frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

DDoS Botnet Aisuru Blankets US ISPs in Record DDoS

https://krebsonsecurity.com/2025/10/ddos-botnet-aisuru-blankets-us-isps-in-record-ddos/
57•JumpCrisscross•2h ago

Comments

Groxx•1h ago
I'm honestly kinda curious why nobody's blocking these IPs from sending data near the source.

Like, I can come up with plenty of possible reasons, and reasons why it could potentially be very bad if ISPs started cracking down on this, but I don't actually know any reasons.

Are any talking about why / why not? It seems like this whole insecure-IoT-device thing would probably dry up pretty quickly if people's internet was cut off when one was detected. They can then turn around and lambast / sue / etc the company that sold it, putting pressure on the source of the problem. Right now there's no reason for sellers to do anything at all to ensure security, afaict.

So... not actually arguing in favor of it, but definitely curious about any stated ISP / core networking system's stated reasons.

bombcar•1h ago
There's no economic incentive for YOU (as the proximate ISP) to do anything about it, it would cost money, and cost you customers.

Any idea why they don't fix it?

martinald•1h ago
Of course there is. If you've got all your internet egress tied up with DDoS attacks from your network it is a big problem.
bombcar•24m ago
I think we’re just starting to see attacks that big - which might start some practical mitigations (or they’ll just upgrade transit).
toast0•16m ago
Most eyeball networks have a lot of inbound traffic and not very much outbound, but interconnections with other networks are almost always symmetric, so there's a lot of room for excess egress before it causes pain to the ISP.

When I ran a large web site that attracted lots of DDoS, it didn't really seem worthwhile to track down the source and try to contact ISPs. I had done a lot of trying to track and stop people sending phishing mail under our name, and it's simply too much work to write a reasonable abuse report that is unlikely to be followed up on. With email, mostly people seem to accept the Received headers are probably true; with DDoS, you'd be sending them pcaps, and they'd be telling you it's probably spoofed, and unless I've got lots of peering, I'm not going to be able to get captures that are convincing... so just do my best to manage the inbound and call it a day.

Groxx•1h ago
Yes, you generally see this kind of thing start from the pain-feelers and move up the chain to the pain-causers.

So why hasn't that happened? These are clearly damaging to many, and ISPs are apparently doing next to nothing to prevent it, and it has been extremely clear for a while now that it's going to just become a bigger and bigger problem.

Mindless2112•1h ago
> “The outbound and cross-bound DDoS attacks can be just as disruptive as the inbound stuff,” Dobbin said. “We’re now in a situation where ISPs are routinely seeing terabit-per-second plus outbound attacks from their networks that can cause operational problems.”

ISPs are starting to feel the pain, so perhaps in the near future they will do something about it.

dloy•1h ago
Perhaps, or perhaps not. Maybe if we held them accountable they would?
kibbel•1h ago
A large part of the article is dedicated to this, noting how disruptive it is to other services and customers, and listing a few countermeasures (detection and blocking at the ISP level, detection and blocking at the router level, and educating customers on not buying vulnerable IoT trash).
Groxx•1h ago
Not really? At best it's "DDOS prevention sellers are having trouble" and "ISPs say they're doing fine". The vast majority of the article is talking about the various kinds of malware causing this, and how some have been "fixed" by stopping the individuals running it (which clearly doesn't work very well, new ones just fill the void).

Or this:

>“The crying need for effective and universal outbound DDoS attack suppression is something that is really being highlighted by these recent attacks,” Dobbins continued. “A lot of network operators are learning that lesson now, and there’s going to be a period ahead where there’s some scrambling and potential disruption going on.”

Uh. No. That's gross negligence if they are only starting to think about it now - the trend has been clear for over a decade, and the IoT threat has been obvious since day 1 and even blasted over public news for the past few years. Their status is pretty much only one of: incompetent, malicious, or they have had plans but haven't acted on them fast enough or strongly enough for [some reason], and that reason isn't something I've seen. Surprises happen, prevention costs money and time, and there are plenty of reasons why everyone isn't already prepared for everything, so I think "incompetent or malicious" is pretty rare.... but what are those reasons?

