In early January 2026, KrebsOnSecurity revealed how a safety researcher disclosed a vulnerability that was used to construct Kimwolf, the world’s largest and most disruptive botnet. Since then, the particular person accountable for Kimwolf — who goes by the deal with “Dort” — has coordinated a barrage of distributed denial-of-service (DDoS), doxing and electronic mail flooding assaults towards the researcher and this creator, and extra just lately precipitated a SWAT workforce to be despatched to the researcher’s residence. This publish examines what’s knowable about Dort based mostly on public data.
A public “dox” created in 2020 asserted Dort was a youngster from Canada (DOB August 2003) who used the aliases “CPacket” and “M1ce.” A search on the username CPacket on the open supply intelligence platform OSINT Industries finds a GitHub account below the names Dort and CPacket that was created in 2017 utilizing the e-mail tackle jay.miner232@gmail.com.
Picture: osint.industries.
The cyber intelligence agency Intel 471 says jay.miner232@gmail.com was used between 2015 and 2019 to create accounts at a number of cybercrime boards, together with Nulled (username “Uubuntuu”) and Cracked (consumer “Dorted”); Intel 471 stories that each of those accounts have been created from the identical Web tackle at Rogers Canada (99.241.112.24).
Dort was a particularly energetic participant within the Microsoft sport Minecraft who gained notoriety for his or her “Dortware” software program that helped gamers cheat. However someplace alongside the best way, Dort graduated from hacking Minecraft video games to enabling much more critical crimes.
Dort additionally used the nickname DortDev, an id that was energetic in March 2022 on the chat server for the prolific cybercrime group often called LAPSUS$. Dort peddled a service for registering short-term electronic mail addresses, in addition to “Dortsolver,” code that would bypass varied CAPTCHA providers designed to stop automated account abuse. Each of those choices have been marketed in 2022 on SIM Land, a Telegram channel devoted to SIM-swapping and account takeover exercise.
The cyber intelligence agency Flashpoint listed 2022 posts on SIM Land by Dort that present this particular person developed the disposable electronic mail and CAPTCHA bypass providers with the assistance of one other hacker who glided by the deal with “Qoft.”
“I legit simply work with Jacob,” Qoft mentioned in 2022 in reply to a different consumer, referring to their unique enterprise companion Dort. In the identical dialog, Qoft bragged that the 2 had stolen greater than $250,000 value of Microsoft Xbox Recreation Move accounts by growing a program that mass-created Recreation Move identities utilizing stolen cost card information.
Who’s the Jacob that Qoft known as their enterprise companion? The breach monitoring service Constella Intelligence finds the password utilized by jay.miner232@gmail.com was reused by only one different electronic mail tackle: jacobbutler803@gmail.com. Recall that the 2020 dox of Dort mentioned their date of delivery was August 2003 (8/03).
Looking this electronic mail tackle at DomainTools.com reveals it was utilized in 2015 to register a number of Minecraft-themed domains, all assigned to a Jacob Butler in Ottawa, Canada and to the Ottawa cellphone quantity 613-909-9727.
Constella Intelligence finds jacobbutler803@gmail.com was used to register an account on the hacker discussion board Nulled in 2016, in addition to the account title “M1CE” on Minecraft. Pivoting off the password utilized by their Nulled account exhibits it was shared by the e-mail addresses j.a.y.m.iner232@gmail.com and jbutl3@ocdsb.ca, the latter being an tackle at a website for the Ottawa-Carelton District College Board.
Knowledge listed by the breach monitoring service Spycloud means that at one level Jacob Butler shared a pc together with his mom and a sibling, which could clarify why their electronic mail accounts have been related to the password “jacobsplugs.” Neither Jacob nor any of the opposite Butler family members responded to requests for remark.
The open supply intelligence service Epieos finds jacobbutler803@gmail.com created the GitHub account “MemeClient.” In the meantime, Flashpoint listed a deleted nameless Pastebin.com publish from 2017 declaring that MemeClient was the creation of a consumer named CPacket — one in all Dort’s early monikers.
