Readit News logoReadit News
haunter · 3 months ago
This is what I don't get

>The Aisuru DDoS botnet operates as a DDoS-for-hire service with restricted clientele; operators have reportedly implemented preventive measures to avoid attacking governmental, law enforcement, military, and other national security properties. Most observed Aisuru attacks to date appear to be related to online gaming.

https://www.netscout.com/blog/asert/asert-threat-summary-ais...

So why? Like why would someone pay to take a game down? I see this all over reddit with different games but I just don't get the point. What's the benefit of taking down an online game for a couple of hours.

denkmoon · 3 months ago
Mad salt. Imagine a fully grown man having a toddler tantrum. "If I can't play/win/get my way, nobody can" type mentality. It's also a method of coercion. Give me mod status or I'll DDOS your server and destroy your community.

The other half comes from sever operators ddosing their competition. There is a lot of money to be made from paid cosmetics, ranks, moderator (demi-tyrant) status, etc on custom servers.

redwall_hp · 3 months ago
"Game servers" also doesn't just mean Timmy's Minecraft server. It's big commercial games.

Final Fantasy XIV keeps getting hammered, likely Aisuru, off and on since at least September.

https://na.finalfantasyxiv.com/lodestone/news/detail/6b56814...

alickz · 3 months ago
>There is a lot of money to be made from paid cosmetics, ranks, moderator (demi-tyrant) status, etc on custom servers.

Anyone have any idea how much a 15 Tbps DDoS attack would cost?

Thousands of dollars? Tens of thousands?

brunoarueira · 3 months ago
On my childhood I had a colleague were when him lose a match against me or my brother, him got mad and fire the joystick to the ground.
baxtr · 3 months ago
Games continue beyond the Games themselves...
duxup · 3 months ago
When I moderated a busy gaming forum long ago my most horrifying discovery was how many users I thought were children ... were very much "adults" by age.
sabatonfan · 3 months ago
What you are saying fits perfectly well in minecraft communities.

Are you mentioning the minecraft community by your message or any other gaming communities too

JTbane · 3 months ago
Also just peacocking, being that skid on the forums that took down PlayStation on Christmas will get you cred.
Onawa · 3 months ago
It depends on the game, but for those with some kind of marketplace or transferable currency, I'm guessing market manipulation is one possible reason.

For other games, maybe trying to interrupt some time limited event or tournament. Going all the way down the rabbit hole, if you're not already familiar take a look at how crazy things get in a game like EVE: Online.

Then of course there are the bored trolls and/or people who feel wronged by the game's developers or other players.

arkh · 3 months ago
> What's the benefit of taking down an online game for a couple of hours.

Competitive MMO. Imagine some event is setup to start at some time and your guild or alliance knows they're gonna lose it and the resource it gives: DDOS the server so it's down during the event so it does not run. Enjoy the fact you kept the asset linked to said event and sell the resources you get for real money.

If you've never played those kind of games you cannot fathom how cutthroat they can become. I'm part of a guild which has a specific intelligence branch with spies embedded in many other guilds and that's playing nice because we're not selling anything.

razakel · 3 months ago
EVE Online had to put their foot down when people were talking about what could easily be considered terrorism.
Shocka1 · 3 months ago
My online gaming days are basically non-existent the last decade, but seeing stuff like this makes me want to make my comeback. The funny and bizarre stories I have from WoW...
manquer · 3 months ago
Probably it has to do with all the gambling sites associated with gaming not the games itself.

Taking a competitor offline for a few hours is a lot of money in a market business I expect.

there seems to be lot of weird stuff going on with gaming casinos the recent CoffeeZilla episode comes to mind, so wouldn’t be surprised if botnets are used

iknowstuff · 3 months ago
They get banned for trolling, griefing, cheating, breaking rules etc. and want revenge. Every game operator has to deal with idiots like this

Dead Comment

bstsb · 3 months ago
the ddos market has been somewhat centered around gaming for a while now, mainly to take down game server competition, or as an attempt to sell big players on "ddos protection" services.

well, gaming and Krebs's blog: https://krebsonsecurity.com/2025/05/krebsonsecurity-hit-with...

jsheard · 3 months ago
Yep, Minecraft servers get DDoSed so often that Cloudflare actually offers turnkey protection for them specifically.

https://www.cloudflare.com/en-gb/application-services/produc...

c420 · 3 months ago
I'm surprised no one has mentioned duping. Selling items and currency for real world money is big bucks and IME, server crashes reliably enable duping exploits.