MartijnBraam•1h ago
This does happen, but it seems to depend on the ISP. In the Netherlands I've seen ISPs block the internet connectivity when they've detected infected devices, sometimes they send a letter before blocking and some ISPs seem to dump your internet connection in a captive portal. In all these cases it's been enough to call the ISP after finding the problem and you're connected again minutes later.
TZubiri•52m ago
> They can then turn around and lambast / sue / etc the company that sold it, putting pressure on the source of the problem

Or just unplug the culprit. But the key seems to be that the device continues working. Ideally you would just shutdown or disconnect the device. If fridge is infected, the fridge can still fridge, but it no longer has internet privileges.

quantummagic•44m ago
Any device that participates in a DDOS needs to be recalled by the manufacturer, mandated by law. Make it potentially economically crippling to sell a vulnerable device, and security will be taken very seriously. Frivolous uses of tech, won't be worth the risk.
DaSHacka•38m ago
This just in: every computer manufacturer forced to recall every single computer model they've ever sold because some users use weak passwords.

I can't wait for all of them to switch to IOS-ified devices incapable of installing alternative operating systems or programs, as that would be the inevitable end solution for all these manufacturers if this was implemented.

quantummagic•24m ago
Maybe that's a good thing; relying on users to choose good passwords is a cop-out. Systems should be safe-by-default. And owners losing their system if it participates in a DDOS, would add to the incentives to stop the nonsense. It persists because perpetrators, and those who unwittingly abet them, feel no consequences.
DaSHacka•8m ago
At that point, you should force the pain on the individual themselves. Why should all of us be handicapped because there's a couple morons that can't set decent passwords and connect their devices directly to the internet?

Even if the device removed the capability for passwords and used key based authentication, connecting it directly to the internet means if there's ever a vulnerability, all that was for naught anyway.

martinald•1h ago
This really is a function of two things:

1) (Mainly) the huge increase in upstream capacity of residential broadband connections with FTTH. It's not uncommon for homes to have 2gbit/sec up now and certainly 1gbit/sec is fairly commonplace, which is an enormous amount of bandwidth compared to many interconnects. 10, 40 and 100gbit/sec are the most common and a handful of users can totally saturate these.

2) Many more powerful IoT devices that can handle this level of attack outbound. A $1 SoC can easily handle this these days.

3) Less importantly, CGNAT is a growing problem. If you have 10k (say) users on CGNAT that are compromised, it's likely that there's at least 1 on each CGNAT IP. This means you can't just null route compromised IPs as you are effectively null routing the entire ISP.

I think we probably need more government regulation of these IoT devices. For example, having a "hardware" limit of (say) 10mbit/sec or less for all networking unless otherwise required. 99% all of them don't need more than this.

nick32661123•48m ago
Seems more likely that residential modems will be required to use ISP-provided equipment that has government mandated chips, firmware, etc to filter outbound traffic for DDoS prevention.
DaSHacka•42m ago
Why should they be required to have hardware in their own network to filter that out when the ISP is obviously receiving all of their traffic anyway?
toast0•23m ago
> 3) Less importantly, CGNAT is a growing problem. If you have 10k (say) users on CGNAT that are compromised, it's likely that there's at least 1 on each CGNAT IP. This means you can't just null route compromised IPs as you are effectively null routing the entire ISP.

Null routing is usually applied to the targets of the attack, not the sources. If one of your IPs is getting attacked, you null route it, so upstream routers drop traffic instead of sending it to you.

bsder•18m ago
> If you have 10k (say) users on CGNAT that are compromised, it's likely that there's at least 1 on each CGNAT IP. This means you can't just null route compromised IPs as you are effectively null routing the entire ISP.

How about we actually finally roll out IPv6 and bury CGNAT in the graveyard where it belongs?

Suddenly, everybody (ISPs, carriers, end users) can blackhole a compromised IP and/or IP range without affecting non-compromised endpoints.

