The denial-of-service (DDoS) attack detected on Microsoft’s cloud on October 24 has been taken down, the Windows operating system developer said on Monday. According to Microsoft’s blog, the DDoS assault targeted a single endpoint in Australia and reached 15.72 terabits per second (Tbps) and nearly 3.64 billion packets per second (pps). The attack was traced […]The denial-of-service (DDoS) attack detected on Microsoft’s cloud on October 24 has been taken down, the Windows operating system developer said on Monday. According to Microsoft’s blog, the DDoS assault targeted a single endpoint in Australia and reached 15.72 terabits per second (Tbps) and nearly 3.64 billion packets per second (pps). The attack was traced […]

Microsoft reports dismantling largest cloud DDoS attack ever

The denial-of-service (DDoS) attack detected on Microsoft’s cloud on October 24 has been taken down, the Windows operating system developer said on Monday.

According to Microsoft’s blog, the DDoS assault targeted a single endpoint in Australia and reached 15.72 terabits per second (Tbps) and nearly 3.64 billion packets per second (pps).

The attack was traced to a TurboMirai-class Internet of Things (IoT) botnet known as AISURU, which security firm Krebson discovered had compromised US internet service providers AT&T, Verizon and Comcast for almost a year. 

Microsoft did not reveal the identity of the target, but confirmed its automated defenses neutralized the attack before any significant disruption occurred.

AISURU could have executed record-breaking attacks

Per the analysis published by Microsoft, the assault relied on extremely high-rate UDP floods on a specific public IP address. “The attack involved extremely high-rate UDP floods targeting a specific public IP address, launched from over 500,000 source IPs across various regions,” Senior Product Marketing Manager of Azure Security Sean Whalen explained.

Azure’s analysts wrote that minimal source spoofing and randomized source ports were used to simplify traceback and enable ISPs to enforce mitigation measures effectively.

AISURU exploits compromised home routers, cameras, and DVR systems within residential ISPs in the United States and other countries. QiAnXin XLab estimates the botnet commands nearly 300,000 infected devices. 

“Aisuru’s owners are continuously scanning the Internet for these vulnerable devices and enslaving them for use in distributed denial-of-service (DDoS) attacks that can overwhelm targeted servers with crippling amounts of junk traffic,” KrebsOnSecurity researchers noted.

American AIOps and technology company Netscout also found AISURU operating with a restricted clientele to avoid government, military, and law enforcement. The majority of observed attacks are linked to online gaming platforms, where high-volume traffic can cause collateral disruption to other networks.

“The outbound and cross-bound DDoS attacks can be just as disruptive as the inbound stuff. We’re now in a situation where ISPs are routinely seeing terabit-per-second plus outbound attacks from their networks that can cause operational problems,” Netscout engineer Roland Dobbins surmised.

Azure’s Whalen also mentioned that the botnet facilitates credential stuffing, AI-driven web scraping, spamming, phishing, and operates a residential proxy service, with attacks exceeding 20 Tbps.

AISURU botnet damages in 2025 so far

In May, cybersecurity blog KrebsOnSecurity reported a near-record 6.35 Tbps attack that was countered by Google’s Project Shield. AISURU then crossed the record with an 11 Tbps assault within the next months, and by late September, attacks had topped 22 Tbps. 

The botnet sent 29.6 Tbps of junk data to a dedicated server measuring extreme DDoS traffic, according to an October 6 report by security journalist Brian Krebs. 

Steven Ferguson, principal security engineer at Global Secure Layer (GSL) in Brisbane, said TCPShield, a DDoS protection service supporting over 50,000 Minecraft servers, was hit with more than 15 Tbps of junk data on October 8. 

“This was causing serious congestion on their Miami external ports for several weeks, shown publicly via their weather map,” Ferguson said.

The attack caused significant congestion on upstream provider OVH’s Miami ports, leaving the company with no choice but to terminate service for TCPShield. However, he revealed the network is now fully protected by GSL security services, a subscription that smaller ISPs may not have the budget to pay for.

Although the DDoS exploits target online gaming networks mostly, the volume of malicious traffic affects unrelated services and connectivity in the surrounding area. Most organizations do not have the resources to withstand such attacks because they lack specialized mitigation tools that could protect them from exposure and damage.

