NetSense logo
Back

The DDoS Was Coming From Inside the ISP Network

By Plamen Petkov
Thu Apr 02 2026
9 min read
Upstream transit link bandwidth graph showing outbound traffic spiking to 6 Gbps during an outbound DDoS attack from compromised ISP subscriber devices

The DDoS Was Coming From Inside the Network

What we saw when ISPs across India called us about congested uplinks - and how flow data revealed a massive outbound botnet attack hiding in plain sight

Published: April 2026 | Reading time: ~7 min | Part 1 of 2

Executive Summary

What happened

What it looked like

What actually worked

Thousands of subscriber CPEs across multiple Indian ISP networks were compromised by botnets (Katana, Kimwolf) and launched coordinated outbound UDP floods toward external targets.

Upstream links choking, upload exceeding download, customer complaints. ISP NOCs initially thought it was a peering or capacity issue - not a security event.

NetFlow visibility (via NetSense Flow) to see the pattern. Automated tracing from border IP through NAT pools to specific BNGs and subscribers. Per-subscriber firewall rules. Quarantine BNG for long-term containment.

DDoS - how your Upstream ILL looks like during outbound ddos

Fig. 1 — An upstream transit link at one of our ISP customers during the incident. Upload (light blue) suddenly exceeding download, spiking to 6 Gbps. Their NOC's first reaction: peering problem. They were wrong.

The Calls Started Coming

Late March 2026. A Tuesday. The first call came from an ISP customer in North India - one of the larger FTTH providers we work with. Their upstream monitoring had flagged two transit links approaching 90% utilization on the outbound direction and this keeps on going up and down frequently. That alone was odd - this is a consumer broadband network. Traffic is overwhelmingly download. Upload rarely exceeds 30-40% of download on any link.

Within the hour, two more ISPs called with the same symptom. Different cities, different upstreams, same pattern: outbound traffic spiking without explanation. Their NOC teams were chasing infrastructure hypotheses - peering shifts, CDN fills, looping interfaces and even HTTP caching issues. None of them had looked at the traffic composition yet.

We pulled up their NetSense Flow dashboards remotely. It took about 3 minutes to see what was actually happening.

The pattern we now tell every ISP to watch for: When upload exceeds download in a consumer broadband network, stop troubleshooting infrastructure. Look at the flows data from your border routers. It is almost certainly a DDoS event manifesting as a capacity problem.

What the flows revealed

The flow data made the picture immediately clear. Massive outbound UDP: on ports 80, 443, and even port 0 - concentrated toward a small cluster of destination ASNs: China Telecom, Alibaba Cloud, Hubei Faxun Network, NINGBO ZHEJIANG. Not a handful of subscribers. Thousands, across multiple ISP networks, all doing the same thing, at the same time.

NetSense Flow: outbound traffic by destination ASN at one affected ISP

Fig. 2 — NetSense Flow: outbound traffic by destination ASN at one affected ISP. China Mobile, China Telecom, and Alibaba dominate, peaking above 1.4 Gbps. None of these are normal top destinations for Indian broadband traffic.

NetSense Flow: outbound traffic by destination ASN at one affected ISP

Fig. 3 — The ramp: zero to nearly 4 Gbps of outbound traffic to suspicious destinations in under an hour. CHINANET Sichuan Telecom and China Telecom dominate.

The same pattern appeared across every ISP that called us. This was not a single-network event. It was industry-wide. And to make things even more complicated some ISPs were having BNGs that totally melted under load, as they could not survive the extra load and this made it a lot more difficult to isolate the root cause of all this.

Separating what we saw from what we concluded

Observed (traffic data)

External research

Our inference

Upload exceeding download across multiple ISP networks simultaneously

Katana botnet targeting Android TV boxes via ADB (Nokia Deepfield, March 2026, 30K+ bots, 150 Gbps)

Compromised subscriber CPEs and IoT devices participating in coordinated outbound DDoS

Outbound UDP on ports 80, 443, and 0 from thousands of subscribers simultaneously

Kimwolf/Aisuru infecting 2M+ devices globally via residential proxy SDK exploits (Cloudflare, Hacker News, Jan 2026)

Botnet C2 tasking infected devices to flood specific external targets

Identical destination ASN concentration (China Telecom, Alibaba, Hubei Faxun) across multiple customer networks

FastNetMon reporting identical patterns across hundreds of Indian ISP networks (March 2026)

This was industry-wide — a botnet awakening or new exploit wave hitting Indian broadband at scale

UDP port 0 traffic present (reserved, never legitimate)

US DOJ disrupted 4 IoT botnets (Aisuru, KimWolf, JackSkid, Mossad) in March 2026

Port 0 confirms malicious intent, not app misbehavior

The Incident Timeline (One ISP, Representative)

Here is roughly how it played out at one of our larger ISP customers. The pattern was similar across all affected networks. Times are approximate - reconstructed from chat logs and dashboards.

