In early January 2026, KrebsOnSecurity revealed how a safety researcher disclosed a vulnerability that was used to construct Kimwolf, the world’s largest and most disruptive botnet. Since then, the particular person in command of Kimwolf — who goes by the deal with “Dort” — has coordinated a barrage of distributed denial-of-service (DDoS), doxing and e mail flooding assaults in opposition to the researcher and this writer, and extra just lately brought about a SWAT group to be despatched to the researcher’s residence. This submit examines what’s knowable about Dort primarily based on public info.
A public “dox” created in 2020 asserted Dort was an adolescent from Canada (DOB August 2003) who used the aliases “CPacket” and “M1ce.” A search on the username CPacket on the open supply intelligence platform OSINT Industries finds a GitHub account underneath the names Dort and CPacket that was created in 2017 utilizing the e-mail tackle jay.miner232@gmail.com.

Picture: osint.industries.
The cyber intelligence agency Intel 471 says jay.miner232@gmail.com was used between 2015 and 2019 to create accounts at a number of cybercrime boards, together with Nulled (username “Uubuntuu”) and Cracked (consumer “Dorted”); Intel 471 stories that each of those accounts had been created from the identical Web tackle at Rogers Canada (99.241.112.24).
Dort was a particularly lively participant within the Microsoft sport Minecraft who gained notoriety for his or her “Dortware” software program that helped gamers cheat. However someplace alongside the best way, Dort graduated from hacking Minecraft video games to enabling much more severe crimes.
Dort additionally used the nickname DortDev, an id that was lively in March 2022 on the chat server for the prolific cybercrime group often known as LAPSUS$. Dort peddled a service for registering momentary e mail addresses, in addition to “Dortsolver,” code that would bypass varied CAPTCHA companies designed to stop automated account abuse. Each of those choices had been marketed in 2022 on SIM Land, a Telegram channel devoted to SIM-swapping and account takeover exercise.
The cyber intelligence agency Flashpoint listed 2022 posts on SIM Land by Dort that present this particular person developed the disposable e mail and CAPTCHA bypass companies with the assistance of one other hacker who glided by the deal with “Qoft.”
“I legit simply work with Jacob,” Qoft stated in 2022 in reply to a different consumer, referring to their unique enterprise associate Dort. In the identical dialog, Qoft bragged that the 2 had stolen greater than $250,000 price of Microsoft Xbox Recreation Cross accounts by growing a program that mass-created Recreation Cross identities utilizing stolen cost card knowledge.
Who’s the Jacob that Qoft known as their enterprise associate? The breach monitoring service Constella Intelligence finds the password utilized by jay.miner232@gmail.com was reused by only one different e mail tackle: jacobbutler803@gmail.com. Recall that the 2020 dox of Dort stated their date of start was August 2003 (8/03).
Looking this e mail tackle at DomainTools.com reveals it was utilized in 2015 to register a number of Minecraft-themed domains, all assigned to a Jacob Butler in Ottawa, Canada and to the Ottawa telephone quantity 613-909-9727.
Constella Intelligence finds jacobbutler803@gmail.com was used to register an account on the hacker discussion board Nulled in 2016, in addition to the account identify “M1CE” on Minecraft. Pivoting off the password utilized by their Nulled account exhibits it was shared by the e-mail addresses j.a.y.m.iner232@gmail.com and jbutl3@ocdsb.ca, the latter being an tackle at a website for the Ottawa-Carelton District College Board.
Information listed by the breach monitoring service Spycloud means that at one level Jacob Butler shared a pc together with his mom and a sibling, which could clarify why their e mail accounts had been linked to the password “jacobsplugs.” Neither Jacob nor any of the opposite Butler family members responded to requests for remark.
The open supply intelligence service Epieos finds jacobbutler803@gmail.com created the GitHub account “MemeClient.” In the meantime, Flashpoint listed a deleted nameless Pastebin.com submit from 2017 declaring that MemeClient was the creation of a consumer named CPacket — one in every of Dort’s early monikers.
Why is Dort so mad? On January 2, KrebsOnSecurity printed The Kimwolf Botnet is Stalking Your Native Community, which explored analysis into the botnet by Benjamin Brundage, founding father of the proxy monitoring service Synthient. Brundage discovered that the Kimwolf botmasters had been exploiting a little-known weak point in residential proxy companies to contaminate poorly-defended gadgets — like TV containers and digital picture frames — plugged into the inner, personal networks of proxy endpoints.
By the point that story went stay, many of the weak proxy suppliers had been notified by Brundage and had fastened the weaknesses of their techniques. That vulnerability remediation course of massively slowed Kimwolf’s potential to unfold, and inside hours of the story’s publication Dort created a Discord server in my identify that started publishing private details about and violent threats in opposition to Brundage, Yours Really, and others.

Dort and mates incriminating themselves by planning swatting assaults in a public Discord server.
Final week, Dort and mates used that very same Discord server (then named “Krebs’s Koinbase Kallers”) to threaten a swatting assault in opposition to Brundage, once more posting his residence tackle and private info. Brundage advised KrebsOnSecurity that native cops subsequently visited his residence in response to a swatting hoax which occurred across the identical time that one other member of the server posted a door emoji and taunted Brundage additional.

A member of Dort’s Krebs Discord channel taunts Synthient founder Ben Brundage with an image of a door.
Somebody on the server then linked to a cringeworthy (and NSFW) new Soundcloud diss monitor recorded by the consumer DortDev that included a stickied message from Dort saying, “Ur lifeless nigga. u higher watch ur fucking again. sleep with one eye open. bitch.”
“It’s a reasonably hefty penny for a brand new entrance door,” the diss monitor intoned. “If his head doesn’t get blown off by SWAT officers. What’s it like not having a entrance door?”
Hopefully, Dort will quickly have the ability to inform us all precisely what it’s like.