Back to Blog
CybersecurityMar 20, 2026

DoJ Disrupts 3 Million-Device IoT Botnets Behind Record 31.4 Tbps DDoS Attacks

LNS Engineer

By LNS Engineer

DoJ Disrupts 3 Million-Device IoT Botnets Behind Record 31.4 Tbps DDoS Attacks

DoJ Disrupts 3 Million-Device IoT Botnets Behind Record 31.4 Tbps DDoS Attacks

In a landmark international law enforcement operation, the U.S. Department of Justice has announced the disruption of command-and-control infrastructure linked to IoT botnets responsible for the largest DDoS attacks ever recorded—peaking at an unprecedented 31.4 terabits per second.

The Operation

The coordinated effort, which involved collaboration with Canadian and German authorities, targeted four distinct botnet networks: AISURU, Kimwolf, JackSkid, and Mossad. These botnets collectively compromised approximately 3 million Internet of Things (IoT) devices worldwide, creating a massive attack infrastructure capable of overwhelming even the largest online services.

What This Means for Cybersecurity

The scale of these attacks represents a significant escalation in the evolution of DDoS threats. Previous record-holding attacks typically peaked in the 1-2 Tbps range, making the 31.4 Tbps figure a staggering 15-30 times more powerful. This unprecedented capability underscores several critical concerns:

1. IoT Security Remains a Major Vulnerability

The proliferation of poorly secured IoT devices continues to create an enormous attack surface. From smart cameras to connected appliances, millions of devices with default credentials and unpatched firmware serve as ready recruits for botnet armies.

2. Law Enforcement Cooperation Works

This successful disruption demonstrates the value of international cooperation in combating cybercrime. The joint efforts of the U.S., Canada, and Germany show that even sophisticated threat actors cannot operate with complete impunity.

3. The Arms Race Continues

As defensive capabilities improve, so do offensive tools. Organizations must stay vigilant and invest in robust DDoS mitigation strategies, including content delivery networks, anycast routing, and behavioral analysis systems.

What Organizations Should Do

Security experts recommend the following measures to protect against similar threats:

  • Audit IoT devices on your network and ensure firmware is up to date
  • Implement network segmentation to isolate IoT devices from critical systems
  • Deploy DDoS mitigation solutions capable of handling volumetric attacks
  • Monitor for Indicators of Compromise related to these specific botnets

Conclusion

The disruption of these botnets marks a significant victory for international law enforcement, but it also serves as a stark reminder of the evolving threat landscape. As attack volumes continue to reach new heights, organizations must prioritize cybersecurity investments and adopt proactive defense strategies.

Stay informed, stay secure, and ensure your organization's defenses are prepared for the next generation of cyber threats.

Have IT Questions?

Our team is here to help. Schedule a free consultation and get answers from Northeast Ohio's IT experts.

Schedule Your Consultation

Free consultation. No obligation. No hard sell.