Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

7 npm packages use Adspect cloaking to lure victims to cryptocurrency scam pages

Turning peak pressure into cyber resilience

UK partnership to strengthen AI-powered battery development

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Microsoft mitigates record 5.72 Tbps DDoS attack by AISURU botnet
Identity

Microsoft mitigates record 5.72 Tbps DDoS attack by AISURU botnet

userBy userNovember 18, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

November 18, 2025Ravi LakshmananIoT Security/Botnet

Microsoft on Monday said it automatically detected and neutralized a distributed denial of service (DDoS) attack that targeted a single endpoint in Australia. The scale of the attack was 5.72 terabits per second (Tbps), or approximately 3.64 billion packets per second (pps).

The tech giant said this was the largest DDoS attack ever observed on the cloud, and that it originated from a TurboMirai-class Internet of Things (IoT botnet known as AISURU; it is currently unclear who was targeted in the attack).

“This attack involved a very high-velocity UDP flood targeting specific public IP addresses and was launched from more than 500,000 source IPs across various geographies,” said Microsoft’s Sean Whalen.

DFIR retainer service

“These sudden UDP bursts minimized source spoofing and used random source ports, simplifying tracebacks and making provider enforcement easier.”

According to QiAnXin XLab data, the AISURU botnet has nearly 300,000 infected devices, most of which are routers, security cameras, and DVR systems. This is believed to be some of the largest DDoS attacks ever recorded. In a report published last month, NETSCOUT classified DDoS-for-hire botnets as operating against restricted customers.

“The carriers are reportedly taking precautions to avoid attacks on government, law enforcement, military, and other national security assets,” the company said. “Most of the Aisuru attacks observed to date appear to be related to online gaming.”

Beyond DDoS attacks of over 20Tbps, botnets like AISURU also enable versatile capabilities that facilitate other illegal activities such as credential stuffing, artificial intelligence (AI) web scraping, spamming, and phishing. AISURU also incorporates housing agency services.

“Attackers are scaling to match the internet itself. As fiber-to-the-home speeds increase and IoT devices become more powerful, the baseline for attack size continues to rise,” Microsoft said.

The disclosure came as NETSCOUT detailed another TurboMirai botnet called Eleven 11 (also known as RapperBot) that was estimated to have launched approximately 3,600 DDoS attacks utilizing hijacked IoT devices between late February and August 2025, around the same time authorities revealed the botnet’s arrest and dismantling.

CIS build kit

Some of the command and control (C2) servers associated with this botnet are registered in the “.libre” top-level domain (TLD). It is part of OpenNIC, an alternative DNS root that operates independently of ICANN and has been adopted by other DDoS botnets such as CatDDoS and Fodcha.

“Although the botnet is likely no longer operational, compromised devices remain vulnerable,” the report said. “It appears to be only a matter of time before the host is hijacked again and conscripted as a compromised node in the next botnet.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUKHSA revives Andi Biotic campaign to raise awareness of AMR
Next Article UK partnership to strengthen AI-powered battery development
user
  • Website

Related Posts

7 npm packages use Adspect cloaking to lure victims to cryptocurrency scam pages

November 18, 2025

Google issues security fix for actively exploited zero-day vulnerability in Chrome V8

November 18, 2025

New Assessment ClickFix Campaign Offers Amatera Stealer and NetSupport RAT

November 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

7 npm packages use Adspect cloaking to lure victims to cryptocurrency scam pages

Turning peak pressure into cyber resilience

UK partnership to strengthen AI-powered battery development

Microsoft mitigates record 5.72 Tbps DDoS attack by AISURU botnet

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.