KrebsOnSecurity endured a 6.3 Tbps DDoS attack, signaling a potential test for a new IoT botnet designed to cause massive disruptions.The attack surpassed the 2016 Mirai IoT botnet assault on KrebsOnSecurity, lasting less than a minute and overwhelming network links.Google's Project Shield faced the attack, with Google Security Engineer Damian Menscher dubbing it the largest Google has handled.The Aisuru botnet, identified by Cloudflare and Google as the attacker, leveraged hacked IoT devices to launch the assault.Aisuru, potentially run by 'Forky,' was previously rented out on Telegram for DDoS attacks offering up to 2 terabits per second.Forky, a 21-year-old individual from Brazil, now operates Botshield, a business linked to mitigating large DDoS attacks.The Aisuru botnet resurfaced with software exploits, such as a zero-day vulnerability in Cambium Networks cnPilot routers.Menscher suggested that making Aisuru's source code public could mitigate the botnet's threat by fragmenting its control.The Aisuru botnet mirrors the impact of Mirai, a powerful IoT malware strain that dominated IoT threats in 2016.The operators behind Mirai leaked its source code, leading to its widespread use and eventual unmasking, arrest, and probation of the authors.