In early January 2025, the cybersecurity landscape is already experiencing significant disruptions, particularly driven by the proliferation of Internet of Things (IoT) devices. Researchers report an uptick in Distributed Denial of Service (DDoS) attacks that target various IoT-connected devices, including home routers and surveillance cameras. As these devices become increasingly integrated into daily operations, their vulnerabilities are being exploited, making them prime candidates for malicious exploitation.
A recent report from Cloudflare, a leading content delivery network, highlighted a staggering DDoS attack that peaked at 5.6 terabits per second, setting a new record for the most substantial DDoS attack documented to date. This massive traffic surge was directed at an unidentified Cloudflare client, emanating predominantly from 13,000 IoT devices that had succumbed to a variant of the notorious Mirai malware. This malware, known for its ability to harness IoT devices for large-scale attacks, serves as a stark reminder of the ongoing threat within the cybersecurity landscape.
Concurrently, security firm Qualys uncovered a significant ongoing operation referred to as the Murdoc Botnet. Investigations revealed that this botnet exploits specific vulnerabilities to deploy a Mirai variant primarily on devices such as AVTECH cameras and Huawei HG532 routers. Just hours after Qualys shared its findings, the number of compromised IP addresses surged from 1,300 to over 1,500, suggesting a rapid escalation in the botnet’s reach. It remains unclear whether the botnets identified by Qualys and Cloudflare are part of the same infrastructure, although both incidents underline the escalating DDoS threat from compromised devices.
In addition to these vulnerabilities, Trend Micro reported the emergence of another IoT botnet driven by Mirai and Bashlite variants. This botnet has been actively involved in executing large-scale DDoS actions, with particular emphasis on targets located in Japan. Such revelations accentuate the global nature of IoT-driven attacks and the necessity for businesses to enhance their cybersecurity postures.
Infoblox added to the discourse with a report detailing a botnet composed of 13,000 predominantly MikroTik routers. Researchers characterized this botnet as “a large cannon, poised and ready to unleash a barrage of malicious activities,” highlighting its capacity for extensive spam campaigns designed to deceive recipients into executing harmful file attachments. The malicious activities from this botnet underscore the multifaceted nature of threats that businesses face in securing their infrastructure against various forms of attack.
These recent developments suggest a shift in the landscape of cyber threats where IoT devices are becoming increasingly prevalent vectors for attacks. The potential tactics and techniques indicated by the MITRE ATT&CK framework include initial access through exploitation of known vulnerabilities, persistence via malware installation, and execution techniques for executing malicious payloads. Understanding these tactics is critical for business owners seeking to mitigate risks associated with IoT vulnerabilities.
As organizations continue to adopt IoT technology, the imperative to bolster security measures has never been more pressing. The surge in DDoS attacks and the exploitation of vulnerable IoT devices not only impact individual businesses but also have broader implications for the integrity of the internet as a whole. Cybersecurity strategies should prioritize the identification and remediation of vulnerable devices, employ network segmentation, and enforce strong access controls to mitigate potential threats effectively.