Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack

0
Medium
Vulnerabilitydos
Published: Thu Feb 05 2026 (02/05/2026, 17:25:00 UTC)
Source: The Hacker News

Description

The AISURU/Kimwolf botnet executed a record-breaking DDoS attack peaking at 31. 4 Tbps, lasting 35 seconds, marking a significant escalation in hyper-volumetric HTTP DDoS attacks. This botnet primarily compromises over 2 million off-brand Android devices, especially Android TVs, by leveraging residential proxy networks such as IPIDEA. The botnet's campaigns surged in late 2025, with attacks reaching unprecedented packet and request rates. Cloudflare and Google have actively disrupted parts of the botnet's infrastructure, including proxy networks and command-and-control domains. Telecommunications, IT, gaming, and software sectors are primary targets, with Germany and the UK among the most attacked European countries. The attack's scale and sophistication pose serious risks to service availability and network stability. Organizations relying solely on on-premise or traditional mitigation methods face challenges in defending against such hyper-volumetric attacks. The threat landscape indicates a growing trend of large-scale, automated DDoS attacks exploiting IoT and residential proxies. European defenders must prioritize advanced, scalable DDoS mitigation strategies and collaborate with global partners to counter these evolving threats.

AI-Powered Analysis

AILast updated: 02/06/2026, 08:51:49 UTC

Technical Analysis

The AISURU/Kimwolf botnet represents a highly sophisticated and large-scale distributed denial-of-service (DDoS) threat that has recently set records by launching an attack peaking at 31.4 Terabits per second (Tbps) over a 35-second duration. This botnet primarily consists of over 2 million compromised Android devices, notably off-brand Android TVs, which are co-opted through residential proxy networks such as IPIDEA. The botnet operators have employed a variety of infection vectors, including at least 600 trojanized Android applications embedding proxy SDKs and over 3,000 trojanized Windows binaries masquerading as legitimate software updates. These devices are then used to generate hyper-volumetric HTTP floods, with attack campaigns in late 2025 reaching averages of 3 billion packets per second (Bpps), 4 Tbps bandwidth, and 54 million requests per second (Mrps), with peaks even higher. The botnet's activity surged in Q4 2025, with a 40% increase in hyper-volumetric attacks compared to the previous quarter, and a 700% growth in attack size compared to late 2024. Cloudflare and Google have collaborated to disrupt the botnet's infrastructure by targeting the IPIDEA proxy network, suspending malicious domains, and limiting command-and-control capabilities. The attacks predominantly target telecommunications providers, IT companies, gaming, gambling, and software sectors. Geographically, Germany and the UK are among the most attacked European countries, reflecting their strategic importance and market penetration of affected sectors. The botnet's use of residential proxies and IoT devices complicates detection and mitigation, as traffic appears to originate from legitimate residential IP addresses, challenging traditional defense mechanisms. This evolution in DDoS tactics underscores the increasing sophistication and scale of cyber threats facing global networks.

Potential Impact

For European organizations, the AISURU/Kimwolf botnet's record-setting DDoS attacks pose significant risks to network availability, service continuity, and operational integrity, especially for telecommunications providers, IT firms, gaming companies, and software vendors. The hyper-volumetric nature of these attacks can overwhelm network infrastructure, leading to widespread service outages and degraded user experiences. The use of residential proxies and compromised IoT devices complicates attribution and mitigation, increasing the likelihood of collateral damage and false positives in traffic filtering. Critical infrastructure and service providers in Europe may face increased downtime, financial losses, reputational damage, and regulatory scrutiny due to service disruptions. The scale and frequency of attacks also strain existing mitigation resources, potentially requiring costly upgrades or shifts to cloud-based DDoS protection services. Furthermore, the geographic targeting of countries like Germany and the UK suggests a strategic focus on economically significant and technologically advanced markets, amplifying the potential impact on European digital ecosystems. The evolving threat landscape necessitates heightened vigilance and adaptive defense postures to maintain resilience against such large-scale volumetric attacks.

Mitigation Recommendations

European organizations should adopt multi-layered, scalable DDoS defense strategies that integrate cloud-based scrubbing services capable of absorbing hyper-volumetric traffic spikes beyond on-premise appliance capacities. Collaboration with upstream ISPs and global threat intelligence sharing platforms is essential to identify and block malicious traffic early. Deploying advanced traffic anomaly detection systems that leverage behavioral analytics can help distinguish legitimate from botnet-generated traffic, especially when residential proxies are involved. Organizations should also implement strict network segmentation and rate limiting to contain potential attack vectors. Regularly updating and securing IoT devices, particularly off-brand Android TVs and other consumer electronics, is critical to reducing the botnet's recruitment pool. Engaging with law enforcement and industry groups to support takedown efforts against proxy networks like IPIDEA can disrupt botnet command-and-control infrastructure. Finally, organizations should conduct regular incident response exercises focused on large-scale DDoS scenarios to ensure preparedness and rapid mitigation capabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://thehackernews.com/2026/02/aisurukimwolf-botnet-launches-record.html","fetched":true,"fetchedAt":"2026-02-06T08:51:08.032Z","wordCount":1223}

Threat ID: 6985ab7ef9fa50a62feebb42

Added to database: 2/6/2026, 8:51:10 AM

Last enriched: 2/6/2026, 8:51:49 AM

Last updated: 2/6/2026, 10:40:14 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats