New Eleven11bot DDoS botnet powered by 80,000 hacked devices

New Eleven11bot DDoS botnet powered by 80,000 hacked devices

Security researchers have spotted one of the largest Distributed Denial of Service (DDoS) botnets in recent years. The new botnet, named Eleven11bot, was first detected by Nokia’s Deepfield Emergency Response Team, which observed hyper-volumetric DDoS attacks carried out by the botnet’s operators.

In February, Nokia reported that Eleven11bot had already compromised approximately 30,000 devices, mainly targeting security cameras and network video recorder (NVR) devices. However, a subsequent report from the non-profit cybersecurity organization Shadowserver Foundation revealed that its own scanning identified 86,400 Internet of Things (IoT) devices compromised by the botnet.

The affected devices are scattered across the globe, with the largest number in the United States, where 25,000 devices have been infected. Other impacted countries include the United Kingdom (10,000), Canada (4,000), and Australia (3,000).

“Its size is exceptional among non-state actor botnets, making it one of the largest DDoS botnet campaigns observed since the invasion of Ukraine in February 2022,” said security researcher at Nokia Jerome Meyer.

Eleven11bot has been linked to a series of highly disruptive DDoS attacks across several sectors, including gaming and communications. Some of these attacks have lasted for days, crippling online services and networks. According to Meyer, the intensity of the attacks has fluctuated widely, ranging from several hundred thousand to several hundred million packets per second (pps), often overwhelming targeted systems.

In addition to Nokia, other cybersecurity firms are now tracking Eleven11bot closely. Attack surface management company Censys has identified over 1,400 IP addresses linked to the botnet, based on endpoint device configurations and banners. Threat intelligence firm GreyNoise has detected more than 1,000 IP addresses targeting its honeypots.

Notably, GreyNoise has reported that 61% of the IPs they observed appear to be originating from Iran. While the company has refrained from making definitive statements regarding attribution, it did note the significant timing of these increased botnet activities, which came just two days after the U.S. government imposed new economic sanctions on Iran as part of its "maximum pressure" campaign.

Eleven11bot primarily spreads through brute-force attacks, exploiting weak or default IoT device passwords, and targeting exposed SSH and Telnet ports through network scans.


Back to the list

Latest Posts

UAT-5918 info-stealing campaign targets critical infrastructure entities in Taiwan

UAT-5918 info-stealing campaign targets critical infrastructure entities in Taiwan

The tactics and tools employed by UAT-5918 overlap with other state-sponsored threat groups, such as Volt Typhoon, Flex Typhoon, and Earth Estries.
20 March 2025
New supply chain attack allows to inject malicious code via AI code editors

New supply chain attack allows to inject malicious code via AI code editors

By exploiting hidden unicode characters and employing advanced evasion techniques, attackers can subtly alter the behavior of AI models.
19 March 2025
Russian disinformation actors employ new tactics to maintain influence

Russian disinformation actors employ new tactics to maintain influence

Rather than immediately deploying newly registered domains, many threat actors now secure domain names months in advance.
19 March 2025