Microsoft’s disclosure comes on the heels of Netscout’s reporting on Eleven11, also known as RapperBot, another TurboMirai-class IoT botnet. Between late February and August, Eleven11 is estimated to have launched approximately 3,600 DDoS attacks.

Some of Eleven11’s command-and-control (C2) servers were registered under the “.libre” top-level domain (TLD), part of OpenNIC, an alternative DNS root independent of ICANN. Malware analysis also revealed that the botnet used ICANN generic top-level domains (.live and .info), with C2 server IPs encrypted in the records. 

Netscout cited samples from 2024 showing Eleven11’s source code had matured to dynamically reconfigure C2 infrastructure using domain names rather than hardcoded IPs. 

Want your project in front of crypto’s top minds? Feature it in our next industry report, where data meets impact.

Market Opportunity
Cloud Logo
Cloud Price(CLOUD)
$0.07777
$0.07777$0.07777
-1.29%
USD
Cloud (CLOUD) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Polygon Tops RWA Rankings With $1.1B in Tokenized Assets

Polygon Tops RWA Rankings With $1.1B in Tokenized Assets

The post Polygon Tops RWA Rankings With $1.1B in Tokenized Assets appeared on BitcoinEthereumNews.com. Key Notes A new report from Dune and RWA.xyz highlights Polygon’s role in the growing RWA sector. Polygon PoS currently holds $1.13 billion in RWA Total Value Locked (TVL) across 269 assets. The network holds a 62% market share of tokenized global bonds, driven by European money market funds. The Polygon POL $0.25 24h volatility: 1.4% Market cap: $2.64 B Vol. 24h: $106.17 M network is securing a significant position in the rapidly growing tokenization space, now holding over $1.13 billion in total value locked (TVL) from Real World Assets (RWAs). This development comes as the network continues to evolve, recently deploying its major “Rio” upgrade on the Amoy testnet to enhance future scaling capabilities. This information comes from a new joint report on the state of the RWA market published on Sept. 17 by blockchain analytics firm Dune and data platform RWA.xyz. The focus on RWAs is intensifying across the industry, coinciding with events like the ongoing Real-World Asset Summit in New York. Sandeep Nailwal, CEO of the Polygon Foundation, highlighted the findings via a post on X, noting that the TVL is spread across 269 assets and 2,900 holders on the Polygon PoS chain. The Dune and https://t.co/W6WSFlHoQF report on RWA is out and it shows that RWA is happening on Polygon. Here are a few highlights: – Leading in Global Bonds: Polygon holds 62% share of tokenized global bonds (driven by Spiko’s euro MMF and Cashlink euro issues) – Spiko U.S.… — Sandeep | CEO, Polygon Foundation (※,※) (@sandeepnailwal) September 17, 2025 Key Trends From the 2025 RWA Report The joint publication, titled “RWA REPORT 2025,” offers a comprehensive look into the tokenized asset landscape, which it states has grown 224% since the start of 2024. The report identifies several key trends driving this expansion. According to…
Share
BitcoinEthereumNews2025/09/18 00:40
OpenVPP accused of falsely advertising cooperation with the US government; SEC commissioner clarifies no involvement

OpenVPP accused of falsely advertising cooperation with the US government; SEC commissioner clarifies no involvement

PANews reported on September 17th that on-chain sleuth ZachXBT tweeted that OpenVPP ( $OVPP ) announced this week that it was collaborating with the US government to advance energy tokenization. SEC Commissioner Hester Peirce subsequently responded, stating that the company does not collaborate with or endorse any private crypto projects. The OpenVPP team subsequently hid the response. Several crypto influencers have participated in promoting the project, and the accounts involved have been questioned as typical influencer accounts.
Share
PANews2025/09/17 23:58
Will XRP Price Increase In September 2025?

Will XRP Price Increase In September 2025?

Ripple XRP is a cryptocurrency that primarily focuses on building a decentralised payments network to facilitate low-cost and cross-border transactions. It’s a native digital currency of the Ripple network, which works as a blockchain called the XRP Ledger (XRPL). It utilised a shared, distributed ledger to track account balances and transactions. What Do XRP Charts Reveal? […]
Share
Tronweekly2025/09/18 00:00