Cloudflare, the prominent web infrastructure and security company, has announced a significant cybersecurity milestone. The firm successfully defended against what it describes as "the largest attack ever disclosed publicly" in terms of sheer data volume. This revelation comes from Cloudflare's comprehensive 2025 Q4 DDoS Threat Report, which details a relentless assault by the notorious Aisuru/Kimwolf botnet.
Unprecedented Attack Scale and Methodology
The attack, which occurred on December 19, 2025, was christened "The Night Before Christmas" by the perpetrators. It represented a record-breaking bombardment, peaking at an astonishing 31.4 Terabits per second (Tbps). Cloudflare's report characterizes this campaign as "hyper-volumetric," meaning it relied primarily on overwhelming force to cripple network defenses rather than sophisticated infiltration techniques.
The primary targets included telecommunications providers, various IT organizations, and even Cloudflare's own customer dashboard infrastructure. The assault combined massive HTTP DDoS attacks, which exceeded rates of 200 million requests per second (rps), with potent Layer 4 DDoS attacks that achieved the 31.4 Tbps peak.
Automated Defense and Attack Origins
Remarkably, Cloudflare reported that its automated security systems detected and mitigated these threats with such efficiency that no internal human intervention or alerts were necessary. This highlights the advanced, autonomous nature of modern cybersecurity defenses deployed by leading infrastructure providers.
The report also sheds light on the unique origin of this attack. Unlike many DDoS campaigns that exploit compromised routers or basic Internet of Things (IoT) devices, the "Night Before Christmas" assault was launched primarily from a network of compromised Android TV devices. This indicates a shift in the botnet landscape towards exploiting more powerful, internet-connected consumer electronics.
Attack Patterns and Global Impact
Cloudflare's analysis reveals that most of these hyper-volumetric attacks were short-lived but incredibly intense. Approximately 50% lasted only between one and two minutes, while 90% of the attacks peaked at bandwidths between 1 to 5 Tbps. Despite their brevity, the concentrated power posed a severe threat to network stability.
Geographically, the largest source of DDoS attacks throughout 2025 was identified as Bangladesh, followed by Ecuador, Indonesia, and Argentina. In terms of targets, the most frequently attacked countries and regions were China and Hong Kong, underscoring the global and indiscriminate nature of these cyber threats.
Broader DDoS Trends and Historical Context
This incident dethrones the previous record held by the Aisuru botnet, which was responsible for a 29.7 Tbps attack and was once attributed to a 15.72 Tbps assault on Microsoft. The 2025 report paints a concerning picture of the escalating DDoS landscape. Cloudflare recorded a staggering 121% increase in DDoS incidents compared to 2024, with a total of 47.1 million unique attacks logged throughout the year.
The company's ability to mitigate this record-breaking attack without service disruption for its customers came into sharp focus in November 2025, when hundreds of websites relying on its infrastructure experienced outages. This latest report provides crucial insights into the evolving tactics, scale, and sources of modern distributed denial-of-service threats, emphasizing the critical need for robust, automated cybersecurity infrastructure in today's digital ecosystem.