And DDoS goes poof. And, as a bonus, we get the end to end nature of the internet back again.

gjsman-1000•13m ago
> I think we probably need more government regulation of these IoT devices. For example, having a "hardware" limit of (say) 10mbit/sec or less for all networking unless otherwise required. 99% all of them don't need more than this.

What about DDoSs that come from sideloaded, unofficial, buggy, or poorly written apps? That's what IoT manufacturers will point to, and where most attacks historically come from. They'll point to whether your Mac really needs more than 100mbps.

The government is far more likely to figure it out along EU lines: Signed firmware, occasional reboots, mandatory security updates for a long-term period, all other applicable "common sense" security measures. Signed firmware and the sideloading ID requirements on Android also helps to prevent stalkerware, which is a growing threat far scarier than some occasional sideloaded virus or DDoS attack. Never assume sideloading is consensual.

spatley•1h ago
Seems pretty clear that the US needs strict regulation on any device connecting to the internet.

* no default password * * no login if not on the local wifi or wired ethernet *

dehrmann•43m ago
I'd rather the industry standardizes on some sort of guest network and proxy/hub. It could even ship with hardware from ISPs. Separating the network buys you a lot of security, and running everything through a proxy makes it easier to inspect data and creates a standard hook for using abandonware.
DaSHacka•41m ago
Many manufacturers are already moving there of their own accord. I really don't think we'd need some legislation to fix this problem.
bikelang•11m ago
Are there any practical ways to monitor my home network traffic and detect if any devices on my network are compromised?
lgeek•8m ago
This is very challenging, in about one year the biggest recorded DDoS attack has increased from 5 Tbps to almost 30.

Almost all of the DDoS mitigation providers have been struggling for a few weeks because they just don't have enough edge capacity.

And normal hosting companies that are not focused on DDoS mitigation also seem to have had issues, but with less impact to other customers as they'll just blackhole addresses under larger attacks. For example, I've seen all connections to / from some of my services at Hetzner time out way more frequently than usual, and some at OVH too. Then one of my smaller hosting providers got hit with an attack of at least 1 Tbps which saturated a bunch of their transit links.

Cloudflare and maybe a couple of the other enterprise providers (Gcore?) operate at a large enough scale to handle these attacks, but all the smaller ones (who tend to have more affordable rates and more application-specific filters for sensitive applications that can't deal with much leakage) seem to be in quite a bad spot right now. Cloudflare Magic Transit pricing supposedly starts at around $4k / month, and it would really suck if that became the floor for being able to run a non-HTTP service online.

Something like Team Cymru's UTRS service (with Flowspec support) could potentially help to mitigate attacks at the source, but residential ISPs and maybe the T1s would need to join it, and I don't see that happening anytime soon.

koakuma-chan•6m ago
Big botnet has nothing better to do than DDoS Minecraft servers?

DDoS Botnet Aisuru Blankets US ISPs in Record DDoS

https://krebsonsecurity.com/2025/10/ddos-botnet-aisuru-blankets-us-isps-in-record-ddos/
57•JumpCrisscross•2h ago•29 comments

NanoChat – The best ChatGPT that $100 can buy

https://github.com/karpathy/nanochat
849•huseyinkeles•10h ago•176 comments

Dutch government takes control of Chinese-owned chipmaker Nexperia

https://www.cnbc.com/2025/10/13/dutch-government-takes-control-of-chinese-owned-chipmaker-nexperi...
295•piskov•15h ago•229 comments

Sony PlayStation 2 fixing frenzy

https://retrohax.net/sony-playstation-2-fixing-frenzy/
44•ibobev•2h ago•15 comments

First device based on 'optical thermodynamics' can route light without switches

https://phys.org/news/2025-10-device-based-optical-thermodynamics-route.html
112•rbanffy•5d ago•16 comments

Show HN: SQLite Online – 11 years of solo development, 11K daily users

https://sqliteonline.com/
338•sqliteonline•12h ago•114 comments

Show HN: AI toy I worked on is in stores

https://www.walmart.com/ip/SANTA-SMAGICAL-PHONE/16364964771
57•Sean-Der•1d ago•57 comments

