Alleged KimWolf Botmaster Arrested: How a 23-Year-Old Allegedly Ran a Two-Million-Device DDoS-for-Hire Service

Canadian authorities arrested Jacob Butler, 23, of Ottawa — known online as 'Dort' — the alleged operator of the KimWolf DDoS-for-hire botnet. The US has charged him and is seeking extradition. KimWolf allegedly grew to nearly two million infected devices.

Share
Line-art grid of small TV-box icons, their lines converging on a central hub node that connects to a pair of handcuffs; the hub carries a red dot.

KimWolf shows the modern DDoS-for-hire model at full maturity — a 23-year-old who allegedly commanded a botnet of nearly two million devices, largely cheap Android TV boxes, and rented out roughly 30 terabits per second of attack capacity to anyone who paid. On May 20, 2026, Canadian authorities arrested Jacob Butler of Ottawa, known online as 'Dort,' and the US Department of Justice charged him with aiding and abetting computer intrusions. The arrest is a genuine enforcement win — but the underlying device population, cheap and unpatched and internet-connected, is the durable problem the takedown does not solve.

OTTAWA, CANADA — On May 20, 2026, Canadian authorities arrested Jacob Butler, 23, of Ottawa — known online as 'Dort' — the alleged operator of the KimWolf DDoS-for-hire botnet, in a coordinated US-Canada law-enforcement operation. The US Department of Justice, through the US Attorney's Office for the District of Alaska, has charged Butler with one count of aiding and abetting computer intrusions, an offense carrying a maximum sentence of 10 years, and the United States is seeking his extradition. Prosecutors allege that KimWolf — which the DOJ styles 'KimWolf,' also rendered elsewhere as 'Kimwolf' — infected nearly two million devices worldwide and was used in more than 25,000 attacks, with individual attacks reaching nearly 30 terabits per second. Butler is charged and alleged to have administered the service; he has not been convicted, and the case against him is unproven.

Disclosure Overview
FieldDetails
SuspectJacob Butler, 23, of Ottawa, Canada — known online by the alias 'Dort.' He is charged and alleged to have operated the botnet; he has not been convicted.
ArrestArrested by Canadian authorities on May 20, 2026, in a coordinated international US-Canada law-enforcement operation
ChargeOne count of aiding and abetting computer intrusions, filed by the US Department of Justice through the US Attorney's Office for the District of Alaska
Maximum PenaltyUp to 10 years in prison if convicted; the United States is seeking Butler's extradition
BotnetKimWolf — the DOJ styling; also rendered as 'Kimwolf' in some reporting. A DDoS-for-hire service and a variant of the record-setting Aisuru botnet.
Alleged ScaleNearly two million infected devices worldwide, growing to more than two million Android TV devices; allegedly used in more than 25,000 attacks
Peak Attack PowerIndividual attacks reaching nearly 30 terabits per second — at the time, the largest DDoS attack publicly disclosed; some victims reported losses exceeding $1 million
CoverageKrebs on Security, the US Department of Justice (primary), BleepingComputer, CyberScoop, The Record, SecurityWeek and Cybersecurity News across the May 20-22, 2026 cycle

What Happened

One Person, Allegedly Two Million Devices

The defining claim in the KimWolf case is one of scale concentrated in a single set of hands. Prosecutors allege that Jacob Butler, a 23-year-old from Ottawa operating under the handle 'Dort,' administered a botnet that infected nearly two million devices around the world. According to the charges, KimWolf was run as a DDoS-for-hire service — a commercial operation that rents out the combined bandwidth of those infected devices to paying customers who want to knock a target offline. The Department of Justice alleges the service was used in more than 25,000 separate attacks against computers and servers worldwide, and that some victims reported financial losses exceeding $1 million. None of this has been tested in court: Butler is charged and alleged to have operated KimWolf, not convicted, and the case against him remains unproven.

The Android TV Box Problem

What allegedly made KimWolf so large was the kind of hardware it ran on. According to investigators, KimWolf is a variant of Aisuru, the record-setting DDoS botnet, and it grew to control more than two million Android TV devices — the cheap streaming boxes sold in vast numbers and rarely updated by their owners. The operators allegedly expanded the botnet's reach by abusing residential-proxy networks, which gave them what investigators describe as 'local control' over infected devices and helped the operation blend its traffic into ordinary consumer internet connections. That technique is the real tradecraft story here: it made KimWolf resilient, harder to trace, and harder to dismantle than a botnet running on more visible infrastructure.

