The post How hackers seized the FBI’s botnet takedown targets and built a stronger cyberweapon from it appeared on BitcoinEthereumNews.com. Hackers took over the very same hacked devices the FBI had just cleaned out. What was supposed to be a federal win turned into a feeding frenzy, where criminals moved fast to grab nearly 95,000 devices the agency had unintentionally freed. This happened right after the FBI took down a botnet responsible for some of the worst cyberattacks ever recorded. According to The Wall Street Journal, that takedown opened the floodgates. The devices, which were previously part of an illegal botnet, got hijacked again almost instantly. A rival botnet crew called Aisuru jumped on the opportunity. They grabbed more than a quarter of the freed machines and started launching high-speed attacks that, according to Damian Menscher, a Google security engineer, are already breaking records. “It became a race to take them over as fast as possible,” Damian said. Aisuru floods the internet with world-record DDoS attacks On September 1, Cloudflare reported it had recorded the biggest DDoS attack ever seen. The attack pushed out 11.5 trillion bits per second of garbage traffic. That’s enough to kill the download speed of over 50,000 home internet connections in one hit. Cloudflare posted about it on X, calling it a “world record” in intensity. Network operators say this was just one of many similar attacks in recent weeks. The attacks were short but massive—some only lasted seconds, likely just tests of the botnet’s full power. The real danger is what these botnets are made of. Aisuru doesn’t use computers—it uses routers, smart TVs, and security cameras. Devices people forget, leave online, and rarely update. Once they’re hijacked, they become part of the army. And once they’re part of a botnet, they’re locked in, only one botnet at a time. When the FBI removed the old malware, that opened the door for Aisuru to… The post How hackers seized the FBI’s botnet takedown targets and built a stronger cyberweapon from it appeared on BitcoinEthereumNews.com. Hackers took over the very same hacked devices the FBI had just cleaned out. What was supposed to be a federal win turned into a feeding frenzy, where criminals moved fast to grab nearly 95,000 devices the agency had unintentionally freed. This happened right after the FBI took down a botnet responsible for some of the worst cyberattacks ever recorded. According to The Wall Street Journal, that takedown opened the floodgates. The devices, which were previously part of an illegal botnet, got hijacked again almost instantly. A rival botnet crew called Aisuru jumped on the opportunity. They grabbed more than a quarter of the freed machines and started launching high-speed attacks that, according to Damian Menscher, a Google security engineer, are already breaking records. “It became a race to take them over as fast as possible,” Damian said. Aisuru floods the internet with world-record DDoS attacks On September 1, Cloudflare reported it had recorded the biggest DDoS attack ever seen. The attack pushed out 11.5 trillion bits per second of garbage traffic. That’s enough to kill the download speed of over 50,000 home internet connections in one hit. Cloudflare posted about it on X, calling it a “world record” in intensity. Network operators say this was just one of many similar attacks in recent weeks. The attacks were short but massive—some only lasted seconds, likely just tests of the botnet’s full power. The real danger is what these botnets are made of. Aisuru doesn’t use computers—it uses routers, smart TVs, and security cameras. Devices people forget, leave online, and rarely update. Once they’re hijacked, they become part of the army. And once they’re part of a botnet, they’re locked in, only one botnet at a time. When the FBI removed the old malware, that opened the door for Aisuru to…

How hackers seized the FBI’s botnet takedown targets and built a stronger cyberweapon from it

For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

Hackers took over the very same hacked devices the FBI had just cleaned out. What was supposed to be a federal win turned into a feeding frenzy, where criminals moved fast to grab nearly 95,000 devices the agency had unintentionally freed.

This happened right after the FBI took down a botnet responsible for some of the worst cyberattacks ever recorded. According to The Wall Street Journal, that takedown opened the floodgates.

The devices, which were previously part of an illegal botnet, got hijacked again almost instantly. A rival botnet crew called Aisuru jumped on the opportunity.

They grabbed more than a quarter of the freed machines and started launching high-speed attacks that, according to Damian Menscher, a Google security engineer, are already breaking records. “It became a race to take them over as fast as possible,” Damian said.

Aisuru floods the internet with world-record DDoS attacks

On September 1, Cloudflare reported it had recorded the biggest DDoS attack ever seen. The attack pushed out 11.5 trillion bits per second of garbage traffic. That’s enough to kill the download speed of over 50,000 home internet connections in one hit.

Cloudflare posted about it on X, calling it a “world record” in intensity. Network operators say this was just one of many similar attacks in recent weeks. The attacks were short but massive—some only lasted seconds, likely just tests of the botnet’s full power.

The real danger is what these botnets are made of. Aisuru doesn’t use computers—it uses routers, smart TVs, and security cameras. Devices people forget, leave online, and rarely update. Once they’re hijacked, they become part of the army.

