The Aisuru botnet, previously known for launching distributed denial-of-service (DDoS) attacks, has evolved its operations to focus on hijacking residential internet connections to create a vast network of residential proxies. This shift marks a significant change in the botnet's modus operandi, leveraging compromised devices to mask malicious traffic and evade detection. Residential proxies offer cybercriminals a stealthier way to conduct various illicit activities, including data scraping, fraud, and evading geo-restrictions. The article details how Aisuru's operators have adapted their malware to exploit vulnerabilities in consumer devices, turning them into proxy nodes. This transition underscores the growing trend of botnets moving beyond traditional DDoS attacks to more sophisticated and profitable cybercrime ventures. Security experts emphasize the importance of securing home networks and IoT devices to prevent such compromises. The piece also highlights the challenges in detecting and mitigating residential proxy networks due to their decentralized and legitimate-appearing traffic patterns. Overall, the article provides an in-depth analysis of Aisuru's operational shift and its implications for cybersecurity defenses.
This Cyber News was published on krebsonsecurity.com. Publication date: Wed, 29 Oct 2025 00:55:21 +0000