US seizes domains and infrastructure used in sprawling botnet campaigns

US seizes domains and infrastructure used in sprawling botnet campaigns

Summary

Law enforcement in the United States, Germany and Canada executed a coordinated disruption operation that seized domains, virtual servers and other infrastructure used by four large botnets: Aisuru, KimWolf, JackSkid and Mossad. The networks comprised roughly three million compromised devices worldwide — many IoT devices such as cameras, routers and video recorders — including hundreds of thousands in the US. Prosecutors say the botnets issued hundreds of thousands of DDoS commands and were used to launch crippling distributed denial-of-service attacks, demand ransoms, and mask other criminal activity.

Key Points

  • Operation involved US, German and Canadian authorities and dozens of tech companies; multiple US-registered domains and servers were seized under warrants.
  • The four botnets controlled about three million devices globally, with hundreds of thousands inside the United States.
  • Reported DDoS command counts: Aisuru 200,000+, KimWolf 25,000+, JackSkid 90,000+, Mossad 1,000+.
  • Operators sold access to compromised devices to criminals who used them for DDoS attacks, ransom demands and to conceal other crimes.
  • KimWolf and JackSkid notably targeted devices behind firewalls and residential proxy networks, gaining footholds in home networks and streaming devices.
  • Cloudflare and others warned these botnets could cripple critical infrastructure and overwhelm legacy DDoS protections.
  • Amazon assisted in identifying command-and-control infrastructure and reverse engineering the malware; no arrests were publicly reported.

Context and relevance

This takedown is part of an ongoing international trend of coordinated actions against botnets that abuse IoT devices. The scale — millions of devices — highlights persistent vulnerabilities in consumer hardware and the growing use of botnets to amplify attacks or hide malicious activity. For organisations reliant on internet-facing services, the action underlines the importance of resilient DDoS defences and partnership with industry for threat disruption.

Why should I read this?

Short version: this shows how junk devices in people’s homes can be weaponised into multi-million-node cyber armies. If you run any network, own smart gadgets, or work in security, it’s worth a quick look — it’s a reminder that weak IoT kit and poor patching have real-world costs.

Author take

Punchy: A big, coordinated win for law enforcement — but not the end of the story. The operation disrupts command infrastructure and buys time; the underlying vulnerabilities and marketplaces selling access still exist. Read the detail if you want the nuts and bolts; skim if you just want the headline.

Source

Source: https://therecord.media/us-seizes-botnet-infrastructure-four-large-networks