Threat IntelHIGH

Mirai Botnets - Evolving DDoS and Proxy Abuse Threats

CSCyber Security News
MiraiAisuruKimwolfDDoSbotnet
🎯

Basically, Mirai botnets are using many hacked devices to launch huge internet attacks.

Quick Summary

The rise of Mirai-based botnets poses a significant threat, with millions of devices compromised. Aisuru and Kimwolf variants are leading the charge, launching massive DDoS attacks. Organizations must act quickly to bolster their defenses against these evolving threats.

What Happened

Over the past year, the internet has witnessed a sharp rise in botnet-driven threats, primarily linked to the notorious Mirai malware family. Originally discovered in 2016, Mirai was designed to scan for vulnerable Internet of Things (IoT) devices, particularly those running on ARC processors. Attackers exploit known security flaws or use default credentials to gain access. What started as a tool for launching Distributed Denial of Service (DDoS) attacks has evolved into a vast ecosystem with numerous active variants targeting millions of devices worldwide.

The public release of Mirai's source code has allowed countless cybercriminals to create their own versions. According to Spamhaus, there was a 26% increase in botnet command and control (C2) servers in the first half of 2025, followed by another 24% rise in the latter half. This surge has pushed the United States to surpass China as the country hosting the most botnet C2 servers, a title China held since late 2023.

Who's Behind It

Researchers from Pulsedive have identified several active Mirai-based botnets, with Aisuru and Kimwolf being the most destructive. Together, they have compromised between one and four million hosts globally. Cloudflare reports that these botnets are responsible for some of the largest DDoS attacks ever recorded, including a staggering 31.4 terabits per second flood. This level of attack capability far exceeds earlier Mirai variants, demonstrating the increasing sophistication and danger of these botnets.

The operators behind Aisuru and Kimwolf have transformed their infrastructure into a criminal enterprise, selling access to compromised devices via platforms like Discord and Telegram. Despite law enforcement efforts, including a recent announcement by the U.S. Department of Justice to disrupt their C2 servers, these botnets continue to adapt and thrive.

Tactics & Techniques

The Kimwolf variant specifically targets Android devices and Smart TVs, infecting approximately two million devices globally. It uses a script to download and execute malicious APK files, targeting various CPU architectures. Following disruptions to its infrastructure, Kimwolf shifted operations to The Invisible Project (I2P), a decentralized network that offers enhanced anonymity. This move illustrates how quickly these operators respond to law enforcement actions, making them harder to track.

Defensive Measures

Organizations must take proactive steps to protect against these evolving threats. Network providers often offer DDoS protection solutions capable of detecting and blocking bot-driven traffic. Here are some key actions:

  • Utilize protective DNS services to filter suspicious domain queries.
  • Regularly patch publicly accessible network devices, especially routers.
  • Change default credentials on all networking equipment to strong, unique passwords.

By implementing these measures, organizations can better defend against the growing threat posed by Mirai-based botnets and their evolving tactics.

🔒 Pro insight: The rapid adaptation of Mirai variants indicates a need for continuous monitoring and proactive defense strategies against emerging DDoS threats.

Original article from

Cyber Security News · Tushar Subhra Dutta

Read Full Article

Related Pings

HIGHThreat Intel

Threat Intel - Trends from Fortinet’s 2026 Report Explained

Fortinet's 2026 report reveals a troubling rise in AI-driven cybercrime. This trend affects organizations globally, highlighting the need for enhanced cybersecurity measures. Understanding these changes is critical for effective defense strategies.

SC Media·
HIGHThreat Intel

Stryker Hack - New Details Uncover Malicious Involvement

Stryker has revealed more details about a significant cyberattack linked to the Iranian group Handala. Over 200,000 devices were impacted, raising alarms in the healthcare sector. This incident highlights the increasing risks posed by state-sponsored cyber threats. Stryker is working on restoring the affected systems.

SC Media·
HIGHThreat Intel

TeamPCP Supply Chain Attack - LiteLLM Package Compromised

A supply chain attack has compromised the LiteLLM PyPI package by TeamPCP. Developers using this package are at risk of data theft. It's crucial to assess your security measures to prevent exploitation.

SC Media·
HIGHThreat Intel

China-Linked Hackers - Breach Southeast Asian Military Systems

A sophisticated cyber espionage campaign linked to China has targeted Southeast Asian military systems since 2020. This breach focuses on strategic intelligence collection, posing significant risks to national security. Organizations must enhance their defenses to mitigate such threats.

Cyber Security News·
HIGHThreat Intel

North Korean Hacker - Caught by Geography Slip in Login

A North Korean hacker was caught just days after being hired. Their login from Missouri raised alarms, revealing the risks of remote hiring. Companies must enhance verification processes to prevent such breaches.

SC Media·
HIGHThreat Intel

Threat Intel - US Jails Russian Ransomware Access Broker

Aleksei Volkov, a Russian ransomware broker, has been sentenced to prison for aiding cybercrime that caused millions in losses. His actions reflect the ongoing threat of ransomware attacks. Companies must enhance their security to prevent similar incidents.

SC Media·