AISURU Botnet Drives Record 29.7 Tbps DDoS Hit

AISURU Botnet’s Record-Breaking DDoS Impact

AISURU botnet activity has reached historic levels this year. The latest incident involved a massive 29.7 Tbps DDoS attack. Researchers confirmed that the strike lasted only 69 seconds. However, its scale showed how quickly modern attacks can escalate.

The report noted that the attack came from a botnet-for-hire. Therefore, even inexperienced criminals can launch extreme disruptions. AISURU relies on millions of infected devices worldwide. This network allows rapid, high-volume assaults against chosen targets.

How the Attack Was Executed

Researchers explained that the DDoS method used UDP carpet-bombing. It targeted around 15,000 ports every second. The traffic randomized packet details to evade defenses. As a result, the attack challenged conventional filtering systems.

The same botnet also launched a 14.1 Bpps attack shortly before. These events revealed the botnet’s ability to scale. Additionally, investigators have recorded 2,867 AISURU attacks this year. They observed that over 1,300 were hyper-volumetric strikes.

Global Trends and Growing Frequency

The report said that 8.3 million DDoS attacks were blocked in the period studied. This number showed a 15% quarter-over-quarter increase. It also reflected a 40% rise when compared to last year. Therefore, attackers are becoming more aggressive and better equipped.

Another section highlighted global patterns. For example, attacks above 100 Mpps grew by 189%. Most strikes lasted under 10 minutes. However, even short assaults caused major disruption for many sectors. Asia produced seven of the top ten attack sources.

Industries Facing the Most Pressure

Several industries saw rapid spikes in attack numbers. The mining and metals sector moved higher in global rankings. The automotive industry suffered the fastest growth rate. Meanwhile, information technology and gaming remained top targets.

Countries across Asia, Europe, and the Americas faced intense waves. China, Turkey, Germany, Brazil, and the U.S. were among the most affected. Nearly 70% of HTTP attacks came from established botnets. Therefore, coordinated networks remain the dominant threat.

Why DDoS Attacks Keep Evolving

Researchers stated that modern attacks have grown more complex. They now exceed earlier predictions by a wide margin. Attackers adapt faster than many organizations can respond. Consequently, global defenses must evolve continuously to maintain resilience.

How to Prevent Similar Attacks

Organizations can reduce risk by improving network visibility and monitoring. They should also deploy continuous traffic analysis to detect anomalies early. Security services that offer managed threat detection and layered protection can strengthen defenses. These solutions help identify botnet patterns and block malicious spikes before they escalate.

Sleep well, we got you covered.

Scroll to Top