Not saying that's the case in this particular incident though.

wnevets · 3 months ago
> So why? Like why would someone pay to take a game down?

esports gambling and winning tournaments is big business.

> During the Fortnite Championship Series finals, a pair of pro players may have utilized denial of service attacks to disadvantage contesters [1]

[1] https://fortnitetracker.com/article/1087/ddos-scandal-from-c...

Levitating · 3 months ago
The results are very public, it's the same way IRC is often targeted. They're easy targets, thousands of users are affected and the results are immediately noticeable.
ZeWaka · 3 months ago
A game I work with got hit by ~10Tbps earlier this year. It's likely because someone got mad they were banned.
neilv · 3 months ago
A satisfying theory for a lot of DDoS would be extortion or protection rackets. Pay up or we will DDoS you, or pay up or 'someone else' will DDoS you.

That's enough to explain it. But if you wanted to go more full shadowy conspiracy theory, someone arranged for a protection service that just so happens to work by giving some entity cleartext surveillance over much of the internet. Perhaps as a response to HTTPS everywhere being annoying.

I'm not suggesting that's the situation, but that it's the kind of possibility to keep in mind, intellectually, and it would be consistent with history.

DANmode · 3 months ago
I like the “some entity” bit.
ddtaylor · 3 months ago
> So why? Like why would someone pay to take a game down? I see this all over reddit with different games but I just don't get the point. What's the benefit of taking down an online game for a couple of hours.

Most of the time crime groups are running extortion campaigns, amplification campaigns, etc. For example, if a competitor can benefit from them being down you may be able to sell that. Eventually we will probably see the invention of crowd-funded randsomware, where everyone must submit one verification can of crypto to unlock the hacked game servers.

Hnrobert42 · 3 months ago
Extortion. You got a nice little game server there. Would be a shame if anything happened to it.
diath · 3 months ago
I'm not sure why you're being downvoted, this is literally what keeps happening to me. I run a couple private MMO servers, I regularly get hit with DDoS attacks and clowns like this guy DMing me to demand money to stop attacking my servers:

https://abyss.diath.net/img/20251118055501688.png

vl · 3 months ago
What is even more interesting why attack Azure? It's not possible to extort anything from Microsoft, so what's the rationale?
baby_souffle · 3 months ago
Misdirection. If I knock _you_ offline, its not going to be that difficult for you to put together a probable suspects list with me on it.

If it's going to cost me about the same in terms of resources to target you and a bunch of other people colocated with you, it's a bit less obvious who launched it and why.

RajT88 · 3 months ago
> targeting a specific public IP address

They weren't targeting Azure itself, per se, but some service which was hosted on Azure.

The IP address in question wasn't mentioned, so we're left to speculate what this was about.

markdown · 3 months ago
fortran77 · 3 months ago
Microsoft has succumbed to extortion recently.
andrecarini · 3 months ago
You have a Minecraft server. You generate money from it (selling VIP packages, et cetera). You could generate more money if you had more players. You can have more players if you consistently DDoS other more popular servers; the experience for these players will be horrible and they might give your server a chance.
vintermann · 3 months ago
It may be for market manipulation. It may be extortion against the owning company. It may even be to take down a rival online game for a while.

I don't expect the big publisher games like PUBG to attack each other with DDoS attacks, but casino games? Or even sleazy Minecraft servers? I can totally see it.

giancarlostoro · 3 months ago
Uh I used to get DDoSed by “booter” services whenever I would login to one of my Skype accounts. The script kiddie scene is that petty. In the private server scene one guy would DDoS competing servers that way everyone would funnel to his own.

Its just toxic behavior.

dahcryn · 3 months ago
Speculation online as to the why in this case, it's pure advertisement of their capabilities.
hobs · 3 months ago
Most of the time its just blackmail/extortion - pay us or we do the thing.
wnevets · 3 months ago
> So why? Like why would someone pay to take a game down?

esports gambling is big business

jay_kyburz · 3 months ago
I've always imagined somebody will get pissed-off at me one day for banning them for bad behavior, or because I said something wrong online.
Andrex · 3 months ago
Gamers, am I right?