A Two-Stage Operation: Seizure, Then Arrest

The May 20 arrest was the second act of a longer enforcement effort. In March 2026, US, German and Canadian authorities seized command-and-control infrastructure for KimWolf and three related botnets — Aisuru, JackSkid, and Mossad — which together had allegedly infected more than three million IoT devices. In this context 'Mossad' is the name of a botnet and is unrelated to the Israeli intelligence agency of the same name. As part of that March action, the US Attorney's Office for the Central District of California — a separate jurisdiction from the District of Alaska that filed the charge against Butler — unsealed seizure warrants targeting online services that supported 45 different DDoS-for-hire platforms. The May 20 arrest of the alleged administrator followed that infrastructure seizure roughly two months later.

KimWolf — Operation Profile
FieldDetails
Botnet NameKimWolf (DOJ styling; also rendered 'Kimwolf') — a DDoS-for-hire service
LineageA variant of Aisuru, the record-setting DDoS botnet
Infected PopulationNearly two million devices worldwide; grew to more than two million Android TV devices
Growth TechniqueAbuse of residential-proxy networks to gain 'local control' over infected devices and blend traffic into consumer connections
Attacks AttributedMore than 25,000 attacks against computers and servers worldwide
Peak VolumeIndividual attacks reaching nearly 30 Tbps — the largest DDoS attack publicly disclosed at the time
March 2026 SeizureUS, German and Canadian authorities seized C2 infrastructure for KimWolf plus Aisuru, JackSkid and Mossad — over three million IoT devices combined
Related WarrantsThe Central District of California unsealed seizure warrants targeting services supporting 45 DDoS-for-hire platforms

Scope and Impact

The arrest of an alleged botmaster is real progress, and KimWolf does not stand alone — it lands inside a sustained 2026 enforcement wave against the cybercrime-as-a-service economy. In recent months The CyberSignal has tracked Europol's first-of-its-kind takedown of a VPN service marketed to criminals, Operation Endgame 2.0, which dismantled 300 servers and 20 operators of the ransomware supply chain, and INTERPOL's Operation Ramz, which produced 201 arrests across 13 countries. The KimWolf case fits squarely in that pattern: a coordinated, cross-border operation aimed not at a single attack but at the service that enabled tens of thousands of them.

DDoS-for-hire specifically has been a repeated enforcement target. Europol's Operation PowerOFF moved against roughly 75,000 users of booter and stresser services, and the gamified DDoS model behind the pro-Russia NoName057(16) campaign showed how cheaply attack capacity can now be crowdsourced. KimWolf is the supply side of the same market — and at nearly 30 terabits per second of peak capacity, allegedly the largest publicly disclosed DDoS attack at the time, it represents that market at full maturity rather than its fringe.

Several things about the KimWolf case are genuinely not confirmed, and this account should not imply otherwise. Butler's guilt is unproven — he is charged and alleged to have run the service, not convicted. It is not known whether he will contest extradition or on what timeline, how much revenue KimWolf generated, who the victims of the 25,000-plus attacks were, or whether other KimWolf operators and affiliates remain at large. It is also unclear whether the May 20 arrest dismantled KimWolf entirely or only removed its alleged administrator, what the current operational status of the roughly two million infected devices is, and whether Butler has any connection to the operators of the related Aisuru, JackSkid and Mossad botnets seized in March.

Response and Attribution

For network operators and ISPs, the most important takeaway is what the arrest does not fix. The roughly two-million-device KimWolf population is largely Android TV boxes and other consumer IoT hardware, and arresting the alleged administrator does not clean those devices or remove the infections. Operators should continue monitoring for and mitigating outbound DDoS traffic and residential-proxy abuse originating from consumer-device address ranges, and should review their own DDoS-mitigation capacity against the roughly 30 Tbps benchmark this case set. Defenders should also expect botnet migration: when a service is disrupted, its paying customers move to competitors, so a quiet period is not the same as a safe one. Organizations that could plausibly be DDoS targets should confirm that DDoS protection is contracted and tested against multi-terabit volumes, review incident-response plans for sustained volumetric attacks, and treat DDoS as a current, low-cost, for-hire threat rather than a historical one.

