Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
Cloudflare on Wednesday said it detected and mitigated the largest ever distributed denial-of-service (DDoS) attack that measured at 29.7 terabits per second (Tbps). The activity, the web infrastructure and security company said, originated from a DDoS botnet-for-hire known as AISURU, which has been linked to a number of hyper-volumetric DDoS attacks over the past year. The attack lasted for 69
AI Analysis
Technical Summary
The AISURU botnet, a massive distributed network of an estimated 1 to 4 million infected devices worldwide, has been responsible for launching the largest recorded DDoS attack to date, peaking at 29.7 Tbps. This attack was characterized as a UDP carpet-bombing assault, which bombarded approximately 15,000 destination ports per second with randomized packet attributes to bypass traditional mitigation techniques. The attack lasted 69 seconds and targeted unspecified victims, though AISURU has historically focused on telecommunications providers, gaming companies, hosting providers, and financial services. Cloudflare reported mitigating 2,867 AISURU attacks in 2025, including 1,304 hyper-volumetric attacks exceeding 1 Tbps in Q3 alone. The botnet's scale and sophistication have increased, with a 15% quarterly increase in total DDoS attacks and a 40% increase year-over-year. The attack vectors include both HTTP and network-layer attacks, with a significant rise in packet-per-second rates. AISURU's ability to randomize packet attributes and target multiple ports complicates detection and mitigation. The botnet-for-hire model lowers the barrier for attackers to launch large-scale attacks, increasing the threat landscape. The attack trends show a rise in targeting sectors critical to European economies, including telecommunications, financial services, and IT. The geographical distribution of attack sources includes several Asian countries, Russia, and Ukraine, with Europe being a frequent target region. The attack's scale and complexity represent a significant evolution in DDoS threats, challenging existing defense mechanisms and requiring advanced, adaptive mitigation strategies.
Potential Impact
European organizations face substantial risks from AISURU-driven DDoS attacks due to the botnet's targeting of sectors vital to the European economy, such as telecommunications, financial services, and IT infrastructure. Disruption of telecom services can affect millions of users and critical communications, while attacks on financial institutions can lead to service outages, loss of customer trust, and financial losses. The gaming and hosting sectors, also targeted by AISURU, are significant in Europe and can suffer reputational damage and revenue loss. The sheer volume of traffic generated by AISURU can overwhelm network infrastructure, leading to degraded service or complete outages. Given the botnet's ability to randomize attack vectors and ports, traditional mitigation tools may be less effective, increasing the risk of successful attacks. The rise in hyper-volumetric attacks also strains incident response resources and increases operational costs for defense. Additionally, the presence of infected hosts within Europe could complicate attribution and remediation efforts. The evolving sophistication of AISURU attacks necessitates continuous adaptation of defense postures to maintain service availability and protect critical infrastructure.
Mitigation Recommendations
European organizations should implement multi-layered DDoS defense strategies that include advanced traffic filtering capable of identifying and blocking UDP carpet-bombing and randomized packet attribute attacks. Deploying behavior-based anomaly detection systems can help identify unusual traffic patterns indicative of AISURU activity. Collaboration with upstream ISPs and cloud-based DDoS mitigation providers like Cloudflare is critical to absorb and filter large-scale volumetric attacks. Network segmentation and rate limiting on critical infrastructure can reduce the attack surface. Organizations should maintain updated incident response plans specifically addressing hyper-volumetric DDoS scenarios and conduct regular drills. Employing threat intelligence feeds to monitor AISURU botnet activity and indicators of compromise can enable proactive defense. Additionally, securing IoT devices and endpoints to reduce the pool of vulnerable hosts that AISURU exploits will help diminish the botnet's size over time. Finally, engaging in information sharing with industry peers and national cybersecurity centers can enhance collective defense capabilities.
