AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack
The distributed denial-of-service (DDoS) botnet known as AISURU/Kimwolf has been attributed to a record-setting attack that peaked at 31.4 Terabits per second (Tbps) and lasted only 35 seconds. Cloudflare, which automatically detected and mitigated the activity, said it's part of a growing number of hyper-volumetric HTTP DDoS attacks mounted by the botnet in the fourth quarter of 2025. The
AI Analysis
Technical Summary
The AISURU/Kimwolf botnet represents a highly sophisticated and large-scale distributed denial-of-service (DDoS) threat that has recently set records by launching an attack peaking at 31.4 Terabits per second (Tbps) over a 35-second duration. This botnet primarily consists of over 2 million compromised Android devices, notably off-brand Android TVs, which are co-opted through residential proxy networks such as IPIDEA. The botnet operators have employed a variety of infection vectors, including at least 600 trojanized Android applications embedding proxy SDKs and over 3,000 trojanized Windows binaries masquerading as legitimate software updates. These devices are then used to generate hyper-volumetric HTTP floods, with attack campaigns in late 2025 reaching averages of 3 billion packets per second (Bpps), 4 Tbps bandwidth, and 54 million requests per second (Mrps), with peaks even higher. The botnet's activity surged in Q4 2025, with a 40% increase in hyper-volumetric attacks compared to the previous quarter, and a 700% growth in attack size compared to late 2024. Cloudflare and Google have collaborated to disrupt the botnet's infrastructure by targeting the IPIDEA proxy network, suspending malicious domains, and limiting command-and-control capabilities. The attacks predominantly target telecommunications providers, IT companies, gaming, gambling, and software sectors. Geographically, Germany and the UK are among the most attacked European countries, reflecting their strategic importance and market penetration of affected sectors. The botnet's use of residential proxies and IoT devices complicates detection and mitigation, as traffic appears to originate from legitimate residential IP addresses, challenging traditional defense mechanisms. This evolution in DDoS tactics underscores the increasing sophistication and scale of cyber threats facing global networks.
Potential Impact
For European organizations, the AISURU/Kimwolf botnet's record-setting DDoS attacks pose significant risks to network availability, service continuity, and operational integrity, especially for telecommunications providers, IT firms, gaming companies, and software vendors. The hyper-volumetric nature of these attacks can overwhelm network infrastructure, leading to widespread service outages and degraded user experiences. The use of residential proxies and compromised IoT devices complicates attribution and mitigation, increasing the likelihood of collateral damage and false positives in traffic filtering. Critical infrastructure and service providers in Europe may face increased downtime, financial losses, reputational damage, and regulatory scrutiny due to service disruptions. The scale and frequency of attacks also strain existing mitigation resources, potentially requiring costly upgrades or shifts to cloud-based DDoS protection services. Furthermore, the geographic targeting of countries like Germany and the UK suggests a strategic focus on economically significant and technologically advanced markets, amplifying the potential impact on European digital ecosystems. The evolving threat landscape necessitates heightened vigilance and adaptive defense postures to maintain resilience against such large-scale volumetric attacks.
Mitigation Recommendations
European organizations should adopt multi-layered, scalable DDoS defense strategies that integrate cloud-based scrubbing services capable of absorbing hyper-volumetric traffic spikes beyond on-premise appliance capacities. Collaboration with upstream ISPs and global threat intelligence sharing platforms is essential to identify and block malicious traffic early. Deploying advanced traffic anomaly detection systems that leverage behavioral analytics can help distinguish legitimate from botnet-generated traffic, especially when residential proxies are involved. Organizations should also implement strict network segmentation and rate limiting to contain potential attack vectors. Regularly updating and securing IoT devices, particularly off-brand Android TVs and other consumer electronics, is critical to reducing the botnet's recruitment pool. Engaging with law enforcement and industry groups to support takedown efforts against proxy networks like IPIDEA can disrupt botnet command-and-control infrastructure. Finally, organizations should conduct regular incident response exercises focused on large-scale DDoS scenarios to ensure preparedness and rapid mitigation capabilities.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy
AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack
Description
The distributed denial-of-service (DDoS) botnet known as AISURU/Kimwolf has been attributed to a record-setting attack that peaked at 31.4 Terabits per second (Tbps) and lasted only 35 seconds. Cloudflare, which automatically detected and mitigated the activity, said it's part of a growing number of hyper-volumetric HTTP DDoS attacks mounted by the botnet in the fourth quarter of 2025. The
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The AISURU/Kimwolf botnet represents a highly sophisticated and large-scale distributed denial-of-service (DDoS) threat that has recently set records by launching an attack peaking at 31.4 Terabits per second (Tbps) over a 35-second duration. This botnet primarily consists of over 2 million compromised Android devices, notably off-brand Android TVs, which are co-opted through residential proxy networks such as IPIDEA. The botnet operators have employed a variety of infection vectors, including at least 600 trojanized Android applications embedding proxy SDKs and over 3,000 trojanized Windows binaries masquerading as legitimate software updates. These devices are then used to generate hyper-volumetric HTTP floods, with attack campaigns in late 2025 reaching averages of 3 billion packets per second (Bpps), 4 Tbps bandwidth, and 54 million requests per second (Mrps), with peaks even higher. The botnet's activity surged in Q4 2025, with a 40% increase in hyper-volumetric attacks compared to the previous quarter, and a 700% growth in attack size compared to late 2024. Cloudflare and Google have collaborated to disrupt the botnet's infrastructure by targeting the IPIDEA proxy network, suspending malicious domains, and limiting command-and-control capabilities. The attacks predominantly target telecommunications providers, IT companies, gaming, gambling, and software sectors. Geographically, Germany and the UK are among the most attacked European countries, reflecting their strategic importance and market penetration of affected sectors. The botnet's use of residential proxies and IoT devices complicates detection and mitigation, as traffic appears to originate from legitimate residential IP addresses, challenging traditional defense mechanisms. This evolution in DDoS tactics underscores the increasing sophistication and scale of cyber threats facing global networks.
Potential Impact
For European organizations, the AISURU/Kimwolf botnet's record-setting DDoS attacks pose significant risks to network availability, service continuity, and operational integrity, especially for telecommunications providers, IT firms, gaming companies, and software vendors. The hyper-volumetric nature of these attacks can overwhelm network infrastructure, leading to widespread service outages and degraded user experiences. The use of residential proxies and compromised IoT devices complicates attribution and mitigation, increasing the likelihood of collateral damage and false positives in traffic filtering. Critical infrastructure and service providers in Europe may face increased downtime, financial losses, reputational damage, and regulatory scrutiny due to service disruptions. The scale and frequency of attacks also strain existing mitigation resources, potentially requiring costly upgrades or shifts to cloud-based DDoS protection services. Furthermore, the geographic targeting of countries like Germany and the UK suggests a strategic focus on economically significant and technologically advanced markets, amplifying the potential impact on European digital ecosystems. The evolving threat landscape necessitates heightened vigilance and adaptive defense postures to maintain resilience against such large-scale volumetric attacks.
Mitigation Recommendations
European organizations should adopt multi-layered, scalable DDoS defense strategies that integrate cloud-based scrubbing services capable of absorbing hyper-volumetric traffic spikes beyond on-premise appliance capacities. Collaboration with upstream ISPs and global threat intelligence sharing platforms is essential to identify and block malicious traffic early. Deploying advanced traffic anomaly detection systems that leverage behavioral analytics can help distinguish legitimate from botnet-generated traffic, especially when residential proxies are involved. Organizations should also implement strict network segmentation and rate limiting to contain potential attack vectors. Regularly updating and securing IoT devices, particularly off-brand Android TVs and other consumer electronics, is critical to reducing the botnet's recruitment pool. Engaging with law enforcement and industry groups to support takedown efforts against proxy networks like IPIDEA can disrupt botnet command-and-control infrastructure. Finally, organizations should conduct regular incident response exercises focused on large-scale DDoS scenarios to ensure preparedness and rapid mitigation capabilities.
Affected Countries
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2026/02/aisurukimwolf-botnet-launches-record.html","fetched":true,"fetchedAt":"2026-02-06T08:51:08.032Z","wordCount":1223}
Threat ID: 6985ab7ef9fa50a62feebb42
Added to database: 2/6/2026, 8:51:10 AM
Last enriched: 2/6/2026, 8:51:49 AM
Last updated: 3/22/2026, 8:50:14 PM
Views: 87
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.