The structural lesson sits with device manufacturers and the wider IoT ecosystem. KimWolf's alleged growth through Android TV boxes — abused via residential-proxy networks for 'local control' — is the durable problem: cheap, unpatched, internet-connected consumer hardware remains the raw material of every major botnet, and the residential-proxy-abuse technique gives operators resilience that complicates takedowns. For CISOs and policymakers, the KimWolf arrest, following the March 2026 four-botnet infrastructure seizure and the unsealing of warrants against 45 DDoS-for-hire platforms, is part of a genuine 2026 enforcement surge that pairs naturally with the First VPN takedown and Operation Endgame 2.0. The honest framing is that this enforcement is real and welcome — but arrests disrupt operators, not the underlying insecure-IoT supply, and that supply problem remains unsolved.


The CyberSignal Analysis

Signal 01 — The Arrest Is Real, the Device Problem Is Not Solved

The KimWolf case invites a clean victory narrative — one alleged botmaster identified, arrested, and facing extradition and a possible decade in prison. That enforcement outcome is genuine and worth crediting. But the more durable fact is the one the arrest does not touch: the roughly two million infected devices, largely Android TV boxes, are still out there. Removing an alleged administrator disrupts a service; it does not patch a single piece of hardware or sever a single residential-proxy abuse path. The structural problem KimWolf exposes — a vast population of cheap, unpatched, internet-connected consumer devices — outlives any one prosecution. Reading this story as 'solved' is the mistake; reading it as 'one operator down, the supply intact' is the accurate frame.

Signal 02 — Residential-Proxy Abuse Is the Tradecraft Story

Beneath the headline numbers is a technique that deserves more attention than the device count. KimWolf allegedly grew by abusing residential-proxy networks to gain 'local control' over infected devices — folding its traffic into ordinary consumer internet connections. That is what made the botnet resilient and hard to trace, and it is the same pattern showing up across modern botnet operations. For defenders, the implication is uncomfortable: malicious traffic increasingly looks like legitimate residential traffic, which erodes the value of crude IP-reputation blocking and pushes detection toward behavioral analysis. The tradecraft, not the raw scale, is the part of KimWolf most likely to be reused.

Signal 03 — A Real 2026 Enforcement Surge, With a Ceiling

KimWolf belongs in the same conversation as Europol's First VPN takedown, Operation Endgame 2.0, Operation Ramz, and Operation PowerOFF — not because the operators overlap, but because together they represent a sustained, coordinated 2026 push against the cybercrime-as-a-service economy. That push is real, and the cross-border US-Canada-Germany cooperation behind the KimWolf seizures and arrest is the kind of capability the criminal market should fear. But the surge has a ceiling. Enforcement removes operators and infrastructure; it does not remove the conditions that make the next botnet cheap to build. Until the insecure-IoT supply is addressed at the manufacturing and ecosystem level, each takedown buys disruption, not resolution.


Sources

TypeSource
PrimaryUS Department of Justice (District of Alaska) — Canadian Man Arrested by International Authorities, Charged With Administrating KimWolf DDoS Botnet
AnalysisKrebs on Security — Alleged KimWolf Botmaster 'Dort' Arrested, Charged in U.S. and Canada
ReportingBleepingComputer — US and Canada Arrest and Charge Suspected KimWolf Botnet Admin
ReportingCyberScoop — KimWolf Botnet's Alleged Administrator Jacob Butler Arrested in Canada
ReportingThe Record — Canadian Man Arrested, Charged With Running KimWolf Botnet
ReportingSecurityWeek — Canadian Man Arrested for Operating KimWolf Botnet
ReportingCybersecurity News — KimWolf DDoS Botnet Operator Arrested
RelatedThe CyberSignal — Europol's First VPN Takedown: Cybercrime Loses an Anonymity Layer
RelatedThe CyberSignal — Operation Endgame 2.0: Europol Just Took Down 300 Servers and 20 Operators of the Ransomware Supply Chain
RelatedThe CyberSignal — INTERPOL Operation Ramz: 201 Arrests Across 13 Countries
RelatedThe CyberSignal — Europol Operation PowerOFF Targets 75,000 DDoS Service Users
RelatedThe CyberSignal — NoName057(16) Gamified DDoS Across Europe With Crypto Rewards