Affected Countries
Germany, United Kingdom, France, Italy, Netherlands, Spain, Poland, Sweden, Belgium, Finland
Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
Description
Cloudflare on Wednesday said it detected and mitigated the largest ever distributed denial-of-service (DDoS) attack that measured at 29.7 terabits per second (Tbps). The activity, the web infrastructure and security company said, originated from a DDoS botnet-for-hire known as AISURU, which has been linked to a number of hyper-volumetric DDoS attacks over the past year. The attack lasted for 69
AI-Powered Analysis
Technical Analysis
The AISURU botnet, a massive distributed network of an estimated 1 to 4 million infected devices worldwide, has been responsible for launching the largest recorded DDoS attack to date, peaking at 29.7 Tbps. This attack was characterized as a UDP carpet-bombing assault, which bombarded approximately 15,000 destination ports per second with randomized packet attributes to bypass traditional mitigation techniques. The attack lasted 69 seconds and targeted unspecified victims, though AISURU has historically focused on telecommunications providers, gaming companies, hosting providers, and financial services. Cloudflare reported mitigating 2,867 AISURU attacks in 2025, including 1,304 hyper-volumetric attacks exceeding 1 Tbps in Q3 alone. The botnet's scale and sophistication have increased, with a 15% quarterly increase in total DDoS attacks and a 40% increase year-over-year. The attack vectors include both HTTP and network-layer attacks, with a significant rise in packet-per-second rates. AISURU's ability to randomize packet attributes and target multiple ports complicates detection and mitigation. The botnet-for-hire model lowers the barrier for attackers to launch large-scale attacks, increasing the threat landscape. The attack trends show a rise in targeting sectors critical to European economies, including telecommunications, financial services, and IT. The geographical distribution of attack sources includes several Asian countries, Russia, and Ukraine, with Europe being a frequent target region. The attack's scale and complexity represent a significant evolution in DDoS threats, challenging existing defense mechanisms and requiring advanced, adaptive mitigation strategies.
Potential Impact
European organizations face substantial risks from AISURU-driven DDoS attacks due to the botnet's targeting of sectors vital to the European economy, such as telecommunications, financial services, and IT infrastructure. Disruption of telecom services can affect millions of users and critical communications, while attacks on financial institutions can lead to service outages, loss of customer trust, and financial losses. The gaming and hosting sectors, also targeted by AISURU, are significant in Europe and can suffer reputational damage and revenue loss. The sheer volume of traffic generated by AISURU can overwhelm network infrastructure, leading to degraded service or complete outages. Given the botnet's ability to randomize attack vectors and ports, traditional mitigation tools may be less effective, increasing the risk of successful attacks. The rise in hyper-volumetric attacks also strains incident response resources and increases operational costs for defense. Additionally, the presence of infected hosts within Europe could complicate attribution and remediation efforts. The evolving sophistication of AISURU attacks necessitates continuous adaptation of defense postures to maintain service availability and protect critical infrastructure.
Mitigation Recommendations
European organizations should implement multi-layered DDoS defense strategies that include advanced traffic filtering capable of identifying and blocking UDP carpet-bombing and randomized packet attribute attacks. Deploying behavior-based anomaly detection systems can help identify unusual traffic patterns indicative of AISURU activity. Collaboration with upstream ISPs and cloud-based DDoS mitigation providers like Cloudflare is critical to absorb and filter large-scale volumetric attacks. Network segmentation and rate limiting on critical infrastructure can reduce the attack surface. Organizations should maintain updated incident response plans specifically addressing hyper-volumetric DDoS scenarios and conduct regular drills. Employing threat intelligence feeds to monitor AISURU botnet activity and indicators of compromise can enable proactive defense. Additionally, securing IoT devices and endpoints to reduce the pool of vulnerable hosts that AISURU exploits will help diminish the botnet's size over time. Finally, engaging in information sharing with industry peers and national cybersecurity centers can enhance collective defense capabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2025/12/record-297-tbps-ddos-attack-linked-to.html","fetched":true,"fetchedAt":"2025-12-04T07:30:39.961Z","wordCount":1075}
Threat ID: 693138a3a5c331a7096817c0
Added to database: 12/4/2025, 7:30:43 AM
Last enriched: 12/4/2025, 7:31:01 AM
Last updated: 12/4/2025, 9:11:07 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12826: CWE-862 Missing Authorization in webdevstudios Custom Post Type UI
MediumCVE-2025-12782: CWE-862 Missing Authorization in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder
MediumCVE-2025-13513: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codejunkie Clik stats
MediumCVE-2025-11379: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in roselldk WebP Express
MediumHow I Reverse Engineered a Billion-Dollar Legal AI Tool and Found 100k+ Confidential Files
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.