The newly identified Eleven11bot malware has compromised over 86,000 IP cameras across the Asia-Pacific (APAC) region, transforming these devices into a massive botnet for launching large-scale Distributed Denial of Service (DDoS) attacks.
This incident, detailed in the Q1 2025 DDoS overview from StormWall’s global scrubbing centers, underscores the escalating sophistication of cyber threats targeting Internet of Things (IoT) infrastructure.
Unprecedented Breach Exploits IoT Vulnerabilities
The attack, which aligns with the alarming trends of carpet bombing and API-targeted assaults, has hit critical sectors including telecommunications and government systems, revealing the urgent need for robust cybersecurity defenses in an increasingly connected world.
The Eleven11bot leverages previously undocumented vulnerabilities in IP camera firmware, exploiting weak default credentials and unpatched software to gain control over devices.
Once infected, these cameras are weaponized to execute multi-vector DDoS attacks, combining UDP, TCP, and HTTP floods in rapid succession a technique reminiscent of the “everything, everywhere, all at once” approach seen in carpet bombing campaigns, which surged by 96% in APAC during Q1 2025.

According to the Report, StormWall’s data indicates that such attacks often maintain traffic volume per IP below conventional detection thresholds, rendering legacy DDoS mitigation tools ineffective.
As a result, critical infrastructure like routers and firewalls can collapse under the stealthy barrage, with telecommunications bearing the brunt of this onslaught, seeing a 136% year-over-year increase in attack volume.
The largest recorded attack mitigated by StormWall peaked at 2.3 Tbps against a data center provider in China, while a telecom service in Taiwan endured an 11-day assault at 850 Gbps, highlighting the sheer scale and persistence of these threats.
Sophisticated Tactics Amplify DDoS Impact in APAC
Beyond telecommunications, the Eleven11bot-driven botnet has amplified the impact of API-targeted DDoS attacks, which rose by 74% in the same period.
These Layer 7 assaults mimic legitimate requests, targeting resource-intensive endpoints to overload backend servers’ CPU and memory, often causing complete application crashes.
The botnet’s focus on government infrastructure is particularly concerning, with Taiwan facing intense, short-burst attacks averaging 600–900 Gbps from Chinese nationalist hacktivists, and India-Pakistan tensions fueling tit-for-tat strikes on government portals at 50–100 Gbps.
Meanwhile, the entertainment sector, encompassing online gaming and streaming platforms, saw a 114% year-over-year spike, driven partly by competitive sabotage and extortion demands in markets like China, India, and Korea.
This convergence of geopolitical motives and economic incentives illustrates how IoT vulnerabilities can be exploited for diverse malicious objectives.
The Eleven11bot incident serves as a stark reminder of the evolving DDoS landscape, where traditional defenses like rate-limiting and IP filtering fall short against sophisticated tactics.
As attack methodologies shift toward behavioral mimicry and multi-destination flooding, organizations must adopt advanced solutions integrating deep packet inspection and AI-driven traffic analysis to protect application-layer vulnerabilities.
With China emerging as the most targeted APAC country (22% of attacks) and Taiwan’s share skyrocketing to 14% due to coordinated hacktivist campaigns, the urgency for adaptive cybersecurity strategies has never been clearer.
The exploitation of 86,000 IP cameras by Eleven11bot not only amplifies the scale of potential disruptions but also signals a critical need to secure IoT ecosystems against the next wave of cyber threats.
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!
Source link