Gaming’s Black Monday
October 7, 2025, marked an unprecedented service outage for gamers worldwide. Steam, Epic Games Store, Riot Games, and other major gaming platforms simultaneously crashed, leaving millions of players unable to access their games.
Attack timeline:
- 8:00 AM UTC: First wave of attacks detected
- 12:28 PM ET: Second, more intense wave strikes
- Several hours: Multiple platforms experience intermittent service
This wasn’t an ordinary server failure—it was a carefully orchestrated massive Distributed Denial of Service (DDoS) attack.
The Aisuru Botnet: A New Generation Threat
Record-Breaking Attack Scale
The attack peaked at an astonishing 29.69 terabits per second (Tbps), setting a new DDoS attack traffic record.
How massive is this number?
- Capable of transmitting approximately 3,700 GB of data in 1 second
- Equivalent to simultaneously downloading 7,400 HD movies
- Surpasses the vast majority of previously known DDoS attacks
300,000 Compromised Devices
The Aisuru botnet, first discovered in August 2024, has now infected over 300,000 devices:
- Routers: Home and commercial network equipment
- Surveillance cameras: IP cameras and security monitoring devices
- DVRs: Digital video recorders
- IoT gateways: Smart home hub devices
These devices typically have weak security, making them perfect targets for botnets. Once infected, devices are remotely controlled, becoming “zombies” for attacking other targets.
TCP Carpet Bomb Attack
Aisuru employs a “TCP carpet bomb” attack method:
- Simulates legitimate traffic: Attack packets appear as valid connection requests
- Difficult to identify: Traditional firewalls struggle to distinguish real from fake traffic
- Hard to block: Cannot simply block specific IPs or traffic patterns
- Sustained pressure: Continuously drains target server resources
This attack method is more covert and effective than traditional DDoS, making it extremely challenging for defenders.
Affected Gaming Platforms and Services
Steam: World’s Largest Gaming Platform Paralyzed
Steam, the world’s largest PC gaming platform, suffered severe impact:
- Login failures: Players unable to connect to Steam client
- Game interruptions: Ongoing online games disconnected
- Store outages: Unable to browse or purchase games
- Community features down: Friend lists and chat rooms unavailable
Particularly Counter-Strike 2 and Dota 2, with massive player reports of server connectivity issues.
Riot Games: Ranked Matches Disabled
Riot Games’ Valorant and League of Legends were also affected:
- Server instability: Frequent disconnections and high latency
- Ranked disabled: Officials emergency-disabled ranked mode
- Match interruptions: Ongoing battles suddenly disconnected
Riot issued official statements on community platforms, indicating they were investigating the issue and temporarily closing ranked matches to protect player ratings.
Epic Games Store and Other Platforms
Epic Games Store also experienced service interruptions, with players unable to:
- Launch Epic Games Launcher
- Download or update games
- Access accounts and purchase history
Additionally, the attack affected:
- PlayStation Network: Some users reported connectivity issues
- Hulu: Streaming service briefly interrupted
- ISP providers: Xfinity, Cox, and other internet service providers impacted
AWS and Cloudflare Also Hit
The attack’s impact extended beyond the gaming industry:
- Amazon Web Services (AWS): Cloud services experienced anomalies
- Cloudflare: CDN and DDoS protection services under pressure
This demonstrates attackers targeted not just gaming platforms, but the entire internet infrastructure.
Attacker Identity and Motivations
Ideologically Driven Attackers
Security researchers describe the Aisuru botnet operators as “sophisticated and ideologically driven” attackers.
This means:
- Not purely profit-driven: Likely not for ransom or money
- Highly organized: Possessing advanced technical capabilities and resources
- Targeted objectives: Launching attacks on specific targets at specific times
Possible Attack Motivations
Analysts speculate possible motivations include:
- Capability demonstration: Proving the botnet’s destructive power
- Political messaging: Expressing political or social stance
- Competitor rivalry: Gaming industry internal competition
- Pure disruption: Hacktivism
- Defense testing: Preparing for larger-scale attacks
No organization or individual has claimed responsibility yet.
Why Is Defense So Difficult?
Fundamental DDoS Challenges
Even resource-rich major platforms struggle against attacks of this scale:
Traffic overload
- 300,000 devices simultaneously sending requests
- Even if each device’s traffic is small, it accumulates into a tsunami
- Exceeds any single server or data center’s processing capacity
Indistinguishable traffic
- TCP carpet bombs simulate normal user behavior
- Cannot simply block “suspicious” traffic
- May accidentally block legitimate user connections
Distributed attacks
- Attack sources spread globally
- Blocking single IPs or regions ineffective
- Requires filtering at network edge
Limitations of Existing Defenses
Even Cloudflare, a professional DDoS protection service, faces tremendous pressure against 29.69 Tbps attacks.
