Cloudflare disclosed on January 29, 2026, that it mitigated the largest DDoS attack ever publicly recorded: 31.4 Tbps and 200 million requests per second from the Aisuru botnet. The attack roughly tripled the previous public record of 10.5 Tbps and signals a step change in volumetric DDoS capability.

Attack overview

AttributeValue
Peak bandwidth31.4 Tbps
Peak request rate200 million rps
Previous record29.7 Tbps (Aisuru, September 2025)
Pre-2025 record10.5 Tbps
Attack dateDecember 19, 2025
TargetsTelecom providers, IT organizations
RegionsAsia, Europe

Putting 31.4 Tbps in perspective

ComparisonEquivalence
Netflix 4K streams2.2 million simultaneous streams
Average home internet~625,000 connections saturated
Small country bandwidthCould overwhelm national infrastructure
Previous record3x the 10.5 Tbps pre-2025 record

The “Night Before Christmas” campaign

Cloudflare named the attack campaign “The Night Before Christmas” due to its timing—the holiday period when skeleton crews meant slower response times.

Campaign characteristics

AttributeDetails
Campaign nameNight Before Christmas
Start dateDecember 19, 2025
TargetingTelecommunications and IT organizations
StrategyRepeated short, intense bursts
GoalMaximize impact during response delays

Attack patterns

MetricValue
Attack typeCombined hyper-volumetric HTTP floods + Layer 4
HTTP flood peak200+ million rps
Network layer peak31.4 Tbps
UDP techniqueCarpet-bombing across 15,000 ports/second
Packet randomizationRandomized attributes to evade filtering
Sustained durationAbove 20 Tbps for 45+ minutes

Duration distribution

DurationHTTP attacksNetwork-layer attacks
Under 10 minutes71%89%

The short duration was strategic—exploiting the window before manual response could engage.

Botnet infrastructure

Aisuru/Kimwolf relationship

AttributeDetails
AisuruPrimary botnet identity
KimwolfAndroid-focused variant
RelationshipSame hacker group, shared infrastructure
Botnet size2-3.5 million compromised devices (claimed)
Device typesAndroid TV boxes, smart TVs, set-top boxes, tablets

Security firm QiAnXin XLab has tracked Kimwolf since late 2025 and confirmed the two botnets “propagated through the same infection scripts between September and November, coexisting in the same batch of devices.”

Operator attribution

Underground sources claim the botnets are controlled by operators known as “Dort” and “Snow”, who allegedly command 3.5 million infected devices across the combined Aisuru/Kimwolf infrastructure.

Kimwolf infection chain

PhaseMethod
1. ScanningLarge-scale scanning for open ADB ports
2. Proxy evasionRoutes through residential proxy networks (IPIDEA)
3. NAT bypassDNS manipulation to resolve to internal addresses
4. Payload deliveryNetcat or telnet piping shell scripts
5. PersistenceEmbedded in device firmware

Targeted ports

PortService
5555Android Debug Bridge (default)
5858ADB alternate
12108Custom ADB
3222Custom ADB

DNS NAT bypass technique

Kimwolf operators discovered they could bypass RFC 1918 controls by manipulating DNS records to resolve to internal addresses:

AddressEffect
192.168.0.1Local network access
0.0.0.0Bind to all interfaces

This enables access to devices behind NAT firewalls that would otherwise be unreachable.

Geographic distribution

Infected devices span 222 countries:

CountryPercentage
Brazil14.6%
India12.7%
United States9.6%
Argentina7.2%
Other55.9%

Technical indicators

IndicatorValue
C2 port40860
C2 server85.234.91[.]247:1337
Downloader server93.95.112[.]59
APK signature SHA1182256bca46a5c02def26550a154561ec5b2b983
DNS evasionDoT on port 853 (8.8.8.8, 1.1.1.1)
C2 persistenceENS domains via “EtherHiding” technique

A script on the downloader server directly links Kimwolf (mreo31.apk) and Aisuru (meow217) binaries, confirming shared infrastructure.

Botnet-for-hire model

Cloudflare warned that chunks of Aisuru are offered by distributors as botnets-for-hire:

“Anyone can potentially inflict chaos on entire nations… all at a cost of a few hundred to a few thousand U.S. dollars.”

2025 attack statistics

MetricValue
Total Aisuru attacks mitigated2,867
Hyper-volumetric incidents (Q3)1,304
Q3 vs Q2 increase54%
2025 vs 2024 DDoS increase121%
Total 2025 DDoS incidents47.1 million

Device vulnerability

Primary targets

Device typeVulnerability
Cheap Android TV boxesADB enabled by default on port 5555
Unbranded “fully loaded” devicesOften pre-infected at factory
Smart TVsADB accessible
Set-top boxesMinimal security

Why these devices?

FactorImpact
No security updatesPermanent vulnerability
Always-on connectionContinuous availability
High bandwidthCapable attack traffic
User unawarenessNever detected or removed
Factory compromiseInfected before sale

Mitigation recommendations

For organizations

PriorityAction
CriticalReview DDoS protection capacity (30+ Tbps)
HighImplement BCP38/BCP84 source address validation
HighWork with upstream providers on scrubbing capacity
OngoingMonitor for Aisuru attack patterns

For consumers

PriorityAction
HighDisable ADB Debugging in Developer Options
HighAvoid unbranded Android TV boxes
HighOnly use Google Play Protect certified devices
If infected”Wipe or destroy” per XLab researchers

For enterprises

PriorityAction
HighAudit Android TV and IoT devices on network
HighBlock ports 5555, 5858, 12108, 3222 at perimeter
MediumImplement IoT network segmentation
OngoingMonitor for botnet C2 traffic

Defender capacity concerns

A 3x jump in peak DDoS bandwidth means many scrubbing services may be undersized:

ConsiderationAction
Current capacityVerify provider can handle 30+ Tbps
Contract termsReview burst capacity allowances
FailoverEnsure multi-provider redundancy
Response timeTest alerting and escalation

Context

The continued growth of IoT botnets like Aisuru/Kimwolf demonstrates that the consumer electronics supply chain remains a significant security liability.

Root causes

IssueImpact
Insecure defaultsADB enabled out of box
No update mechanismPermanent vulnerability
Race to bottom pricingSecurity not prioritized
Factory compromisePre-installed malware
Consumer awarenessUsers don’t know devices are infected

Until device manufacturers ship products with secure defaults—ADB disabled, authentication required, automatic updates enabled—the botnet arms race will continue to escalate. The attack that was record-breaking in 2025 will be baseline in 2027.

Cloudflare’s automated response

Despite the scale of these hyper-volumetric attacks, Cloudflare reports they were detected and mitigated automatically without triggering internal alerts. This suggests well-architected DDoS protection can handle even record-breaking attacks—but organizations without comparable infrastructure remain vulnerable.

Regional infection distribution (detailed)

CountryPercentageEstimated devices
Brazil14.6%~510,000
India12.7%~445,000
VietnamSignificant~300,000+
United States9.6%~336,000
Argentina7.2%~252,000
Saudi ArabiaSignificant~200,000+
Other (217 countries)55.9%~1.96 million

The global distribution across 222 countries makes attribution and takedown efforts extremely challenging.

Supply chain responsibility

The Aisuru/Kimwolf situation highlights failures across the device supply chain:

ActorFailure
ManufacturersShip devices with ADB enabled by default
RetailersSell unbranded “fully loaded” devices
ConsumersUnaware of security implications
ISPsDon’t detect or notify infected customers
Platform operatorsGoogle can’t enforce security on non-certified devices

Until multiple parties in this chain take responsibility, botnet recruitment from consumer IoT will continue to accelerate.