Why is Dort so mad? On January 2, KrebsOnSecurity printed The Kimwolf Botnet is Stalking Your Native Community, which explored analysis into the botnet by Benjamin Brundage, founding father of the proxy monitoring service Synthient. Brundage discovered that the Kimwolf botmasters have been exploiting a little-known weak spot in residential proxy providers to contaminate poorly-defended units — like TV bins and digital photograph frames — plugged into the inner, non-public networks of proxy endpoints.
By the point that story went reside, many of the susceptible proxy suppliers had been notified by Brundage and had mounted the weaknesses of their methods. That vulnerability remediation course of massively slowed Kimwolf’s means to unfold, and inside hours of the story’s publication Dort created a Discord server in my title that started publishing private details about and violent threats towards Brundage, Yours Really, and others.
Dort and pals incriminating themselves by planning swatting assaults in a public Discord server.
Final week, Dort and pals used that very same Discord server (then named “Krebs’s Koinbase Kallers”) to threaten a swatting assault towards Brundage, once more posting his residence tackle and private data. Brundage advised KrebsOnSecurity that native law enforcement officials subsequently visited his residence in response to a swatting hoax which occurred across the identical time that one other member of the server posted a door emoji and taunted Brundage additional.
Dort, utilizing the alias “Meow,” taunts Synthient founder Ben Brundage with an image of a door.
Somebody on the server then linked to a cringeworthy (and NSFW) new Soundcloud diss monitor recorded by the consumer DortDev that included a stickied message from Dort saying, “Ur lifeless nigga. u higher watch ur fucking again. sleep with one eye open. bitch.”
“It’s a reasonably hefty penny for a brand new entrance door,” the diss monitor intoned. “If his head doesn’t get blown off by SWAT officers. What’s it like not having a entrance door?”
Hopefully, Dort will quickly be capable of inform us all precisely what it’s like.
Replace, 10:29 a.m.: Jacob Butler responded to requests for remark, talking with KrebsOnSecurity briefly through phone. Butler mentioned he didn’t discover earlier requests for remark as a result of he hasn’t actually been on-line since 2021, after his residence was swatted a number of instances. He acknowledged making and distributing a Minecraft cheat way back, however mentioned he hasn’t performed the sport in years and was not concerned in Dortsolver or some other exercise attributed to the Dort nickname after 2021.
“It was a extremely outdated cheat and I don’t bear in mind the title of it,” Butler mentioned of his Minecraft modification. “I’m very careworn, man. I don’t know if persons are going to swat me once more or what. After that, I just about walked away from all the things, logged off and mentioned fuck that. I don’t go browsing anymore. I don’t know why folks would nonetheless be going after me, to be fully trustworthy.”
When requested what he does for a residing, Butler mentioned he largely stays residence and helps his mother round the home as a result of he struggles with autism and social interplay. He maintains that somebody should have compromised a number of of his outdated accounts and is impersonating him on-line as Dort.
“Somebody is definitely most likely impersonating me, and now I’m actually apprehensive,” Butler mentioned. “That is making me relive all the things.”
However there are points with Butler’s timeline. For instance, Jacob’s voice in our cellphone dialog was remarkably much like the Jacob/Dort whose voice may be heard in this Sept. 2022 Conflict of Code competitors between Dort and one other coder (Dort misplaced). At round 6 minutes and 10 seconds into the recording, Dort launches right into a cursing tirade that mirrors the stream of profanity within the diss rap that Dortdev posted threatening Brundage. Dort may be heard once more at round 16 minutes; at round 26:00, Dort threatens to swat his opponent.
Butler mentioned the voice of Dort isn’t his, precisely, however fairly that of an impersonator who had doubtless cloned his voice.
“I wish to make clear that was completely not me,” Butler mentioned. “There have to be somebody utilizing a voice changer. Or one thing of the types. As a result of folks have been cloning my voice earlier than and sending audio clips of ‘me’ saying outrageous stuff.”









