Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Canadian Arrested for Operating Kimwolf DDoS Botnet

Canadian Arrested for Operating Kimwolf DDoS Botnet

Posted on May 22, 2026 By CWS

The U.S. Department of Justice (DoJ) recently revealed the arrest of a Canadian individual accused of managing a significant distributed denial-of-service (DDoS) botnet named Kimwolf. This development marks a crucial step in tackling cybercrime and highlights the ongoing collaboration between international law enforcement agencies.

Unveiling the Kimwolf Botnet

The arrested individual, identified as 23-year-old Jacob Butler from Ottawa, Canada, is charged with offenses related to the creation and operation of the Kimwolf botnet. Kimwolf, believed to be a variant of the AISURU botnet, primarily infected devices shielded by firewalls, such as digital photo frames and webcams. The DoJ reports that these compromised devices were manipulated by the botnet’s operators.

The operators employed a ‘cybercrime-as-a-service’ model, monetizing access to the compromised devices by selling it to other cybercriminals. These cybercriminals, in turn, leveraged the infected devices to execute DDoS attacks on global targets, including the Department of Defense Information Network (DoDIN) IP addresses.

Evidence Linking Butler to Kimwolf

Court documents reveal that Butler’s connection to the Kimwolf botnet was established through IP addresses, online account details, and Discord messages associated with an account named resi[.]to. Earlier this year, independent security journalist Brian Krebs exposed Butler’s involvement, although Butler claimed his ‘Dort’ persona had been inactive since 2021 and suggested an impersonator might be responsible.

This arrest comes two months after a joint operation by U.S., Canadian, and German authorities dismantled the command-and-control (C2) infrastructure linked to Kimwolf, AISURU, JackSkid, and Mossad. This operation was pivotal in curbing the botnets responsible for record-breaking DDoS attacks, including one that generated traffic peaking at 31.4 Terabits per second (Tbps).

Broader Implications and Future Outlook

Alongside Butler’s arrest, law enforcement agencies have unsealed seizure warrants targeting 45 DDoS-for-hire platforms, effectively dismantling their operations. One of these platforms reportedly collaborated with Kimwolf, underscoring the expansive network of cybercriminal partnerships.

Butler faces charges of aiding and abetting computer intrusion, which could result in a prison sentence of up to 10 years if convicted. This case exemplifies the complexities of cybercrime investigations and the importance of international cooperation in bringing cybercriminals to justice.

As cybersecurity threats continue to evolve, law enforcement agencies worldwide are intensifying efforts to combat organized cybercrime, ensuring the safety and integrity of global digital infrastructure.

The Hacker News Tags:Aisuru, Botnet, Brian Krebs, C2 infrastructure, Canada, Cyberattack, Cybercrime, Cybersecurity, DDoS, DoDIN, DoJ, Jacob Butler, Kimwolf, law enforcement

Post navigation

Previous Post: Lenovo Driver Exploited to Disrupt Security Systems
Next Post: Major Cybercrime VPN Service Disrupted by Authorities

Related Posts

GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security The Hacker News
Microsoft Locks Down IE Mode After Hackers Turned Legacy Feature Into Backdoor Microsoft Locks Down IE Mode After Hackers Turned Legacy Feature Into Backdoor The Hacker News
Iraqi Officials Targeted by New Malware Campaign Iraqi Officials Targeted by New Malware Campaign The Hacker News
JanelaRAT Malware Hits Latin American Banks Hard JanelaRAT Malware Hits Latin American Banks Hard The Hacker News
Perseus Malware Targets Android Devices for Financial Fraud Perseus Malware Targets Android Devices for Financial Fraud The Hacker News
Cisco Warns of Active Attacks Exploiting Unpatched 0-Day in AsyncOS Email Security Appliances Cisco Warns of Active Attacks Exploiting Unpatched 0-Day in AsyncOS Email Security Appliances The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Megalodon Campaign Targets Thousands of GitHub Repositories
  • Hugging Face Exploited in North Korean Malware Attack
  • Canadian Accused of Running Major DDoS Botnet
  • FBI Alerts on New Phishing Platform Targeting Microsoft 365
  • CISA Alerts: Exploited Vulnerability in Trend Micro Apex One

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Megalodon Campaign Targets Thousands of GitHub Repositories
  • Hugging Face Exploited in North Korean Malware Attack
  • Canadian Accused of Running Major DDoS Botnet
  • FBI Alerts on New Phishing Platform Targeting Microsoft 365
  • CISA Alerts: Exploited Vulnerability in Trend Micro Apex One

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark