DDoS Botnet Aisuru Blankets US ISPs in Record DDoS

Why ISPs Don’t Aggressively Block Botnet Traffic at the Source

  • Several commenters argue there’s little direct economic incentive: outbound DDoS traffic often doesn’t hurt the ISP as much as it hurts others, and mitigation costs money and risks angering customers.
  • Many residential networks are heavily asymmetric (much more inbound than outbound), so there’s often “room” for large outbound attacks before the ISP feels pain.
  • Abuse handling is labor‑intensive: building convincing reports and coordinating with remote networks is seen as not worth the effort compared to just mitigating inbound traffic.
  • Only now, with multi‑terabit outbound attacks from residential networks, are some ISPs reportedly starting to feel operational pain and consider more serious outbound controls.
  • Some examples exist (e.g., ISPs that quarantine users via captive portals), showing it’s possible but not widespread.

How End Users and Routers Could Help

  • Suggestions: ISPs cut off or rate‑limit compromised customers, routers snapshot per‑device traffic before disconnection, and users hire local services to locate infected devices.
  • Power users note there’s no simple, mainstream way to know if they’re in a botnet; proposals include router‑level monitoring, Pi‑hole DNS anomaly checks, jailed/guest LANs, and better traffic graphs (e.g., opnsense, IPFire).

IoT Insecurity and Regulation Proposals

  • Many see insecure IoT as the core problem: devices re‑infect “within minutes” after reboot. Some say such products are defective and should effectively become bricks; others insist vendors should be forced to patch and support them.
  • Policy ideas:
    • Mandatory recalls for devices participating in DDoS, with strong manufacturer liability.
    • Hard caps on IoT outbound bandwidth (e.g., 10 Mbps) unless explicitly justified.
    • No default passwords, secure onboarding flows, signed firmware, long‑term updates, and possibly ISP‑mandated routers that filter DDoS traffic.
  • Critics warn this risks over‑lockdown, erosion of software freedom (signed‑only ecosystems), and black‑market imports; some prefer periodic DDoS to a “highly regulated internet.”

IPv6, CGNAT, and Blocking Strategies

  • One camp argues widespread IPv6 would let operators block individual compromised addresses or /64s instead of entire CGNAT ranges, making botnet suppression easier and restoring end‑to‑end connectivity.
  • Others with DDoS experience say IPv6 doesn’t fundamentally change the problem: attackers can control large prefixes; defenders still end up blocking bigger ranges, risking collateral damage.
  • There are also privacy concerns around IPv6 address stability, and questions about what business incentives ISPs actually have to deploy IPv6.

Attack Scale and DDoS Mitigation Market

  • Commenters note a jump from ~5 Tbps to nearly 30 Tbps in about a year, overwhelming many DDoS mitigation providers and some traditional hosts (Hetzner, OVH mentioned as seeing issues).
  • Smaller/cheaper mitigation providers are reportedly struggling; large players with huge edge capacity (e.g., Cloudflare, possibly a few others) appear to cope better, raising concerns that serious protection may become affordable only at high monthly cost.
  • Some are surprised that the dominant strategy is “absorb and scrub” rather than blocking near sources; others mention cooperative schemes (like shared routing/flowspec blackholing) but doubt broad ISP participation.

Bandwidth, Hardware, and Botnet Power

  • Contributors link the new scale of attacks to:
    • Widespread FTTH with high upstream (1–2 Gbps) in some regions.
    • Cheap SoCs capable of saturating gigabit links and generating high‑rate traffic.
    • CGNAT making it hard to block individual compromised users without impacting many others.
  • There’s debate over how common symmetric gigabit really is; some say it’s routine on fiber, others call it rare outside specific markets.

Targets and Motives (Minecraft, Games, Extortion)

  • Many attacks reportedly focus on Minecraft and other online games.
  • Hypotheses: extortion (“buy DDoS protection or stay down”), emotional players paying to knock out rivals, or low‑profile targets that avoid attention from law enforcement and big security teams.
  • Some note the engineering challenge of building very large botnets, but acknowledge diminishing returns once they’re already huge.

Governance, Freedom, and “Authoritarian” Risks

  • A visible thread worries that every major DDoS incident will be used to justify tighter control over networking, devices, and software.
  • Speculative comments suggest that powerful intermediaries (e.g., CDNs, DDoS vendors) benefit from a threat landscape that drives everyone onto their platforms, prompting suspicion about incentives.

User‑Level Concerns and Practicalities

  • Some ask for concrete tools to detect compromised devices at home; responses mostly mention router graphs, separate VLANs/guest networks, and ISP usage meters (with skepticism about what ISPs actually share).
  • Others suggest simple baseline rules: no remote login for IoT outside the local network, mandatory guest networks/proxies, and default network isolation for untrusted devices.

Responsibility and Liability

  • Strong calls appear for:
    • Regulating ISPs to detect, alert, and disconnect compromised customers.
    • Regulating device makers and retail/logistics platforms so insecure or noncompliant devices can’t be sold.
    • Potential tort liability for harm caused by grossly insecure devices.
  • Counterpoints emphasize cost to consumers, dead vendors (no one left to patch), and the risk that over‑broad rules would also hit general‑purpose computers or encourage locked‑down “appliance” designs.