Deleted Comment

mattwad · 3 months ago
competitors might want to drive users to move away if they think a platform is broken
zaphirplane · 3 months ago
Depends on How much does it cost to hire it
begueradj · 3 months ago
You are questioning the human nature.
dang · 3 months ago
Related. Others?

Cloudflare scrubs Aisuru botnet from top domains list - https://news.ycombinator.com/item?id=45857836 - Nov 2025 (34 comments)

Aisuru botnet shifts from DDoS to residential proxies - https://news.ycombinator.com/item?id=45741357 - Oct 2025 (59 comments)

DDoS Botnet Aisuru Blankets US ISPs in Record DDoS - https://news.ycombinator.com/item?id=45574393 - Oct 2025 (142 comments)

shoddydoordesk · 3 months ago
> it suddenly ballooned in size in April 2025 after its operators breached a TotoLink router firmware update server and infected approximately 100,000 devices

This is scary. Everyone lauds open source projects like OpenWRT but... who is watching their servers?

I imagine you can't run an army of security people on donations and a shoestring budget. Does OpenWRT use digital signing to mitigate this?

nine_k · 3 months ago
Why, OpenWRT firmware and packages are both signed, of course. You can manually and independently check the image signature before flashing an update.

The build infrastructure is, of course, a juicy target: infect the artifact after building but before signing, and pwn millions of boxes before this is detected.

This is why bit-perfect reproducible builds are so important. OpenWRT in particular have that: https://openwrt.org/docs/guide-developer/security#reproducib...

contravariant · 3 months ago
This exchange is somewhat hilarious. Oh how on earth do we keep things safe and secure if everyone can see the code and verify what it does! Who would keep us safe if we turn our backs to unverifiable, unvetted, unprofitable security fixes, by for-profit companies!
elAhmo · 3 months ago
> You can manually and independently check the image signature before flashing an update.

Of course you can. You can also read the ToS before clicking accept, but who does that?

tetha · 3 months ago
Bit-Reproducible infrastructure could also result in some of the wildest build distribution architectures if you think about it. You could publish sources and have people register like in APT mirrors to provide builds, and at the end of the day, the build from the largest bit-equal group is published.

I do see the Tor-Issue - a botnet or a well-supplied malicious actor could just flood it. And if you flip it - if you'd need agreement about the build output, it could also be poisoned with enough nodes to prevent releases for a critical security issue. I agree, I don't solve all supply chain issues in one comment :)

But that in turn could be helped with reputation. Maybe a node needs to supply 6 months of perfect builds - for testing as well - to become eligible. Which would be defeated by patience, but what isn't? It'd just have to be more annoying to breach the distributed build infrastructure than to plant a malicious developer.

This combination of reproducible, deterministic builds, tests across a number of probably-trustworthy sources is quite interesting, as it allows very heavy decentralization. I could just run an old laptop or two here to support. And then come compromise hundreds of these all across the world.

tempest_ · 3 months ago
I don't follow.

> run an army of security people

Do you think these private companies do this? They don't. They pay as little as humanly possible to cover their ass.

Botnets comprised of compromised routers is common and commercial/consumer routers are a far juicer target than openwrt.

bigiain · 3 months ago
> They pay as little as humanly possible to cover their ass.

They probably spend more on the team who ends up writing the "We take your security very seriously" breach notification message than they do on "security people". At least until then get forced into brand-name external Cyber Security Consultants to "investigate" their breach and work out who they can plausibly blame it on that's not part of the C suite.

Aeolun · 3 months ago
> They pay as little as humanly possible to cover their ass.

It’s probably helpful that open source teams aren’t hampered by standards and 20 year outdated audit processes either.

sam_lowry_ · 3 months ago
This is exactly why OpenWRT has no unattended updates by default )
shoddydoordesk · 3 months ago
You are dismissing the seriousness of this. Their package manager is widely used. One would only need to compromise their build servers to wreak havoc.

Didn't they have a vulnerability in their firmware download tool like a minute ago?

The difference between OpenWRT and Linux distros is the amount of testing and visibility. OpenWRT is loaded on to residential devices and forgotten about, it doesn't have professional sysadmins babysitting it 24/7.

Remember the xz backdoor was only discovered because some autist at Microsoft noticed a microsecond difference in performance testing.

sidewndr46 · 3 months ago
The post is nothing more than "but what about security" meant to deflect away from the discussion at hand and towards OpenWRT
whatshisface · 3 months ago
As always, hundreds watch the open repositories, maybe one watches a company's build servers, if they're lucky. :-)
TylerE · 3 months ago
Hundreds watch, but how closely?

Plenty of stories of fairly major projects having evil commits snuck in that remain for months.

Quothling · 3 months ago
I recently had some issues getting one of our embeded devices connect through passive ftp. Because the exact same device worked at a different site I knew it wasn't the device or it's settings. Long story short, it turned out the problematic site hadn't been updating its routers which meant they couldn't VPN passive FTP traffic. Anyway, we have literal thousands of those routers maintained by hundreds of different companies, who are mainly there to maintain the actual mechanical equipment and not the network. Turned out the site where the technicians updated things weren't in the majority.

I'm in the process of getting the business to implement better security, and it's going better than you might expect. If it wasn't because having a plan for how to update your OT security is required to meet EU compliance, however, I doubt we would've done anything beyond making sure we could do passive FTP when it was needed.

As an example, there is still no plans to deal with the OT which we know has build in hardware backdoors from the manufactures. Wnich is around 70% of our dataloggers, but the EU has no compliance rules on that...

immibis · 3 months ago
Digital signing wouldn't defend you from a compromised build server.
mbilker · 3 months ago
What in that act says OpenWrt would be made illegal? If anything, OpenWrt would roll out automated security updates for a supported branched release to comply with these regulations.

Also, if you actually read it, there are exceptions for open source software!

pabs3 · 3 months ago
Reproducible Builds and multiple distributed builders would though.

https://reproducible-builds.org/

helsinkiandrew · 3 months ago
> by exploiting compromised home routers and cameras, mainly in residential ISPs in the United States and other countries,

Presumably it’s possible to log the residential IP of the source of these packets.

Why isn’t there any industry group pushing for the ISPs to a) send the owners an email telling them or b) blocking off all traffic for a period to get them to do something - or is the economic cost higher than caused by the DDoS attacks?

ramon156 · 3 months ago
This already happens in the Netherlands, your router will be put in quarantine mode and you have to prove that the "virus" is gone

This happened to me, at the time I thought it was strange but seeing this event happen it makes a lot more sense now

mrits · 3 months ago
What percentage of the population would have any idea how to do this? How long does it take to go through the process? Is your work, education, and safety just put on pause during this phase?
NooneAtAll3 · 3 months ago
was router not provided by your own isp?
matt-p · 3 months ago
The economic costs of that fall on the (residential) ISPs and they aren't really incurring very much cost in additional bandwidth from the outgoing attacks. In most cases it will be 0. It's not 'good', as it could affect quality to a certain extent for other subscribers and it's theoretically possible it could result in a slightly higher transit bill, but ultimately it's just not really a problem for them.

Setting up the infrastructure to email customers and tell them they've got an infected device is just going to cause the subscriber to: A) Call customer support and tie up an agent who can't really tell them much - you're also going to have to train all your CS agents on these letters and what they mean. B) Complain on faceybook/Churn off your network. or C) They'll ignore it

About one in a million will fix the issue themselves.

BeFlatXIII · 3 months ago
This is why we need an external rogue actor to send those notification emails without ISP consent.
seethishat · 3 months ago
Some of these devices are controlled by the ISP. The TMobile 5G routers for example are pretty much black box devices controlled by TMobile. The home owner can't fix the device and has very limited access (via a mobile app) to 'manage' the device.
phendrenad2 · 3 months ago
I don't think there's a strong overlap between ISP-controlled black boxes and compromised botnet nodes. However, if there is, that just means that the ISPs should be partially held liable.
zoeysmithe · 3 months ago
This has always been the elephant in the room. imho, US intelligence don't want this so congress won't do it. Intelligence controls or buys these botnets when they need them, so regulation here is always impossible to push, but in other countries is more common.
ByThyGrace · 3 months ago
Hmm is there a haveibeenpwned for IP addresses found in botnets? Perhaps correlated at the time of known incidents.

