Who Makes What, and Where with the US ISP CPE Supply Chain Version 2.0 | March 24, 2026 senki.org | bgreene@senki.org This research tool was curated from detailed questions by a +40-year Internet engineer, large network architect, and cybersecurity specialist. The questions were used to build out logic flows in multiple LLMs to gather insights Read More
Category: Cyber Home Invastion
“Cyber Home Invasion,” is a modern security crisis where private consumer electronics are hijacked to serve as infrastructure for global criminal and espionage networks. By compromising devices like routers and smart TVs, threat actors create massive botnets and residential proxies that mask illicit activities and launch record-breaking digital attacks. This phenomenon poses physical and psychological risks to residents while providing state-sponsored actors a way to infiltrate national critical infrastructure undetected. To combat this, experts advocate for “secure-by-design” manufacturing, stricter ISP management, and international cooperation through specialized technical working groups. Ultimately, the text emphasizes that the domestic network has become a primary battlefield requiring a coordinated global defense to restore privacy and safety.
———–
The Cyber Home Invasion: The Strategic Conscription of Domestic Infrastructure into Global Threat Ecosystems
The phenomenon of the cyber home invasion represents a fundamental paradigm shift in the global security landscape, marking the transition from episodic, targeted digital intrusions to the systematic, industrialized conscription of private domestic infrastructure into a multi-billion-dollar criminal and espionage resource.1 Historically, the security of home networks was viewed through the lens of individual privacy or the protection of personal financial data; however, as of 2026, the home has become the internet’s largest and most vulnerable attack surface, serving as the foundational infrastructure for record-breaking volumetric attacks, state-sponsored reconnaissance, and industrialized financial fraud.1 This evolution is characterized by the convergence of three previously distinct threat categories: the proliferation of massive Internet of Things (IoT) botnets, the explosive growth of the residential proxy market, and the deployment of state-sponsored router compromise campaigns.1
The defining characteristic of a cyber home invasion is the conversion of consumer electronics—including routers, smart TVs, cameras, and even vehicle infotainment systems—into “Operational Relay Boxes” (ORBs) or proxy exit nodes that operate without the owner’s knowledge.1 Unlike traditional malware that might focus on stealing local credentials, these infections are often engineered to be “silent,” avoiding performance degradation or alerts that would tip off the homeowner while simultaneously providing threat actors with a “clean” residential IP address to mask illicit activities.2 This strategic use of domestic connectivity allows attackers to bypass reputation-based security filters and rate-limiting mechanisms, facilitating crimes that range from credential stuffing and ad fraud to the disruption of national critical infrastructure.2
The Industrialized Risk Landscape: Convergence of Botnets and Proxies
The modern threat landscape is defined by the convergence of IoT botnets and the residential proxy market, a development that has reached unprecedented scale through the merging of DDoS-for-hire services and sustainable proxy monetization models.1 The AISURU botnet, identified in late 2024 and reaching its peak in 2025, exemplifies this shift. AISURU, a “Turbo Mirai-class” IoT botnet, leveraged a globally distributed network of hundreds of thousands of compromised devices—primarily home routers and security cameras—to generate devastating traffic surges.5 In 2025, AISURU’s operators broke global bandwidth records repeatedly, escalating from a 6.3 Tbps attack in June to a record-shattering 31.4 Tbps UDP flood in November 2025.1
This technical capacity was facilitated by a strategic pivot in the botnet’s monetization strategy. Rather than relying solely on the episodic revenue of DDoS-for-hire, AISURU’s operators began renting compromised devices as residential proxies.1 This transition creates a more sustainable revenue model and incentivizes threat actors to maintain persistent, long-term control over home devices.1 The scale of this proxy infrastructure is staggering; for example, the 911 S5 botnet controlled over 19 million compromised IP addresses across 190 countries before its operator’s arrest in May 2024.1 By late 2025, the AISURU botnet alone was estimated to control between one and four million infected hosts globally, unleashing hyper-volumetric attacks routinely exceeding 1 terabit per second and 1 billion packets per second.7
Attribute
AISURU (Turbo Mirai-class)
BADBOX 2.0 (Supply Chain)
Primary Vectors
Firmware update servers, 0-day exploits
Pre-installed at factory, malicious app stores
Device Population
1–4 Million (2025 peak)
10 Million+ (2025 peak)
Monetization
DDoS-for-hire, Residential Proxies
Ad fraud, Click fraud, Residential Proxies
Key Operators
Snow, Tom (Ex-catddos figures)
MoYu (Resell via IpMoYu service)
Technical Tell
Modified RC4, DNS TXT for C2
Hidden webviews, Port 7547 exposure
Peak Impact
31.4 Tbps DDoS (Nov 2025)
$5.9B in pandemic relief fraud (911 S5 lineage)
The mechanisms of infection have also evolved to target the very trust structures of the internet. In April 2025, AISURU’s operators compromised a Totolink router firmware update server, hijacking the legitimate update mechanism to distribute malicious scripts.1 This single intrusion allowed the botnet to surpass 100,000 devices almost instantly, demonstrating the catastrophic potential of supply chain attacks against consumer infrastructure.1 Similarly, the BADBOX 2.0 campaign represents supply chain compromise at a massive scale, where over 10 million infected devices—including smart TVs, projectors, and vehicle infotainment systems—were shipped from manufacturers with pre-installed malware.1 These devices are sold access as residential proxies and conduct automated ad fraud, often circumventing security checks because the traffic originates from a legitimate consumer’s home IP.1
The Inhabitant’s Nightmare: Multi-Dimensional Threats to the Home
The immediate danger of the cyber home invasion is the complete erosion of the home as a private, secure space.10 When an IoT device is compromised, it acts as a permanent spy and a tool for criminals, enabling a range of attacks that extend beyond the digital realm into the physical and psychological.10
Data Exfiltration and Pervasive Surveillance
Malware such as Android.vo1d2, found in many BADBOX-infected devices, is engineered to harvest sensitive data from the local network.10 This includes personal files, financial information, and credentials for online accounts.10 However, the inclusion of microphones and optical sensors in modern smart devices introduces a deeper level of privacy invasion.10 Smart TVs and cameras can be remotely activated to eavesdrop on conversations or visually monitor the home environment, leading to profound privacy breaches and potential blackmail scenarios.10 The research highlights that the ability for attackers to broadcast unauthorized content—ranging from pornographic material to deepfake political propaganda—directly onto a user’s screen turns home entertainment devices into tools for psychological manipulation.10
Physical Security Compromise
In a highly connected smart home, a compromised device serves as a pivot point to attack other systems on the same network.10 A vulnerability in a seemingly benign device, like a digital picture frame, can be used to pivot to smart locks, garage door openers, and security alarm systems.10 This facilitates physical burglary by allowing intruders to disable alarms or unlock doors remotely.10 Furthermore, the manipulation of smart appliances poses a direct threat to human life; Qubit Cyber highlights scenarios where smart appliances are overloaded to the point of causing physical fires, demonstrating that digital risks in the home environment can have catastrophic physical consequences.12
The Burden of the Unwitting Accomplice
Perhaps the most widespread risk to the homeowner is the liability of becoming an unwitting accomplice to global crime.10 By serving as a residential proxy exit node, the victim’s home IP address is used to mask the origin of severe crimes, including credential stuffing, large-scale phishing campaigns, and the distribution of illegal content.2 Because the malicious traffic appears to originate from the homeowner’s network, they may become the subject of law enforcement investigations, search warrants, and potential legal prosecution.10 The homeowner’s bandwidth and electricity are effectively stolen to power a multi-billion-dollar criminal ecosystem, as attackers rent out access to these compromised IPs for as little as $0.20 to $1.50 per day.2
Damage to Society and the Global Commons
The aggregation of millions of compromised home networks creates a “force multiplier” effect that threatens the stability of the global internet and the safety of national critical infrastructure.7 The damage to society is systemic, eroding trust in public and private institutions while creating significant economic and environmental risks.13
Disruption of Critical Infrastructure
State-sponsored actors have recognized the strategic value of home networks in masking their operations against critical infrastructure. The Chinese state-sponsored APT Volt Typhoon has utilized compromised end-of-life SOHO routers as proxy infrastructure to mask espionage and reconnaissance against U.S. power grids, water systems, and transportation networks.1 Despite FBI takedowns in early 2024, the operation re-emerged within months, compromising 30% of internet-exposed Cisco RV320/325 routers in just 37 days.1 This capability, referred to by FBI Director Christopher Wray as “the defining threat of our generation,” allows foreign adversaries to maintain a persistent presence within national infrastructure while appearing as legitimate residential traffic.1
Economic and Environmental Consequences
The economic impact of these botnets is quantified not only in the theft of bandwidth but in the disruption of global commerce and the massive fraud facilitated by residential proxies.13 The 911 S5 proxy service used compromised home IPs to file over 560,000 fraudulent unemployment claims, resulting in confirmed losses of over $5.9 billion from U.S. pandemic relief programs.3 Furthermore, DDoS attacks against backbone networks can cause collateral internet disruption, impairing access to essential services and causing gridlocks in transportation and healthcare logistics.7 In industrial sectors, the disruption of water treatment or waste systems via compromised management panels could lead to contamination and irreversible environmental damage.13
The Crisis of Civil Society
