Lumen disrupts AISURU and Kimwolf botnet by blocking over 550 C2 servers
好的,我现在需要帮用户总结一篇文章,控制在100字以内。用户的要求很明确,不需要用“文章内容总结”之类的开头,直接写描述即可。 首先,我得通读整篇文章,抓住主要信息。文章主要讲Lumen的Black Lotus Labs如何破坏AISURU和Kimwolf这两个僵尸网络。他们封堵了超过550个C2服务器,这些服务器用于DDoS攻击和代理滥用。 接下来,我需要提取关键点:Lumen封堵了550多个C2服务器,这两个僵尸网络用于DDoS攻击和代理滥用。AISURU作为DDoS服务出租,避开政府和军事目标,但宽带提供商受到了严重影响。攻击流量高达1.5Tb/s以上,导致设备故障。Kimwolf是新发现的安卓僵尸网络,感染了超过180万台设备,并发出了17亿次攻击指令。 然后,我需要把这些信息浓缩到100字以内。重点包括:Lumen封堵服务器数量、僵尸网络的功能、攻击影响以及Kimwolf的规模。 最后,确保语言简洁明了,不使用复杂的术语,让用户一目了然。 </think> Lumen通过封堵超550个C2服务器破坏AISURU和Kimwolf僵尸网络,这些网络用于DDoS攻击和代理滥用。AISURU作为DDoS服务出租平台避开政府和军事目标,但宽带提供商遭受严重干扰。Kimwolf是新发现的安卓僵尸网络,感染超180万台设备并发出17亿次攻击指令。 2026-1-15 09:25:16 Author: securityaffairs.com(查看原文) 阅读量:1 收藏

Lumen disrupts AISURU and Kimwolf botnet by blocking over 550 C2 servers

Lumen’s Black Lotus Labs blocked over 550 C2 servers tied to the AISURU/Kimwolf botnet used for DDoS attacks and proxy abuse.

Lumen’s Black Lotus Labs disrupted over 550 command-and-control servers linked to the AISURU and Kimwolf botnet, a major network used for DDoS attacks and proxy abuse.

Acting as a DDoS-for-hire service, Aisuru avoids government and military targets, but broadband providers faced serious disruptions from attacks exceeding 1.5Tb/sec from infected customer devices.

Like other TurboMirai botnets, Aisuru incorporates additional dedicated DDoS attack capabilities and multi-use functions, enabling operators to carry out other illicit activities, including credential stuffing, artificial intelligence (AI)-driven web scraping, spamming, and phishing.

Attacks use UDP, TCP, and GRE floods with medium-sized packets and randomized ports/flags. Over 1Tb/sec traffic from compromised CPEs disrupts broadband, and 4gpps+ floods have caused router line card failures.

Kimwolf is a newly discovered Android botnet linked to the Aisuru botnet that has infected over 1.8 million devices and issued more than 1.7 billion DDoS attack commands, according to XLab.

The Kimwol Android botnet primarily targets TV boxes, compiled using the NDK and equipped with DDoS, proxy forwarding, reverse shell, and file management functions. It encrypts sensitive data with a simple Stack XOR, uses DNS over TLS to hide communication, and authenticates C2 commands with elliptic curve digital signatures. Recent versions even incorporate EtherHiding to resist takedowns via blockchain domains.

Kimwolf follows a naming pattern of “niggabox + v[number]”; versions v4 and v5 have been tracked. By taking over one C2 domain, researchers observed around 2.7 million IPs interacting over three days, indicating a likely infection scale exceeding 1.8 million devices. Its infrastructure spans multiple C2s, global time zones, and versions, making it hard to estimate the total number of infections.

The botnet borrows the code from the Aisuru family, however, operators redesigned it to evade detection. Its primary function is traffic proxying, though it can execute massive DDoS attacks, as seen in a three-day period issuing 1.7 billion commands between November 19 and 22.

Lumen saw bot traffic to AISURU C2 servers surge from 50,000 to 200,000 daily in September 2025. After confirming a new botnet, it blocked traffic and null-routed over 550 C2 nodes.

Analyzing the botnet command-and-control infrastructure and residential proxy traffic, the researchers identified connections to Canadian IP addresses and shared their findings with law enforcement.

“The Canadian IPs in question were using SSH to access 194.46.59[.]169, which resolved to proxy-sdk.14emeliaterracewestroxburyma02132[.]su. In short order, we would learn that the Aisuru backend C2 we were tracking adopted the domain name client.14emeliaterracewestroxburyma02132[.]su, a similarity that further tied these servers together” reads the report published by Lumen.

In early October, researchers identified infrastructure changes that marked the emergence of a new botnet, Kimwolf. Kimwolf grew explosively, adding hundreds of thousands of bots within weeks, largely by exploiting vulnerable residential proxy services. By mid-October, the botnet reached about 800,000 infected devices and actively scanned proxy networks to fuel its growth.

Black Lotus Labs began disrupting the Kimwolf botnet in October by quickly null-routing its command-and-control servers. Although the operators adapted and restored operations within hours, Lumen continued blocking new infrastructure as it appeared. By tracking malware servers and working with industry partners, Lumen took a proactive approach to limit the botnet’s strength. Over four months, the team null-routed more than 550 Aisuru/Kimwolf servers and fed indicators into its security products to protect customers, pledging to continue disruption efforts.

“To date, we have null-routed over 550 Aisuru/Kimwolf servers in 4 months as part of our efforts to combat this botnet, leading its operators to some distress, as noted in Xlabs’ post, showing the actors addressing Lumen with profanity in one DDoS payload” concludes the report.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, malware)




文章来源: https://securityaffairs.com/186918/cyber-crime/lumen-disrupts-aisuru-and-kimwolf-botnet-by-blocking-over-550-c2-servers.html
如有侵权请联系:admin#unsafe.sh