Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts

0
Medium
Vulnerabilitywebdos
Published: Thu Dec 04 2025 (12/04/2025, 06:52:00 UTC)
Source: The Hacker News

Description

Cloudflare on Wednesday said it detected and mitigated the largest ever distributed denial-of-service (DDoS) attack that measured at 29.7 terabits per second (Tbps). The activity, the web infrastructure and security company said, originated from a DDoS botnet-for-hire known as AISURU, which has been linked to a number of hyper-volumetric DDoS attacks over the past year. The attack lasted for 69

AI-Powered Analysis

AILast updated: 12/04/2025, 07:31:01 UTC

Technical Analysis

The AISURU botnet, a massive distributed network of an estimated 1 to 4 million infected devices worldwide, has been responsible for launching the largest recorded DDoS attack to date, peaking at 29.7 Tbps. This attack was characterized as a UDP carpet-bombing assault, which bombarded approximately 15,000 destination ports per second with randomized packet attributes to bypass traditional mitigation techniques. The attack lasted 69 seconds and targeted unspecified victims, though AISURU has historically focused on telecommunications providers, gaming companies, hosting providers, and financial services. Cloudflare reported mitigating 2,867 AISURU attacks in 2025, including 1,304 hyper-volumetric attacks exceeding 1 Tbps in Q3 alone. The botnet's scale and sophistication have increased, with a 15% quarterly increase in total DDoS attacks and a 40% increase year-over-year. The attack vectors include both HTTP and network-layer attacks, with a significant rise in packet-per-second rates. AISURU's ability to randomize packet attributes and target multiple ports complicates detection and mitigation. The botnet-for-hire model lowers the barrier for attackers to launch large-scale attacks, increasing the threat landscape. The attack trends show a rise in targeting sectors critical to European economies, including telecommunications, financial services, and IT. The geographical distribution of attack sources includes several Asian countries, Russia, and Ukraine, with Europe being a frequent target region. The attack's scale and complexity represent a significant evolution in DDoS threats, challenging existing defense mechanisms and requiring advanced, adaptive mitigation strategies.

Potential Impact

European organizations face substantial risks from AISURU-driven DDoS attacks due to the botnet's targeting of sectors vital to the European economy, such as telecommunications, financial services, and IT infrastructure. Disruption of telecom services can affect millions of users and critical communications, while attacks on financial institutions can lead to service outages, loss of customer trust, and financial losses. The gaming and hosting sectors, also targeted by AISURU, are significant in Europe and can suffer reputational damage and revenue loss. The sheer volume of traffic generated by AISURU can overwhelm network infrastructure, leading to degraded service or complete outages. Given the botnet's ability to randomize attack vectors and ports, traditional mitigation tools may be less effective, increasing the risk of successful attacks. The rise in hyper-volumetric attacks also strains incident response resources and increases operational costs for defense. Additionally, the presence of infected hosts within Europe could complicate attribution and remediation efforts. The evolving sophistication of AISURU attacks necessitates continuous adaptation of defense postures to maintain service availability and protect critical infrastructure.

Mitigation Recommendations

European organizations should implement multi-layered DDoS defense strategies that include advanced traffic filtering capable of identifying and blocking UDP carpet-bombing and randomized packet attribute attacks. Deploying behavior-based anomaly detection systems can help identify unusual traffic patterns indicative of AISURU activity. Collaboration with upstream ISPs and cloud-based DDoS mitigation providers like Cloudflare is critical to absorb and filter large-scale volumetric attacks. Network segmentation and rate limiting on critical infrastructure can reduce the attack surface. Organizations should maintain updated incident response plans specifically addressing hyper-volumetric DDoS scenarios and conduct regular drills. Employing threat intelligence feeds to monitor AISURU botnet activity and indicators of compromise can enable proactive defense. Additionally, securing IoT devices and endpoints to reduce the pool of vulnerable hosts that AISURU exploits will help diminish the botnet's size over time. Finally, engaging in information sharing with industry peers and national cybersecurity centers can enhance collective defense capabilities.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://thehackernews.com/2025/12/record-297-tbps-ddos-attack-linked-to.html","fetched":true,"fetchedAt":"2025-12-04T07:30:39.961Z","wordCount":1075}

Threat ID: 693138a3a5c331a7096817c0

Added to database: 12/4/2025, 7:30:43 AM

Last enriched: 12/4/2025, 7:31:01 AM

Last updated: 12/4/2025, 9:11:07 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats