Early results came through cooperation among U.S., German, and Canadian agencies targeting major digital threats like Aisuru, KimWolf, JackSkid, and Mossad. Systems once used to manage attacks now stand inactive after teams disrupted central control points across borders. Instead of waiting, officials moved fast against links connecting malware operations – shutting down domains, servers, and coordination hubs.
One after another, these botnets launched countless DDoS assaults across the globe – some aimed at critical systems like those tied to the Department of Defense Information Network. With each move, authorities hoped to break contact between hacked gadgets and cybercriminals. That separation would weaken control over the infected machines.
One measure stands out when looking at recent cyber events – their sheer size. Not long ago, an assault tied to the Aisusu botnet hit speeds near 31.4 terabits each second, piling up 200 million queries in just one second.
Figures released by the U.S. Department of Justice show botnet systems sent vast numbers of attack directives – hundreds of thousands in total. Among them, Aisuru was responsible for exceeding 200,000 such signals.
From behind the scenes, access to hacked networks was turned into profit via a cybercrime rental setup, allowing third-party attackers to carry out intrusions, demand payments from targets, while knocking digital platforms offline.
Though this takedown deals a serious blow, specialists warn IoT-driven botnets remain an ongoing challenge in digital security. Still, new forms keep emerging despite progress made recently across enforcement efforts.
Read the original article:
