Acquiring networks of compromised devices , IoT routers, cameras, and servers weaponized for DDoS, proxy relay, and command obfuscation...
The explosive growth of IoT devices and botnet-for-hire services has made botnet acquisition one of the most dangerous and accessible threats in modern cybersecurity.
The scale of the botnet threat has reached unprecedented levels. According to a Zayo Group report, DDoS attacks surged 82% from 2023 to 2024, escalating from 90,000 to 165,000 incidents globally, driven primarily by the proliferation of IoT devices and AI-enhanced attack capabilities. Since the end of 2024, a large-scale IoT botnet leveraging Mirai and Bashlite variants has been launching devastating DDoS attacks against targets worldwide, exploiting known vulnerabilities in routers, IP cameras, and other internet-facing edge devices. The barrier to entry has never been lower , booter and stresser services offer subscription-based access to powerful botnets for as little as $10–$50 per month, enabling even unsophisticated threat actors to launch attacks capable of knocking major services offline.
State-sponsored actors have also embraced botnet infrastructure as a critical operational tool. Microsoft's Silk Typhoon group (March 2025) was observed building and deploying Operational Relay Box (ORB) networks , clusters of compromised SOHO routers, IoT devices, and VPS servers , to obfuscate their command-and-control communications and proxy malicious traffic through legitimate infrastructure. ORB networks make attribution extremely difficult by routing attacks through dozens of intermediary devices owned by innocent third parties, and they serve as resilient proxy layers that can survive the takedown of individual nodes. The MITRE ATT&CK framework classifies botnet acquisition as T1583.005, underscoring the technique's central role in adversary resource development strategies.
Internet-facing edge devices that are end-of-life (EOL) and no longer receive security patches represent the primary recruitment pool for botnets. Home routers, IP cameras, smart TVs, network-attached storage devices, and industrial control system sensors are routinely compromised and added to botnet armies numbering in the hundreds of thousands. The Aisuru botnet emerged in 2025 as a record-breaking threat, driving DDoS attacks exceeding 22.2 Tbps through a global network of compromised devices. Defenders must understand that botnets are not merely tools for volumetric attacks , they function as covert proxy networks for C2 communications, reconnaissance platforms, and data exfiltration channels that blend malicious traffic with legitimate network activity.
Understanding the vocabulary of botnet operations is essential for both threat hunters and defenders.
Acquiring or Leasing a Botnet (T1583.005) refers to the process by which adversaries obtain access to a network of compromised systems that can be instructed to perform coordinated tasks. A botnet is a collection of infected devices , often internet-facing edge devices like routers, IP cameras, IoT sensors, and servers , that are remotely controlled by a command-and-control (C2) server. Adversaries may purchase subscriptions to existing botnets through booter/stresser services, lease Operational Relay Box (ORB) networks consisting of VPS instances and compromised SOHO devices, or build their own botnets by exploiting known vulnerabilities in end-of-life devices. Botnets enable adversaries to launch distributed denial-of-service (DDoS) attacks, proxy their C2 communications through layers of compromised infrastructure, conduct reconnaissance at scale, and obfuscate the true origin of malicious activity.
Like renting an army of remote-controlled robots scattered across the world , each robot does a small task, but together they can overwhelm any target. Imagine thousands of small drones, each sitting in someone's home, quietly waiting for orders. When the controller says "attack," they all simultaneously fly toward the same building, creating a traffic jam so massive that no one can get in or out. Meanwhile, some drones act as relay stations, bouncing the controller's signals through multiple houses so the true source of the orders can never be traced. That's exactly how a botnet works: compromised routers, cameras, and smart devices receive commands from a C2 server and coordinate to flood a target with traffic, while ORB nodes mask the attacker's real location through chains of proxy connections.
A realistic portrayal of how adversaries leverage botnet infrastructure in targeted operations.
Chen Wei is a mid-level operator working for a financially motivated threat group. His assignment is to conduct a multi-phase operation against a regional financial services company. He begins by subscribing to a booter service on a dark web marketplace for $50/month, gaining access to a botnet of approximately 15,000 compromised IoT devices , primarily home routers, IP cameras, and smart plugs located across Southeast Asia and Eastern Europe. The booter service provides a clean web-based control panel where Chen can specify target IPs, select attack types (HTTP flood, UDP amplification, SYN flood), and adjust duration and intensity.
Chen accesses the booter service through Tor and configures his attack parameters. He also separately leases an ORB network of 200 compromised SOHO routers from another vendor, paying $200/month in Monero. The ORB nodes will serve as a proxy layer for his C2 communications, routing all command traffic through innocent third-party devices to mask his true location.
Before launching the main attack, Chen uses the botnet's IoT devices as proxy nodes to conduct reconnaissance against the target. He routes port scans and vulnerability probes through 50 different compromised routers, making the scanning traffic appear to originate from residential IP addresses across multiple countries. This distributed reconnaissance avoids triggering rate-based detections and geolocation alerts that a single-source scan would trigger.
Chen launches a coordinated DDoS attack against the target's public-facing web servers, directing 8,000 botnet nodes to simultaneously send HTTP flood requests. The attack generates 450 Gbps of traffic, overwhelming the target's DDoS mitigation service and drawing the attention of the security operations center (SOC). While the SOC is focused on mitigating the volumetric attack, Chen's team exploits a separate vulnerability in the target's VPN gateway using credentials obtained through the reconnaissance phase.
With initial access established, Chen routes all C2 beacon traffic through the ORB network. Each command from his C2 server passes through 3–5 compromised SOHO routers before reaching the implanted malware on the target's network. The ORB chain rotates every 4 hours, with compromised nodes being cycled in and out to prevent pattern detection. Traffic analysis tools see only connections to residential IP addresses in various countries , consistent with normal user behavior , rather than connections to known malicious infrastructure.
Despite Chen's precautions, several indicators could reveal the botnet activity: the DDoS attack shows anomalous traffic patterns from IoT device IP ranges; ORB relay nodes exhibit unusual outbound connection patterns (long-lived TLS sessions to diverse destinations); and several of the compromised SOHO routers in the ORB chain have known vulnerabilities associated with Mirai variants. A threat hunter correlating these signals could identify the ORB network and trace it back to the C2 infrastructure.
How adversaries systematically acquire, configure, and deploy botnet infrastructure for operations.
Assess operational needs to determine the type, size, and capabilities of the botnet or ORB network required.
Find and evaluate commercial botnet-for-hire services or dark web vendors offering ORB network access.
Complete the acquisition transaction and configure botnet access with security precautions.
Incorporate the botnet and ORB network into the broader operational plan and attack infrastructure.
Deploy the botnet for its intended purpose: volumetric attacks, C2 proxying, or reconnaissance.
Sustain operational access by refreshing compromised nodes and adapting to defensive countermeasures.
Adversary pitfalls and defender strategies for botnet-related threats.
Contrasting adversarial and defensive perspectives on botnet infrastructure.
Anonymity Through Proxy Chains: ORB networks provide multiple layers of relay between the attacker and the target. Each connection hop passes through a compromised SOHO device, making traffic attribution nearly impossible without analyzing the entire chain.
DDoS as Distraction: Volumetric attacks serve a dual purpose , they degrade the target's security posture by overwhelming monitoring systems, creating noise that masks the real exploitation activity happening simultaneously.
Low Cost, High Impact: Booter services offer attack capacity that would cost millions to build from scratch. For $50/month, an attacker gains access to thousands of compromised devices and can launch attacks generating hundreds of Gbps of traffic.
Distributed Reconnaissance: Spreading scanning and probing activity across hundreds of botnet nodes makes each individual probe appear as low-volume, residential-sourced traffic that blends with normal user activity and evades rate-based detection.
IoT Security Posture: The most effective defense begins with securing the devices that botnets recruit. Default credential changes, firmware updates, network segmentation, and EOL device replacement dramatically reduce the pool of exploitable devices.
DDoS Mitigation Architecture: Multi-layer DDoS protection combining upstream scrubbing (ISP/CDN-level), on-premises rate limiting, and application-layer defenses ensures volumetric attacks can be absorbed without impacting business operations.
Traffic Analysis & ORB Detection: Advanced defenders use netflow analysis, TLS fingerprinting, and beacon pattern detection to identify compromised devices being used as ORB relay nodes, even when the relayed traffic appears superficially legitimate.
Threat Intelligence Correlation: Subscribing to botnet intelligence feeds that provide lists of known C2 servers, compromised device IP ranges, and botnet malware signatures enables proactive blocking of botnet-related traffic before it reaches critical infrastructure.
Proactive hunting hypotheses and detection strategies for botnet infrastructure in your environment.
Hypothesis 1 , Unusual Outbound Traffic Patterns: Compromised devices within the network may exhibit anomalous outbound connection patterns, including connections to destinations in unusual geographic regions, connections at unusual times (consistent with C2 beaconing schedules), or high volumes of outbound traffic to single destinations that are inconsistent with normal device behavior. Hunters should baseline normal IoT device traffic and alert on deviations exceeding 2 standard deviations.
Hypothesis 2 , Connections to Known Botnet C2 Infrastructure: Internal systems or IoT devices may be connecting to IP addresses or domains associated with known botnet command-and-control servers. Cross-referencing outbound connection logs with threat intelligence feeds (AbuseIPDB, Spamhaus DROP lists, MITRE ATT&CK CTI) can reveal devices that have been recruited into active botnet campaigns.
Hypothesis 3 , IoT Device Behavioral Anomalies: Smart cameras, routers, and other IoT devices that suddenly begin generating large volumes of DNS requests, initiating outbound connections on non-standard ports, or exhibiting increased CPU/memory utilization may indicate compromise by botnet malware. Mirai and its variants typically exploit Telnet (port 23) or SSH (port 22) with default credentials to propagate.
Hypothesis 4 , ORB Network Relay Indicators: Devices acting as Operational Relay Boxes exhibit distinctive traffic patterns: they receive inbound connections from few sources but initiate outbound connections to many destinations, they maintain long-lived TLS sessions with consistent timing (beacon intervals), and their traffic volume ratios (inbound vs outbound) are inverted compared to normal devices. Network flow data analysis can identify these relay patterns.
Network Flow Analysis: Query netflow/Zeek logs for IoT device subnets showing outbound connections to more than 10 unique external destinations within a 24-hour period, or devices with sustained connections exceeding 4 hours to single external IPs. Pay particular attention to devices connecting on ports 23, 2323, 80, 8080, and 443 with consistent timing intervals (indicating C2 beaconing).
DNS Query Monitoring: Alert on IoT devices generating more than 100 DNS queries per hour, resolving domains associated with known botnet families, or querying DGA (Domain Generation Algorithm) domains. Botnet malware frequently uses DGA to generate unpredictable C2 domain names that evade static blocklists.
TLS Fingerprint Analysis: Use JA3/JA3S fingerprinting to identify botnet malware by its TLS client characteristics. Mirai variants, for example, have distinctive TLS fingerprints that differ from legitimate IoT device TLS implementations. Correlate unusual JA3 hashes with outbound connection destinations to identify potential C2 communication.
Botnet acquisition is one component of the broader infrastructure acquisition lifecycle. Explore related techniques and sub-techniques.
Explore the full spectrum of infrastructure acquisition and access techniques that adversaries combine with botnet operations.
Every contribution moves us closer to our goal: making world-class cybersecurity education accessible to ALL.
Choose the amount of donation by yourself.