And once they’re part of a botnet, they’re locked in, only one botnet at a time. When the FBI removed the old malware, that opened the door for Aisuru to swoop in.

This comes right after prosecutors in August charged a 22-year-old man from Oregon for running a botnet that knocked X offline earlier this year. That attack showed how vulnerable even big platforms are to these kinds of cyberweapons. But what’s coming next looks a lot worse.

New botnets move from fraud to cyberwar

These aren’t just tech nuisances anymore. The new generation of botnets is being built using faster devices with stronger bandwidth, giving them far more muscle. Some experts say these networks can now be used to knock out internet access across entire countries.

Craig Labovitz, head of tech at Nokia’s Deepfield division, put it simply: “Before the concern was websites; now the concern is countries.” It’s already happened. The UK said Russia’s GRU launched DDoS attacks on Ukraine’s banks in 2022, just before its military invasion.

Now, criminal networks seem to be following that same playbook, but on a global scale. One network that Google killed earlier this year had grown from 74,000 Android TV devices in 2023 to over 10 million in just two years.

That made it the biggest known botnet made of smart TVs. Google said it was used to click billions of ads in a massive fraud scheme, but warned it could just as easily be turned into a weapon, either for ransomware or internet takedowns.

Meanwhile, another botnet called ResHydra is growing even bigger. Built from tens of millions of devices, ResHydra started with basic fraud but has now begun launching online attacks. Chris Formosa, a researcher at Lumen’s Black Lotus Labs, said that controlling a network of that size would let someone “do extreme damage to a country.”

Until now, only big cloud services like Google Cloud and Amazon Web Services have been able to block most of these attacks. But even those defenses could fall if botnets like Aisuru or ResHydra get stronger or combine forces.

If you’re reading this, you’re already ahead. Stay there with our newsletter.

Source: https://www.cryptopolitan.com/hackers-fbis-botnet-takedown-new-cyberweapon/

Market Opportunity
Threshold Logo
Threshold Price(T)
$0.006758
$0.006758$0.006758
-2.19%
USD
Threshold (T) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

The Channel Factories We’ve Been Waiting For

The Channel Factories We’ve Been Waiting For

The post The Channel Factories We’ve Been Waiting For appeared on BitcoinEthereumNews.com. Visions of future technology are often prescient about the broad strokes while flubbing the details. The tablets in “2001: A Space Odyssey” do indeed look like iPads, but you never see the astronauts paying for subscriptions or wasting hours on Candy Crush.  Channel factories are one vision that arose early in the history of the Lightning Network to address some challenges that Lightning has faced from the beginning. Despite having grown to become Bitcoin’s most successful layer-2 scaling solution, with instant and low-fee payments, Lightning’s scale is limited by its reliance on payment channels. Although Lightning shifts most transactions off-chain, each payment channel still requires an on-chain transaction to open and (usually) another to close. As adoption grows, pressure on the blockchain grows with it. The need for a more scalable approach to managing channels is clear. Channel factories were supposed to meet this need, but where are they? In 2025, subnetworks are emerging that revive the impetus of channel factories with some new details that vastly increase their potential. They are natively interoperable with Lightning and achieve greater scale by allowing a group of participants to open a shared multisig UTXO and create multiple bilateral channels, which reduces the number of on-chain transactions and improves capital efficiency. Achieving greater scale by reducing complexity, Ark and Spark perform the same function as traditional channel factories with new designs and additional capabilities based on shared UTXOs.  Channel Factories 101 Channel factories have been around since the inception of Lightning. A factory is a multiparty contract where multiple users (not just two, as in a Dryja-Poon channel) cooperatively lock funds in a single multisig UTXO. They can open, close and update channels off-chain without updating the blockchain for each operation. Only when participants leave or the factory dissolves is an on-chain transaction…
Share
BitcoinEthereumNews2025/09/18 00:09
US Prosecutors Seek $327K Crypto Forfeiture Over Romance Scam

US Prosecutors Seek $327K Crypto Forfeiture Over Romance Scam

The post US Prosecutors Seek $327K Crypto Forfeiture Over Romance Scam appeared on BitcoinEthereumNews.com. In brief The Massachusetts District of the U.S. Attorney
Share
BitcoinEthereumNews2026/03/03 06:20
Pump.fun: Can $1.8mln whale buying help PUMP target $0.0022?

Pump.fun: Can $1.8mln whale buying help PUMP target $0.0022?

The post Pump.fun: Can $1.8mln whale buying help PUMP target $0.0022? appeared on BitcoinEthereumNews.com. Since reaching $0.0016, Pump.fun has shown upward momentum
Share
BitcoinEthereumNews2026/03/03 06:01