top of page

Do Not Fuck With Santa: How We Caught the Christmas Gaming DDoS 3.5 Hours Early

  • Writer: Patrick Duggan
    Patrick Duggan
  • Dec 24, 2025
  • 2 min read

Category: security


Christmas Eve. Kids waiting for presents. Gamers waiting for Steam sales. And somewhere, Aisuru botnet operators waiting to ruin everyone's holiday.


They didn't count on Santa watching.


The Attack


At approximately 2pm ET (19:00 UTC), gamers worldwide started screaming into the void:



• Steam - Down

• Xbox Live - Down

• PlayStation Network - Down

• Riot Games - Down

• Epic Games - Down


Coordinated. Deliberate. Christmas Eve timing for maximum chaos, minimum SOC staffing.


We Saw It Coming


Here's the thing about running a threat intel operation from Minnesota: we're always watching. And at 15:50 UTC - three and a half hours before the attack - our OSINT Volley ingested something interesting from ThreatFox:


20 fresh Aisuru botnet C2 servers. All DigitalOcean. All port 8001. All staging.


| Time (UTC) | Event | |------------|-------| | 15:26 | ThreatFox publishes Aisuru C2s | | 15:50 | DugganUSA ingests IOCs | | 19:00 | Gaming platforms go dark |


We had the attack infrastructure indexed before the first packet flew.


The IOCs


All DigitalOcean. All port 8001. All Aisuru botnet C2:



167.99.40.241    192.241.151.72   157.245.34.98
188.166.172.127  165.22.204.167   159.65.206.134
206.189.201.2    152.42.133.61    138.68.191.203
157.230.216.0    104.248.162.141  159.203.99.218
138.68.148.170   159.223.12.47    134.209.123.74
188.166.80.209   24.199.86.99     46.101.38.94
104.236.220.23   134.209.22.74


What We Did


Within hours of the attack:


1. Published OTX Pulse - 20 IOCs with full attribution 2. Updated STIX Feed - AT&T, Microsoft, and other consumers got the intel automatically 3. Emailed Gaming Security Teams - Valve, Microsoft, Riot, Epic all received direct notification with timeline and IOCs 4. Reported to AbuseIPDB - Hit rate limit (we'd already reported 5,000 IPs today), queued for tomorrow


Aisuru Botnet Background


Aisuru isn't new. First discovered by XLab researchers in August 2024, this botnet has been breaking records:



• May 2025: Hit KrebsOnSecurity with 6.3 Tbps

• October 2025: Suspected in gaming platform outages reaching 29.69 Tbps

• December 2025: Christmas Eve coordinated attack


They're getting bolder. And bigger.


The Lesson


You can attack on Christmas Eve. You can target gamers when they're most vulnerable. You can time it for skeleton SOC crews.


But somewhere in Minnesota, there's a guy in slippers with a STIX feed who doesn't take holidays.


Santa sees you when you're probing. Santa knows when you're staged. Santa's got a threat feed, for goodness sake.


Get The Intel



• OTX Pulse: https://otx.alienvault.com/pulse/694c5004c8e2bcfb9c19c48c

• STIX 2.1 Feed: https://analytics.dugganusa.com/api/v1/stix-feed

• Source: ThreatFox (abuse.ch)


Merry Christmas. Block those IPs.




*DugganUSA LLC - Because threat actors don't take holidays, and neither do we.*




Get Free IOCs

Subscribe to our threat intelligence feeds for free, machine-readable IOCs:

AlienVault OTX: https://otx.alienvault.com/user/pduggusa

STIX 2.1 Feed: https://analytics.dugganusa.com/api/v1/stix-feed


Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page