FindArticles FindArticles
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
FindArticlesFindArticles
Font ResizerAa
Search
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
Follow US
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.
FindArticles > News > Technology

Aisuru Botnet’s DDoS Smashes Previous Record with 22.2Tbps

Bill Thompson
Last updated: October 25, 2025 9:31 am
By Bill Thompson
Technology
7 Min Read
SHARE

A second round of distributed denial-of-service activity has raised the bar on raw internet firepower. Cloudflare says it defended against a DDoS attack that hit 22.2Tbps and 10.6 billion packets per second at the peak, lasting just over two minutes and aimed at one IP address belonging to a European internet infrastructure firm.

The firm says the attack is by the Aisuru botnet and is approximately twice the size of an 11.5Tbps incident seen earlier this month.

Table of Contents
  • What Set This Attack Apart: Simultaneous Bandwidth and PPS
  • Inside the Aisuru Botnet and Its Consumer IoT Footprint
  • Why the Numbers Matter for Layer 3/4 DDoS Campaigns
  • Collateral Risk and Business Impact from Volumetric Floods
  • A Faster Arms Race Against DDoS as Botnets Keep Growing
  • What to Watch Next as Aisuru Evolves and Copycats Emerge
An image from DDoS News with the headline IS Ps hit by record outbound DDoS traffic from Ais uru Botnet. The image depicts water flowing out from a server room with open doors.

Cloudflare says it was able to see and stop the spike, preventing it from having downstream effects on customers.

What Set This Attack Apart: Simultaneous Bandwidth and PPS

Unprecedented DDoS attacks tend to be heavily skewed to either bandwidth (terabits per second) or packet rate (billions of packets per second). This one pushed both. The 22.2Tbps peak throughput will fill up transit links and peering points, while the 10.6 Bpps is just the kind of packet storm that will bring down stateful devices and overrun routing silicon long before bandwidth limits are reached.

Cloudflare’s telemetry registered traffic from 404,000 unique IPs and observed that the source addresses were not spoofed. That implies a significant number of actually compromised endpoints or abused servers, rather than a reflection-only campaign forging IPs to bounce traffic off broken services.

Inside the Aisuru Botnet and Its Consumer IoT Footprint

Teams within QAX, at what is described on its website as an R&D organization called XLab, have attributed Aisuru to the earlier 11.5Tbps attack and say that they believe the botnet includes roughly 300,000 distinct devices — primarily consumer IoT gear such as insecure home and small-office routers.

The operators reportedly seeded at least some of the footprint by hacking an update server used by router manufacturer Totolink to deploy malware, according to XLab.

Cloudflare’s count of 404,000 participating IPs suggests the presence of additional resources, such as hijacked servers and proxy networks. Brian Krebs, a security journalist, has reported on allegations that the controllers of Aisuru offer access to the botnet through Telegram channels. The culture around these crews often values spectacle — large, high-drama “demolition” blasts — more than money, a temperament that mirrored the short but intense life Cloudflare documented.

Why the Numbers Matter for Layer 3/4 DDoS Campaigns

“Size” of DDoS is not a single measurement. Terabits per second wreak havoc on link capacity and upstream carriers (Layer 3/4 volumetric floods); requests per second pummel application stacks and CDNs (Layer 7). Hundreds of millions of request-per-second Layer 7 events have been reported by hyperscalers in the past few years. Aisuru’s newest shot is simply a Layer 3/4 attack, meant to throttle network paths well before it could ever load any web server.

The short duration matters, too. Most modern botnets use high-intensity “microbursts,” which rotate through targets to avoid blacklists and exploit the interval when traffic is not yet scrubbed. Successful mitigation depends on zero-second detection, automatic routing to scrubbing facilities, and anycast capacity allowing for multi-terabit attacks without congestion.

A professional dashboard displaying attack trend data , including a line graph showing attack volume and tables detailing attack source countries, AS Ns, ports, types , TCP flags, and packet sizes. Filename : attacktrend dashboard.png

Collateral Risk and Business Impact from Volumetric Floods

Even when the target can still be reached, volumetric floods can cause collateral damage: airlines using shared transit links, degraded peering sessions, and control-plane load on edge routers. Packets per second at the very high end, like 10.6 Bpps, are particularly brutal to stateful firewalls and load balancers, which can overflow connection tables at millisecond resolutions.

For businesses, the lesson is less about this particular victim than it is about being ready. Cloudflare’s response demonstrates the importance of default-on DDoS protection, pre-provisioned scrubbing, and transparent routing policies to reroute traffic. Advice from agencies such as CISA stresses practiced playbooks, coordination early on with upstream ISPs, and rigid limits placed on uninvited traffic into services that are critical.

A Faster Arms Race Against DDoS as Botnets Keep Growing

Welcome to this installment in our brief series relating advancements in technology to jeopardizing service availability. Industry reporting from key network monitoring firms — such as NETSCOUT and Akamai — has tracked consistent growth in both attack volume and peak throughput, with multi-terabit floods no longer outliers. Insecure-by-default IoT, unpatched edge devices, and DDoS-for-hire services provide a giant swipe card to botnet operators.

Disrupting Aisuru won’t be trivial. Takedowns usually involve the cooperation of device manufacturers, ISP/Telco filtering, patches to the exploited firmware, and legal action against access brokers. If XLab’s assumption about a supply-chain breach at one (not yet identified) router vendor pans out, it shows how an infected update to even a single path can plant tens of thousands across networks within uninvolved businesses and offices.

What to Watch Next as Aisuru Evolves and Copycats Emerge

Key signals include:

  • Changes in the number of active nodes Aisuru operates
  • Pivots to different target sectors beyond infrastructure and ISPs
  • Presence of copycat clusters that reuse its tooling

Also, greater transparency from router makers about firmware integrity and more-invested manufacturers distributing patches with alacrity might make the pool of exploitable devices smaller.

The newest entry not only shows that the ceiling for DDoS throughput continues to climb, but also that automated, globally distributed defenses can stem even the most eye-popping spikes.

The race now is whether defenders can hang on to that edge, even as the botnets grow in size — and those Aisuru numbers suggest the next “record” isn’t far behind.

Bill Thompson
ByBill Thompson
Bill Thompson is a veteran technology columnist and digital culture analyst with decades of experience reporting on the intersection of media, society, and the internet. His commentary has been featured across major publications and global broadcasters. Known for exploring the social impact of digital transformation, Bill writes with a focus on ethics, innovation, and the future of information.
Latest News
Roku Kills Photo Streams as Screensavers Move to Roku City
Beeple’s $100K Robot Dog Self-Portrait Sells First
Yoodli Triples Valuation Over $300M With Assistive AI
Aaru Bags Series A at $1B Headline Valuation
Waymo to Recall Robotaxis After A.V. Tied to School Bus Incident
8-in-1 EDC charger is $20 in a limited holiday deal
Xiaomi TriFold Phone Spotted in GSMA Filing
Feds Find Additional Tesla FSD Signal and Lane Complaints
YouTube Music Bug Kills Offline Downloads
Google fixes AOD for timer and stopwatch controls on Pixel Watch
Xbox Game Pass Meta Quest 3S Bundle Deal Revealed
SpaceX In Talks For $800B Secondary Sale Valuation
FindArticles
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
  • Corrections Policy
  • Diversity & Inclusion Statement
  • Diversity in Our Team
  • Editorial Guidelines
  • Feedback & Editorial Contact Policy
FindArticles © 2025. All Rights Reserved.