Home Tech & AI US Takes Down Botnets Used in Record-Breaking Cyberattacks

US Takes Down Botnets Used in Record-Breaking Cyberattacks

by Abigail Avery


The collection of millions of hacked computers known as Aisuru and Kimwolf have been used to launch some of the biggest distributed denial-of-service (DDoS) attacks ever seen. Now United States law enforcement agencies have wiped both of them off the internet, along with two of the other hordes of hijacked computers—known as botnets—in a single broad takedown.

On Thursday, the US Department of Justice, working with the cybercrime-fighting agency within the US Department of Defense known as the Defense Criminal Investigative Service, announced that it had dismantled four massive botnets in a single operation, removing the command-and-control servers used to commandeer the hacker-run armies of compromised devices known by the names JackSkid, Mossad, Aisuru, and Kimwolf. Together, operators of the four botnets had amassed more than 3 million devices, the Justice Department said, and often sold access to those devices to other criminal hackers as well as using them to target victims with overwhelming floods of attack traffic to knock websites and internet services offline.

Aisuru and Kimwolf, a distinct but Aisuru-related botnet, had together comprised more than a million devices, according to DDoS defense firm Cloudflare, with Aisuru infecting a variety of devices ranging from DVRs to network appliances to webcams, and its Kimwolf offshoot infecting Android devices including smart TVs and set-top boxes. Cloudflare says the two botnets, working in conjunction, carried out a cyberattack against a Cloudflare customer last November that reached more than 30 terabits of data per second, nearly three times the size of the previous biggest such attack.

No arrests were immediately announced along with the takedowns, but a Justice Department statement noted that the US government was collaborating with Canadian and German authorities, “which targeted individuals who operated these botnets.”

“The United States is steadfast in our commitment to safeguarding critical internet infrastructure and fighting the cybercriminals who jeopardize its security, wherever they might live,” US attorney Michael J. Heyman wrote in a statement.

Of the four botnets taken out in the operation, Aisuru had gained the most notoriety, thanks to a series of record-breaking or near-record cyberattacks it carried out last fall. The botnet, whose use was rented out like many such “booter” services offering their brute-force disruptive capabilities to anyone willing to pay, has been most visibly against gaming services like Minecraft and independent cybersecurity journalist Brian Krebs. Krebs, who has extensively investigated the botnet underground and Aisuru in particular, came under repeated attack from the botnet last year.

Then in November, Cloudflare absorbed a recording-breaking combined attack from Aisuru and Kimwolf that lasted only 35 seconds but reached 31.4 terabits per second, a volume of attack traffic close to triple the size of any seen before. (The company hasn’t revealed which of its customers was hit with that attack.)

In a report on the state of the DDoS ecosystem, Cloudflare described the maximum attack traffic of the combined Aisuru and Kimwolf botnets as equivalent to “the combined populations of the UK, Germany, and Spain all simultaneously typing a website address and then hitting ‘enter’ at the same second.” The botnet was capable, Cloudflare’s analysts wrote, of “launching DDoS attacks that can cripple critical infrastructure, crash most legacy cloud-based DDoS protection solutions, and even disrupt the connectivity of entire nations.”

In fact, all four botnets disrupted by the US operation were variants of Mirai, an internet-of-things botnet that first appeared in 2016, broke records at the time for the size of the cyberattacks it enabled, and eventually was used in an attack on the domain-name service provider Dyn that took down 175,000 websites simultaneously for much of the United States. Mirai’s code base has since served as the starting point for a decade of other internet-of-things botnets.



Source link

Related Posts

Leave a Comment