Aisuru botnet shifts from DDoS to residential proxies

From mega-attacks to “renting your router”: Aisuru’s quiet cash grab has everyone side-eyeing their smart gadgets

TLDR: Aisuru moved from giant cyberattacks to renting hacked home devices as “residential proxies,” helping criminals and data scrapers hide in plain sight. The community says the DDoS storms were marketing, jokes that their doorbells now work for AI, and fights over whether ISPs, device makers, or users are to blame.

Move over smash-and-grab DDoS—Aisuru just pivoted to a stealthy cash cow: renting hacked home gadgets as “residential proxies” so bad actors look like regular users online. Commenters screamed, “called it!” with one hot take that those record 6.3–30 Tbps attacks were marketing for a botnet-for-rent. The vibe: less fireworks, more profit. The blame game went nuclear. Some roasted ISPs for shipping flimsy routers, others dunked on cheap security cameras with default passwords, and a few scolded homeowners for never updating anything. A minority defended proxies as “legit business tools,” but the loud chorus says they’re now a cover for mass scraping that feeds AI projects—think chatbots trained on everything your browser can fetch. “Congrats, your doorbell now works for AI,” became the meme of the day. Practical voices begged for plain-English tips: How do regular folks spot a compromised TV or router? Meanwhile, skeptical commenters asked if federal blocklists and ISP coordination are too little, too late. The jokes landed hard—“my fridge is freelancing at night,” “LLM = Looted Living Machines”—but the mood is anxious: Aisuru’s shift means your home gadgets could be quietly renting themselves out. Read the original reporting at KrebsOnSecurity and industry notes from Netscout.

Key Points

  • Aisuru botnet shifted from large-scale DDoS attacks to renting compromised IoT devices as residential proxies.
  • Identified in August 2024, Aisuru infected at least 700,000 IoT devices, including routers and cameras.
  • Aisuru launched DDoS attacks peaking near 30 Tbps; a 6.3 Tbps attack on KrebsOnSecurity.com was Google’s largest mitigated at the time.
  • U.S.-based ISPs suffered significant network disruption, with outbound attack traffic exceeding 1–1.5 Tbps from compromised customer equipment.
  • Authorities in the U.S. and Europe are engaged, and major ISPs are informally sharing block lists of Aisuru control servers.

Hottest takes

“these ddos attacks were just advertisement for the Aisuru services” — sieep
“Congrats, your doorbell now works for AI” — DataDiet
“ISPs sold us junk routers and now blame customers” — fiberFury
Made with <3 by @siedrix and @shesho from CDMX. Powered by Forge&Hive.