[@portabletext/react] Unknown block type "code", specify a component for it in the `components.types` prop
Total time from first alert to containment: ~110 minutes. About 16 of those minutes were spent before they called us, chasing wrong hypotheses. The lesson we now drill into every ISP NOC we work with: upload exceeding download in consumer broadband = look at flows immediately. Do not troubleshoot infrastructure first.

Why This Breaks Most ISP Playbooks

Most DDoS mitigation is built for a simple model: bad traffic comes in, you scrub or absorb it. When the attack originates from inside the subscriber network, that model fails. This is what we had to explain to every ISP that called us that week.

What ISPs tried

Why it did not work

Block inbound traffic

The attack is outbound - their subscribers are the source

Add bandwidth

PPS still overwhelms BNG/NAT state tables

Upstream scrubbing

Too distributed - traffic comes from thousands of their own IPs

Port blocking

Breaks QUIC (443), HTTP (80), and legitimate services

Static ACLs

Cannot adapt to bursty, coordinated patterns

Generic rate limits

Penalizes real users as much as infected ones

The real problem is that modern botnets produce distributed, bursty attacks. Not one massive spike — thousands of small, synchronized bursts. Attack, idle, attack, idle. Each subscriber looks borderline in isolation. Together they saturate everything.

The ISP Operator's Playbook for Outbound DDoS

Based on what we saw across multiple ISP networks during March 2026, here is the generic playbook we now recommend to every ISP operator dealing with outbound DDoS. The tools matter, but the workflow matters more.

Step 1: Detect the anomaly. Upload exceeding download. Upstream links saturating outbound. Sudden egress spikes. This is the trigger — stop troubleshooting infrastructure and look at traffic composition.

Step 2: Break the traffic down. By protocol, port, destination ASN, destination IP, source IP. You need flow data (NetFlow, sFlow, IPFIX) — SNMP interface counters are not enough. You need to see what the traffic is, not just how much.

Step 3: Confirm it is distributed. One subscriber with odd traffic is a misconfiguration. Thousands with identical patterns is a botnet. Check source distribution.

Step 4: Block at the border. Identify the destination IPs/ASNs receiving the flood. Push blocking rules (FlowSpec, ACLs) to stop outbound traffic to confirmed attack targets.

Step 5: Trace to the source BNG. Map public NAT pool IPs back to specific BNG devices. You need IPAM data for this — which NAT pool lives on which BNG.

Step 6: Identify individual subscribers. On the BNG, check NAT tables, run packet captures, inspect per-subscriber traffic counters. Find the specific users generating flood traffic.

Step 7: Contain. Rate-limit or quarantine compromised subscribers. Apply per-subscriber firewall rules. Notify affected users.

How our tools fit in: NetSense Flow provides step 1-3. SensyAI (our playbook automation layer) handles steps 4-6 by chaining flow analysis, Netbox IPAM lookups, and BNG SSH sessions. NetSense Pulse provides CPE-level confirmation. But the playbook itself is tool-agnostic — any ISP can follow it with whatever stack they have.

Flow Visibility: The Foundation

Without flow data from border routers, ISP NOCs are flying blind. SNMP tells them a link is congested. Flow data tells them why. That distinction is the difference between 20 minutes of wrong hypotheses and an immediate understanding of what is happening.

We build NetSense Flow for exactly this use case — real-time NetFlow/sFlow collection and analysis. But the principle applies regardless of tool: ISPs need per-flow visibility into source/destination ASN, IP, port, and protocol — in real-time, across all border devices, with the ability to filter and pivot quickly.

NetSense Flow: outbound traffic by destination ASN. Hubei Faxun, NINGBO ZHEJIANG, Alibaba Cloud

Fig. 4 — NetSense Flow: outbound traffic by destination ASN. Hubei Faxun, NINGBO ZHEJIANG, Alibaba Cloud — none of these are normal top destinations for Indian broadband traffic.

Drilldown: top destination IPs by packets. China Telecom, NINGBO ZHEJIANG, Xiamen, Hubei Faxun

Fig. 5 — Drilldown: top destination IPs by packets. China Telecom, NINGBO ZHEJIANG, Xiamen, Hubei Faxun. The Zscaler IPs at bottom are legitimate security traffic — useful baseline.

The critical capability during investigation is progressive drilldown. You start with aggregate anomaly, break down by port, then ASN, then IP, then source distribution. Good tooling lets analysts pivot between these views without friction. In our experience working with ISP NOCs, they rarely know the right query upfront — they discover it iteratively.

What comes next

Detection is one thing. But knowing you have a problem is not the same as solving it. In Part 2, we cover the hard part — what we helped our ISP customers deploy:

"Now the real question: how do you stop this without breaking your users?"

Read Part 2: How to Stop Outbound DDoS in ISP Networks (Without Breaking Users) — netsense-nms.com/blog

References

Ready to see NetSense in action?

Book a live demo and see how NetSense NMS gives your ISP full-stack visibility across OLTs, switches, and customer CPE.

Book a Live Demo