Traditional defense measures include:
- Traffic scrubbing: Filters malicious traffic, but limited processing capacity
- Blackhole routing: Drops suspicious traffic, but may affect normal users
- CDN distribution: Disperses traffic to multiple nodes, but costly
- Rate limiting: Limits single IP request frequency, but limited effect on distributed attacks
When attack scale reaches dozens of Tbps, any defense becomes challenging.
Industry Response and Future Impact
Platform Emergency Response
Major platforms took measures during attacks:
Steam
- Activated emergency traffic scrubbing procedures
- Expanded server bandwidth
- Collaborated with ISPs to track attack sources
Riot Games
- Suspended ranked matches to protect player ratings
- Issued official announcements to reassure community
- Enhanced monitoring and alert systems
Epic Games
- Collaborated with AWS to respond to attacks
- Assessed infrastructure defense capabilities
- Considered increasing DDoS protection budget
Player Reactions and Losses
For millions of players, this attack caused:
- Lost gaming time: Unable to play normally for several hours
- Ranked rating impacts: Some players lost matches before disconnections
- Match postponements: Esports events potentially affected
- Decreased trust: Doubts about platform stability
While most platforms didn’t lose money, user experience and brand image suffered.
Long-term Industry Impact
This incident may bring changes:
- Increased infrastructure investment: Platforms will invest more resources in defense strengthening
- Rising third-party protection demand: More enterprises adopting professional DDoS protection services
- IoT security attention: Consumers and regulators prioritizing IoT device security
- Strengthened international cooperation: Cross-border tracking and combating botnets
IoT Device Security Crisis
Forgotten Security Vulnerabilities
The Aisuru botnet’s success exposes serious IoT ecosystem problems:
Weak device protection
- Factory default passwords unchanged
- Firmware not updated long-term
- Lacking basic firewall protection
Insufficient user security awareness
- Unaware devices can be compromised
- Unclear how to check and protect
- Devices connected for years without management
Manufacturer responsibility deficit
- Lacking security updates after product sale
- Not providing simple security setup guides
- Low-price competition sacrificing security
300,000 Devices Just the Tip of the Iceberg
Security experts warn Aisuru’s infected 300,000 devices may be just a small fraction of the global problem:
- Globally there are billions of IoT devices
- Massive devices with known vulnerabilities
- Botnets continuously expanding
- Next attack may be even larger
User Protection Guide
Check Home IoT Devices
If you’re concerned your devices are compromised, take these steps:
- Change default passwords: Set strong passwords for routers, cameras, etc.
- Update firmware: Regularly check devices for security updates
- Disable unnecessary remote access: Limit device external connections
- Use separate networks: Place IoT devices on separate Wi-Fi network
- Monitor abnormal traffic: Use router monitoring tools to observe unknown traffic
Gamer Precautions
When encountering similar attacks:
- Stay calm: Confirm it’s a platform issue, not your network
- Follow official announcements: Track platform social media updates
- Avoid repeated attempts: Don’t keep reconnecting, may worsen server burden
- Enable two-factor authentication: Protect account security, prevent subsequent attacks
Future Threat Predictions
Attack Scale Will Continue Growing
With:
- IoT device numbers continuing to increase
- 5G and high-speed networks proliferating
- Botnet technology evolving
Future DDoS attacks may:
- Exceed 30 Tbps, reaching 50 Tbps or even 100 Tbps
- Become harder to defend and track
- Cause longer service interruptions
Attack Target Diversification
Gaming platforms are just one target, future expansion may include:
- Financial institutions and trading platforms
- Government and public service websites
- Critical infrastructure (energy, transportation)
- Healthcare and education systems
Defense Technology Arms Race
Industry must develop new defense technologies:
- AI-driven traffic analysis: Real-time anomaly pattern identification
- Quantum encryption: Preventing attackers from breaking defense mechanisms
- Blockchain verification: Confirming connection request authenticity
- Joint defense: Multiple enterprises sharing threat intelligence
Conclusion
The October 7 massive DDoS attack is not just a gaming industry crisis, but a warning of the entire internet ecosystem’s fragility.
The Aisuru botnet, through 300,000 compromised IoT devices, generated record-breaking 29.69 Tbps attack traffic, simultaneously paralyzing giants like Steam, Epic, and Riot. This proves:
Even the most resource-rich tech giants remain vulnerable against well-planned massive attacks.
For gaming platforms, this is an urgent need to strengthen infrastructure; for the IoT industry, this is an opportunity to re-examine security standards; for general users, this is a wake-up call to raise cybersecurity awareness.
As our lives increasingly depend on internet services, as more devices connect online, every inadequately protected device could become an accomplice to the next attack.
This attack has ended, but the threat never disappeared. Next time, the attack may be larger, the target more critical, the impact more far-reaching.
The question isn’t “will it happen again,” but “when will it happen again”—and will we be ready when it does.