Azure Mitigates 15.7 Tbps Aisuru Botnet DDoS Attack

Photo of author

By Anza Malik

Azure Mitigates 15.7 Tbps Aisuru Botnet DDoS Attack

On October 24, 2025, Microsoft Azure’s DDoS Protection platform successfully mitigated a massive 15.72 terabits-per-second (Tbps) distributed denial-of-service (DDoS) attack, the largest ever observed in Azure’s cloud infrastructure. 

The assault originated from the Aisuru botnet, a rapidly evolving Internet-of-Things (IoT) threat that has drawn increasing concern from the cybersecurity community. 

The Attack: Unprecedented Scale, Coordinated Power

Azure’s systems detected and intercepted the DDoS attack automatically, leveraging the provider’s global mitigation infrastructure. 

At its peak, the assault unleashed 3.64 billion packets per second (pps) mainly via high-rate UDP floods directed at a single public IP address located in Australia. 

Reportedly, more than 500,000 source IP addresses, spread across multiple regions, participated in the attack. 

Attackers used randomized source ports and exhibited very low IP spoofing, which, while increasing the traffic’s volume, paradoxically made it somewhat easier for Azure to trace back to the infected devices. 

The Culprit: Aisuru Botnet A New IoT Juggernaut

The Aisuru botnet classified as “Turbo Mirai–class” malware is at the heart of this incident. 

Security research suggests that this botnet is composed of hundreds of thousands of IoT devices, including compromised home routers, network cameras, DVRs, and other embedded systems. 

One of its most alarming traits is its ability to orchestrate multi-vector floods (UDP, TCP, GRE, etc.) that evolve rapidly and evade traditional defenses. 

A key part of its spread stems from a breach of Totolink’s firmware update server. In April 2025, attackers replaced legitimate firmware with a malicious script (named t.sh), effectively turning every updating router into a bot. 

Furthermore, Aisuru’s architecture displays advanced techniques for obfuscation and persistence: it uses modified RC4-based encryption, evades virtualized environments, and manipulates system processes to stay hidden. 

Why This Matters: The Evolving DDoS Landscape

This DDoS strike represents more than just a headline, it signals a shift in the threat landscape. As consumer broadband speeds increase and IoT devices proliferate, attackers are scaling their operations accordingly. 

In particular, botnets like Aisuru are challenging defenders with their sheer volume, distribution, and flexibility. 

Security researchers also warn that Aisuru may be setting a dangerous precedent; beyond volumetric attacks, its modules may support additional illicit activities, such as credential stuffing, reverse shells, and proxy services. 

Another concern is outbound DDoS; according to network monitoring firm FastNetMon, some Aisuru-infected IoT devices have generated outbound traffic close to 30 Tbps, placing stress on their hosting ISPs. 

Meanwhile, reports from Netscout and ThaiCERT indicate that Aisuru has launched other record-breaking floods in some cases up to 20 Tbps targeting online gaming platforms and leveraging its massive pool of compromised devices. 

How Microsoft Defended: Automation + Global Defense

Microsoft’s defense rested on its globally distributed DDoS protection network, which rerouted malicious traffic through “scrubbing centers” that filter out harmful packets in real time. 

Machine learning and behavioral analytics helped Azure identify the abnormal traffic patterns and scale mitigation efforts instantly. 

According to Microsoft, no customer experienced visible downtime. 

The company has urged organizations to proactively assess their readiness ahead of high-risk periods, such as the holiday season when large-scale DDoS attacks historically surge. 

Lessons & Take-Home Advice

The recent Azure incident highlights how rapidly DDoS threats are evolving and why organizations must strengthen their security posture. To stay protected, businesses and users need to adopt proactive, coordinated, and technology-driven defenses. Below are key lessons drawn from this record-breaking attack.

  • IoT hygiene matters more than ever: Unpatched and poorly secured devices remain the weak link. Botnets like Aisuru thrive on them. 
  • Cloud-native defenses are critical: Large-scale, multi-vector attacks demand automated, globally distributed protection systems.
  • Prevention + simulation: Regular stress tests, simulations, and attack drills can reveal vulnerabilities before real threats strike.
  • ISP vigilance is needed: As outbound DDoS grows, ISPs must monitor egress traffic and deploy aggressive filtering to contain botnet-generated floods. 
  • Shared responsibility: Manufacturers, operators, and consumers all play a role. Securing firmware, closing vulnerabilities, and maintaining good cyber hygiene are essential.

Conclusion

Microsoft Azure’s successful mitigation of a 15.72 Tbps Aisuru-driven DDoS attack marks a milestone in cloud security but it also highlights the rising sophistication of IoT-based threats. As the internet continues to scale, so does the potential for hyper-volumetric cyber assaults. This incident should serve as a wake-up call: defending against next-generation botnets requires not just technology, but collaboration across the cybersecurity ecosystem.

Stay with us for more Cybersecurity and AI tech updates! If you’re interested in contributing, submit a guest post and Write for Us.