Overview
- Microsoft reports the October 24 attack peaked at 15.72 Tbps and nearly 3.64 billion packets per second against a single public IP in Australia.
- Azure attributes the assault to the Aisuru Turbo Mirai–class IoT botnet, which compromises home routers and cameras across residential ISPs.
- More than 500,000 source IPs delivered extremely high‑rate UDP floods with minimal spoofing and random source ports, aiding traceback and provider enforcement.
- Azure’s globally distributed DDoS Protection automatically detected the multi‑vector floods and filtered traffic without disrupting customer availability.
- Researchers tie Aisuru to prior record events, including Cloudflare’s 22.2 Tbps attack in September and an earlier 11.5 Tbps incident, with growth accelerated by a TotoLink firmware server breach and followed by Cloudflare redacting manipulated DNS‑ranked domains.