I would like to know if I'm serving a rogue machine and not been paying attention.

mrweasel · 3 months ago
That industry group would need to include the big cloud providers, and they also doesn't want to shut of abusive traffic.
elorant · 3 months ago
Because then the ISPs have to provide support on how to secure those devices.
kwanbix · 3 months ago
I will say most of the time the ISPs themselves provide the routers at residential homes
ulrikrasmussen · 3 months ago
Ironically I can't read this article due to the ongoing Cloudflare explosion.
jadbox · 3 months ago
I am surprised no one has mentioned that today is Microsoft's conference keynote.
johnisgood · 3 months ago
Yup, many links I have tried to access without success. Well, sucks to have such a centralized Internet.
Uptrenda · 3 months ago
Man, if you had that many nodes can you guys imagine how much cool tech you could build with that? Like you could literally rival Tor with one command. Or build a decentralized archive system. Yet, the only thing these nodes will end up doing is being used to prop up some losers ego. Literally what a waste. If you're going to commit crime at least do something cool.
GaryNumanVevo · 3 months ago
Most of the compromised devices are routers or IoT devices, functionally no compute power to do anything interesting except spam IPs with requests.
mgaunard · 3 months ago
You could easily get better performance with a pair of well-optimized high-density cabinets, much more reliable and not even that expensive to operate legitimately.
perfmode · 3 months ago
A DDoS attack is often used to distract a company's security team. While the security staff is scrambling to get the website back online, the attackers use the chaos to conduct a more serious, stealthy attack.
Aachen · 3 months ago
I don't doubt there will have been sporadic examples of this, but what points to this "often" being the case? It seems like a tactic that wouldn't often pay off, since DDoS mitigation rarely involves relaxing security systems

Mistakes can be made during reconfigurations but you'd have to catch those while the issue is still live. Sounds like an advanced threat actor and not the run of the mill ransomware people (not that they're necessarily unsophisticated, but why'd they bother with these odds when there's low-hanging fruit to reliably exploit)

mihaaly · 3 months ago
It was interesting to read that the record breaking attack caused no glitch whatsoever in the service MS provides. Which is so slow normally that I start to wonder if that is a strategy, having headroom for these kind of situations, no-one realizes slowdown when it is already slow. ;)

This is just a crazy thought, tangential to what are happening during an attack.

RajT88 · 3 months ago
There are many things which run well on Azure - built by companies with good dev teams.

https://trends.builtwith.com/websitelist/Microsoft-Azure

Plenty of crappy websites on the list too.

manquer · 3 months ago
or rather the slowness problems of MS has nothing to do with hardware or infrastructure limitations. You cannot just throw infra at a problem to mask poorly written code beyond a point.
bluedino · 3 months ago
IoT is just wave after wave of unsecure devices. There's gotta be a better way.
rdtsc · 3 months ago
The "S" in IoT stands for "security".
N19PEDL2 · 3 months ago
We need IoST!
Razengan · 3 months ago
Internet of Thingsecurity?
heresie-dabord · 3 months ago
> There's gotta be a better way.

Until then... There's gonna be a bigger wave.

tclancy · 3 months ago
You’re gonna need a bigger boat.
rconti · 3 months ago
I suppose ISPs could be more restrictive about which routers they allow their customers to use, but I'm not sure I'm a fan of further lockdown in that department.
mghackerlady · 3 months ago
I doubt that would do much, most people don't even know they can use a non ISP provided router
kachapopopow · 3 months ago
fun fact, part of the reason this botnet exists is because europe required the ability to install security updates unattended that you cannot disable and they compromised one of the servers that had the capability to push these updates compromising hundreds of thousands of routers.
cyberpunk · 3 months ago
That's really impressive finger pointing.

If the vendor can't even secure their update server; how long do you think it would be until some RCE on these 100k un-patchable routers gets exploited?

The only people to blame for this is the vendor, and they failed on multiple levels here. It's not hard to sign a firmware, or even just fetch checksums from a different site than you serve the files from...

alphager · 3 months ago
That's just not true. I'm in Europe and all of my routers allow me to disable unattended updates and most don't enable it by default.
Razengan · 3 months ago
Wait when was this?? Did it fly under the news??