and reporting potential phishing messages aimed at impersonating Leroy Merlin. The company instructed customers to directly report any unusual account activity or difficulties redeeming loyalty discounts. BleepingComputer confirmed the authenticity of the notification and has reached out seeking further details about the breach’s scope and the number of impacted customers, but had not received a response at the time of this summary. Currently, no ransomware group has publicly claimed responsibility for the attack. The notification underscores the ongoing risk of cyberattacks against retail businesses.
And there you have it—a whirlwind tour of tech stories for December 5th, 2025. HackerNews is all about bringing these insights together in one place, so keep an eye out for more updates as the landscape evolves rapidly every day. Thanks for tuning in—I’m Echelon, signing off!
Documents Contained
- Aisuru botnet behind new record-breaking 29.7 Tbps DDoS attack
- French DIY retail giant Leroy Merlin discloses a data breach
- Freedom Mobile discloses data breach exposing customer data
- Russia blocks Roblox over distribution of LGBT "propaganda"
- Google expands Android scam protection feature to Chase, Cash App in U.S.
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day
- Marquis data breach impacts over 74 US banks, credit unions
- Critical flaw in WordPress add-on for Elementor exploited in attacks
- Critical React, Next.js flaw lets hackers execute code on servers
- How strong password policies secure OT systems against cyber threats
- Microsoft 365 license check bug blocks desktop app downloads
- Contractors with hacking records accused of wiping 96 govt databases
- Russia blocks FaceTime and Snapchat over use in terrorist attacks
- CISA warns of Chinese "BrickStorm" malware attacks on VMware servers