JIT: So you want to be faster than an interpreter on modern CPUs

https://www.pinaraf.info/2025/10/jit-so-you-want-to-be-faster-than-an-interpreter-on-modern-cpus/
84•pinaraf•1d ago•15 comments

Modern iOS Security Features – A Deep Dive into SPTM, TXM, and Exclaves

https://arxiv.org/abs/2510.09272
108•todsacerdoti•7h ago•2 comments

No Science, No Startups: The Innovation Engine We're Switching Off

https://steveblank.com/2025/10/13/no-science-no-startups-the-unseen-engine-were-switching-off/
260•chmaynard•12h ago•241 comments

Accidentally Made a Zig Dotenv Parser

https://dayvster.com/blog/accidentally-made-a-zig-dotenv-parser/
21•ibobev•5d ago•2 comments

Strudel REPL – a music live coding environment living in the browser

https://strudel.cc
91•birdculture•7h ago•16 comments

StreamingVLM: Real-Time Understanding for Infinite Video Streams

https://arxiv.org/abs/2510.09608
7•badmonster•1h ago•0 comments

LLMs are getting better at character-level text manipulation

https://blog.burkert.me/posts/llm_evolution_character_manipulation/
43•curioussquirrel•6h ago•11 comments

Smartphones and being present

https://herman.bearblog.dev/being-present/
190•articsputnik•11h ago•126 comments

Hackers can steal 2FA codes and private messages from Android phones

https://arstechnica.com/security/2025/10/no-fix-yet-for-attack-that-lets-hackers-pluck-2fa-codes-...
40•sipofwater•1h ago•27 comments

Thoughts on Omarchy: Slick distro, complicated ethics

https://tedium.co/2025/10/13/omarchy-linux-distro-commentary/
32•raybb•4h ago•35 comments

Why did containers happen?

https://buttondown.com/justincormack/archive/ignore-previous-directions-8-devopsdays/
54•todsacerdoti•14h ago•63 comments

Abstraction, not syntax

https://ruudvanasseldonk.com/2025/abstraction-not-syntax
65•unripe_syntax•16h ago•31 comments

Root cause analysis? You're doing it wrong

https://entropicthoughts.com/root-cause-analysis-youre-doing-it-wrong
89•davedx•2d ago•64 comments

JSON River – Parse JSON incrementally as it streams in

https://github.com/rictic/jsonriver
155•rickcarlino•5d ago•74 comments

Scaling request logging with ClickHouse, Kafka, and Vector

https://www.geocod.io/code-and-coordinates/2025-10-02-from-millions-to-billions/
101•mjwhansen•5d ago•17 comments

Optery (YC W22) – Hiring Tech Lead with Node.js Experience (U.S. & Latin America)

https://www.optery.com/careers/
1•beyondd•8h ago

Uv overtakes pip in CI

https://wagtail.org/blog/uv-overtakes-pip-in-ci/
151•ThibWeb•1w ago•114 comments

America is getting an AI gold rush instead of a factory boom

https://www.washingtonpost.com/business/2025/10/13/manufacturing-artificial-intelligence/
84•voxleone•10h ago•113 comments

Roger Dean – His legendary artwork in gaming history (Psygnosis)

https://spillhistorie.no/2025/10/03/legends-of-the-games-industry-roger-dean/
91•thelok•11h ago•22 comments

Android's sideloading limits are its most anti-consumer move

https://www.makeuseof.com/androids-sideloading-limits-are-anti-consumer-move-yet/
583•josephcsible•10h ago•386 comments

Don't Be a Sucker (1943) [video]

https://www.youtube.com/watch?v=vGAqYNFQdZ4
282•surprisetalk•5h ago•87 comments

America's future could hinge on whether AI slightly disappoints

https://www.noahpinion.blog/p/americas-future-could-hinge-on-whether
58•jxmorris12•8h ago•54 comments

Software update bricks some Jeep 4xe hybrids over the weekend

https://arstechnica.com/cars/2025/10/software-update-bricks-some-jeep-4xe-hybrids-over-the-weekend/
318•gloxkiqcza•11h ago•217 comments