Civil society organizations (CSOs), including NGOs and human rights defenders, are particularly vulnerable to the cyber home invasion.13 Their sensitive missions make them prime targets for both state-sponsored surveillance and criminal enterprises.13 Since 2018, over 600,000 digital threats have targeted civil society globally, including the use of commercial spyware like Pegasus and Graphite.13 These tools often utilize “zero-click” exploits to install themselves on home and mobile devices without any user interaction, facilitating the physical harm, arrest, or torture of activists by repressive regimes.13 The “resilience gap” between the military-grade protection of government ministries and the “cyber poor” status of NGOs means that an attacker can often reach their primary target by simply breaching the poorly protected home network of a civil society worker.13
Impact Category
Mechanistic Consequences
Societal Ramifications
Public Safety
Disruption of transportation and healthcare logistics
Medical cancellations, direct threats to life
Economic Activity
Data loss, supply chain destabilization
Financial market instability, long-term regression
Environmental
Disruption of water treatment and waste systems
Contamination, spills, ecosystem destruction
Societal Trust
Erosion of institutional confidence
Weakening of national security, increased anxiety
The Crisis of the Management Plane: Technical Roots of Vulnerability
The persistence of the cyber home invasion is driven by fundamental flaws in the technical management of home network equipment, specifically Customer Premises Equipment (CPE) such as routers.3 A critical external attack surface is created by the exposure of Port 7547, which is used for the TR-069 (CWMP) remote management protocol.3 Millions of devices globally have this port accessible from the public internet, allowing botnets to scan and exploit routers via command injection or credential attacks.3
While a more secure successor, TR-369 (USP), exists, there is no mandated timeline for migration, leaving over a billion insecure devices in active use.3 Furthermore, the lack of Protective DNS (PDNS) in most home routers allows compromised devices to easily communicate with command-and-control (C2) servers or download additional malware modules without detection.3 This “global void” in home network security is exacerbated by the absence of Infrastructure Access Control Lists (iACLs) at the ISP level, which could easily block external access to Port 7547.3
Technical Feature
Secure-by-Design Status
Defense-in-Depth Strategy
Passwords
Unique per device (Mandated by CRA/PSTI)
Multi-factor authentication where possible
Updates
Automated and enabled by default
Firmware integrity verification
Management
Unused interfaces disabled by default
iACLs for Port 7547 and TR-369 migration
Network
State-of-the-art encryption
Protective DNS (PDNS) filtering
Current regulatory responses, such as the EU Cyber Resilience Act (CRA) and the UK PSTI Act, are limited by their focus on new products at the point of sale.3 There are no international mandates requiring the replacement of end-of-life devices or requiring ISPs to report the number of botnet-infected devices on their networks.3 In the United States, the recent reversal of mandatory cybersecurity requirements for telecom providers has left carrier security to voluntary commitments even as state actors remain embedded in domestic networks.3
——-
Works cited
Designing a Dunbar-principled “Cyber Home Invasion” initiative at FIRST, https://drive.google.com/open?id=1WykZUXydkX3wEbpG6yNpCBzNO5rlkAgrCpBQ2038__w
Cyber Home Invasion – ThaiCERT 2025-08-18, https://drive.google.com/open?id=1hbJ8oe_uYxiqQBFJToiSlI3zY36zArT0SbCprd5wNAs
cpe_regulations_master_v3.docx, https://drive.google.com/open?id=1OB7tGzkQNvkq_juhnNPuR4A558ZZ2PpC
Home Internet Connected Devices Facilitate Criminal Activity – FBI, accessed March 25, 2026, https://www.fbi.gov/investigate/cyber/alerts/2025/home-internet-connected-devices-facilitate-criminal-activity
Aisuru Botnet Emerges as 2025’s Largest DDoS Threat – Ampcus Cyber, accessed March 25, 2026, https://www.ampcuscyber.com/shadowopsintel/aisuru-botnet-ddos-attacks-record/
Satori Perspectives: Inside the Disruption of BADBOX 2.0 – HUMAN Security, accessed March 25, 2026, https://www.humansecurity.com/learn/blog/satori-disrupting-badbox-2/
Cloudflare’s 2025 Q3 DDoS threat report — including Aisuru, the apex of botnets, accessed March 25, 2026, https://blog.cloudflare.com/ddos-threat-report-2025-q3/
Authorities disrupt four IoT botnets behind record DDoS attacks – Help Net Security, accessed March 25, 2026, https://www.helpnetsecurity.com/2026/03/20/us-disrupts-iot-botnets-ddos-attacks-aisuru-kimwolf/
DDoS Botnet Aisuru Blankets US ISPs in Record DDoS – Krebs on Security, accessed March 25, 2026, https://krebsonsecurity.com/2025/10/ddos-botnet-aisuru-blankets-us-isps-in-record-ddos/
CSIRT Threat Intelligence Report: Analysis and Mitigation of the BadBox and Android.vo1d2 Supply Chain Botnets, https://drive.google.com/open?id=1mKPLrLMAnMPGzQUortZe6bp5tH7yI7HzXculrVkpCTU
Re: Inquiry Regarding FBI PSA on Internet-Connected Devices, https://mail.google.com/mail/u/0/#all/FMfcgzQbgcSnshsrrwZlzqWSTRkcDWpp
Qubit Cyber, accessed March 25, 2026, https://www.qubitcyber.com/
Digital Safety for Civil Society, https://drive.google.com/open?id=1g5TVQyrhq1oTZIw4IRcw8PQXwEjAj_V-8I_XddRIuLI
SENKI – Surfing Internet Security & Resiliency as we thrive, heal …, accessed March 25, 2026, https://www.senki.org/
HUMAN FBI Partners Take Action Against BADBOX 2.0 | Carahsoft, accessed March 25, 2026, https://www.carahsoft.com/blog/human-security-fbi-partners-take-action-against-badbox-2-0-blog-2025