US Dismantles Four Global Botnets Controlling Three Million Devices

US Dismantles Four Global Botnets Controlling Three Million Devices

The United States Department of Justice recently orchestrated a comprehensive international enforcement operation that successfully crippled the command-and-control infrastructure supporting four of the most destructive Internet of Things botnets ever documented in the digital landscape. Known as AISURU, Kimwolf, JackSkid, and Mossad, these networks were systematically dismantled through a coordinated effort involving authorities from Canada and Germany alongside major global technology leaders. This operation effectively neutralized approximately three million compromised devices that had been conscripted into a massive digital army capable of launching catastrophic distributed denial-of-service attacks. The removal of this infrastructure represents a critical milestone in 2026, marking a significant victory against the rising tide of hyper-volumetric threats that have increasingly targeted the core foundations of the modern internet. By striking at the heart of these criminal operations, law enforcement has temporarily halted the progression of a network that posed a persistent danger to international commerce and communication security.

The Massive Scale of Recent Network Disruptions

The intensity of the attacks generated by these specific botnets reached unprecedented levels, with data volumes that threatened to overwhelm even the most robust infrastructure of the current year. In late 2025, security researchers observed a massive strike attributed to the AISURU and Kimwolf networks that peaked at a staggering 31.4 terabits per second, a figure that highlights the terrifying potential of modern IoT exploitation. To visualize such a massive influx of traffic, one might consider the entire digital activity of the populations of Germany, Spain, and the United Kingdom combined, all attempting to access a single web server at the exact same moment. Such hyper-volumetric events are not merely inconveniences; they are precision strikes designed to shatter the mitigation capabilities of high-capacity cloud providers. These events utilize billions of packets per second and millions of requests per second to create a digital deluge that can isolate entire regions from the global network.

Beyond the raw throughput of 31.4 terabits per second, these networks demonstrated a sophisticated ability to sustain high-pressure traffic loads that averaged around 4 terabits per second across multiple coordinated campaigns. This constant pressure exerted significant strain on Internet Service Providers and their downstream customers, often leading to severe service degradation that affected critical public and private sector functions. The technological evolution of these botnets allowed them to bypass traditional defensive perimeters that were previously considered sufficient against earlier iterations of malware. By flooding targets with an overwhelming number of requests, the botnet operators could effectively silence websites and online services that did not have access to elite-level mitigation tools. This capability transformed the botnets into powerful tools for extortion and political disruption, making their recent neutralization a high priority for international security agencies.

Sophisticated Tactics in Device Infection and Control

A deep technical analysis of the investigation reveals a fundamental shift in how modern botnets acquire new victims compared to the older methodologies seen in earlier years. While historical threats like Mirai primarily relied on scanning the open internet for devices with weak default passwords, the AISURU and Kimwolf variants exploited more subtle vulnerabilities within residential proxy networks. By infiltrating household environments through off-brand Android smart TVs, digital video recorders, and set-top boxes, these malicious actors managed to bypass traditional firewalls that typically guard home routers against external intrusion. This strategy allowed the criminals to leverage the legitimate IP addresses of residential users, making the resulting traffic appear more authentic and significantly harder to filter. This exploitation of the residential proxy ecosystem underscores a growing vulnerability in the consumer electronics market where security features are often overlooked in favor of lower manufacturing costs.

These compromised electronics were integrated into a sophisticated “cybercrime-as-a-service” model where access to the infected hardware was sold to various threat actors for targeted strikes. The JackSkid botnet, in particular, exhibited explosive growth throughout early 2026, reaching a peak of approximately 250,000 daily victims in March of this year. Meanwhile, the Kimwolf variant specifically targeted the Android ecosystem, eventually controlling over two million devices globally, including hundreds of thousands of units located within the borders of the United States. This domestic presence illustrates that even well-developed internet infrastructures are not immune to the proliferation of infected IoT devices. The decentralized nature of these networks meant that the command-and-control servers had to be precisely identified and isolated to prevent the botnet from simply shifting its management to new hosts. The success of the operation relied on understanding these complex infection vectors.

Collaborative Defense and the Human Element of Crime

The investigation into the masterminds behind these operations led to a startling revelation regarding the age and background of the primary suspects involved in managing these global networks. Canadian authorities traced the administration of the Kimwolf botnet to a 23-year-old individual who had allegedly managed vast digital infrastructures from his residence. Similarly, a 15-year-old resident of Germany was identified as a key figure in the technical maintenance of the AISURU network. These findings highlight a recurring trend in modern cybercrime where young, technically proficient individuals are capable of causing massive international disruption from their bedrooms. While no formal arrests were announced immediately following the official statement, the identification of these individuals serves as a deterrent to others who might view botnet management as a low-risk endeavor. The ability of such young actors to command millions of devices suggests that the barrier to entry has lowered significantly.

The dismantling of these four botnets was made possible only through an unprecedented level of synergy between government agencies and a coalition of private-sector technology giants. Companies such as Google, Amazon Web Services, Cloudflare, and Akamai provided critical data, including sample hashes and decrypted command-and-control configurations, which were essential for mapping the network. A decisive role was played by security researchers at Lumen’s Black Lotus Labs, who utilized their visibility into global internet traffic to “null-route” nearly 1,000 command-and-control servers used by the criminal groups. This action effectively severed the connection between the botnet operators and the millions of infected devices, preventing any further attack commands from being executed. This level of collaboration is now seen as the only viable model for combating botnets that have proven to be incredibly resilient and capable of rapid regrowth through the sharing of real-time intelligence across the industry.

Strengthening Global Infrastructure Against Future Threats

The successful disruption of the AISURU, Kimwolf, JackSkid, and Mossad botnets provided vital breathing room for the global digital economy and demonstrated the power of international legal cooperation. In the aftermath of the operation, security professionals moved to analyze the remaining vulnerabilities to ensure that similar networks could not be easily rebuilt on the same foundations. Law enforcement agencies in Canada and Germany worked closely with American counterparts to secure the digital evidence necessary for future prosecutions and to better understand the cross-border nature of these crimes. The operation proved that when the private sector and government agencies align their resources, they can effectively dismantle even the most complex and distributed criminal infrastructures. However, the victory also underscored the reality that the underlying flaws in millions of off-brand IoT devices remain a persistent risk. These devices continued to exist in a state of vulnerability awaiting potential re-infection.

Moving forward, the focus must transition toward establishing more rigorous security standards for Internet of Things devices and enhancing the transparency of residential proxy providers. Consumers are encouraged to prioritize hardware from reputable manufacturers that offer consistent security updates and to change default settings on all connected devices immediately upon installation. On a broader scale, international policy must continue to evolve to streamline the process of taking down command-and-control servers located in various jurisdictions. Technology companies should also invest in more advanced anomaly detection systems that can identify botnet traffic at the source before it reaches the core internet backbone. This proactive approach, combined with the lessons learned from the recent DOJ operation, will be essential for preventing the emergence of the next generation of hyper-volumetric threats. Continuous vigilance and intelligence sharing remain the most effective tools for ensuring long-term resilience.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later