The scope of this operation is significant, marking a major victory for cybersecurity law enforcement. The U.S. Department of Justice announced that the Defense Criminal Investigative Service (DCIS), operating under the Department of Defense Office of Inspector General (DoDIG), executed seizure warrants targeting critical U.S.-registered domains, virtual servers, and other vital infrastructure that facilitated these malicious DDoS attacks. These attacks were specifically directed at Internet addresses owned by the Department of Defense, highlighting the severity and direct impact on national security infrastructure.
The government’s allegations paint a grim picture of the operations conducted by the unknown individuals controlling these botnets. It is alleged that these cybercriminals leveraged their compromised networks, or "crime machines," to launch hundreds of thousands of DDoS attacks. These attacks were not merely acts of digital vandalism; they were often accompanied by demands for extortion payments from their victims. The financial repercussions for businesses and organizations targeted have been substantial, with some reporting losses and remediation expenses amounting to tens of thousands of dollars.
Delving deeper into the scale of their operations, the data reveals the significant volume of attacks orchestrated by each botnet. Aisuru, the oldest of the group, was responsible for issuing more than 200,000 attack commands. JackSkid, another prolific threat, hurled at least 90,000 attack commands. Kimwolf was implicated in over 25,000 attack commands, while Mossad, though less active in terms of sheer command volume, was still blamed for approximately 1,000 digital sieges. This breakdown illustrates the coordinated and widespread nature of the threat these botnets posed.
The U.S. Department of Justice explicitly stated that this law enforcement action was strategically designed to achieve two primary objectives: to prevent further infection of victim devices and to significantly limit or entirely eliminate the capacity of these botnets to launch future attacks. This proactive approach underscores the commitment of law enforcement to not only disrupt ongoing criminal activity but also to mitigate future risks. The investigation itself has been a complex undertaking, spearheaded by the DCIS with invaluable assistance from the FBI’s field office in Anchorage, Alaska. Furthermore, the DOJ’s statement extended credit to nearly two dozen technology companies, whose expertise and collaborative efforts were instrumental in the success of this operation.
Special Agent in Charge Rebecca Day of the FBI Anchorage Field Office emphasized the importance of inter-agency and international cooperation in achieving this success. She stated, "By working closely with DCIS and our international law enforcement partners, we collectively identified and disrupted criminal infrastructure used to carry out large-scale DDoS attacks." This sentiment highlights the critical role of collaboration in tackling the global threat of cybercrime.
The emergence and evolution of these botnets provide a crucial timeline of their malicious activities. Aisuru first appeared in late 2024 and rapidly ascended to notoriety by mid-2025, launching record-breaking DDoS attacks and demonstrating an alarming ability to infect new IoT devices at an unprecedented pace. The threat landscape evolved further in October 2025 when Aisuru was used as the foundation for Kimwolf. This variant introduced a sophisticated and novel spreading mechanism that enabled it to infect devices even when they were protected behind the user’s internal network, a significant escalation in its reach and stealth.
The security community played a vital role in exposing these threats. On January 2, 2026, the security firm Synthient publicly disclosed the specific vulnerability that Kimwolf was exploiting for its rapid propagation. This disclosure, while helping to temporarily curtail Kimwolf‘s spread, also served as a wake-up call. In the aftermath, several other IoT botnets emerged, effectively mirroring Kimwolf‘s successful spreading methods while competing for the same pool of vulnerable devices. The DOJ’s investigation confirmed that the JackSkid botnet, like Kimwolf, actively sought out and compromised systems located within internal networks, further amplifying the risk to organizations.
The coordinated disruption of these four botnets was not limited to U.S. shores. The DOJ confirmed that this operation coincided with simultaneous "law enforcement actions" carried out in Canada and Germany. These actions were specifically targeted at individuals who are alleged to have operated these botnets. While specific details regarding the identities of these suspected operators were not immediately available, the international scope of the operation underscores the global nature of the threat and the commitment of multiple nations to combat it.
Further insights into the individuals behind these operations have emerged. In late February, investigations by KrebsOnSecurity identified a 22-year-old Canadian man as a core operator of the Kimwolf botnet. Adding another layer to the complexity of the investigation, multiple sources familiar with the ongoing probes have indicated that another prime suspect is a remarkably young individual, a 15-year-old residing in Germany, who is believed to be a key figure in orchestrating these attacks. The involvement of minors in such sophisticated cybercriminal activities presents a growing concern for law enforcement agencies worldwide.
The disruption of these massive IoT botnets represents a significant achievement in the ongoing battle against cybercrime. By dismantling the infrastructure of Aisuru, Kimwolf, JackSkid, and Mossad, law enforcement has not only prevented immediate threats but has also sent a clear message to cybercriminals that their activities will not go unpunished. The success of this operation is a testament to the power of international cooperation, the dedication of law enforcement agencies, and the crucial support provided by the cybersecurity industry. As IoT devices continue to proliferate, the threat of large-scale DDoS attacks orchestrated by botnets remains a persistent challenge, making continued vigilance and proactive countermeasures essential. The insights gained from this operation will undoubtedly inform future strategies to protect the digital landscape from the ever-evolving tactics of cyber adversaries. The long-term implications of this takedown include a temporary respite for businesses and critical infrastructure, a potential chilling effect on nascent botnet operators, and a renewed focus on securing the vast and often vulnerable ecosystem of Internet of Things devices.

