Cybersecurity Blogs and Articles
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityBlogsWho Is the Kimwolf Botmaster “Dort”?
Who Is the Kimwolf Botmaster “Dort”?
CybersecurityDefense

Who Is the Kimwolf Botmaster “Dort”?

•February 28, 2026
0
Krebs on Security
Krebs on Security•Feb 28, 2026

Why It Matters

The revelation exposes how a single adolescent can scale a botnet into a multi‑million‑dollar criminal operation, highlighting gaps in proxy security and the real‑world danger of online retaliation. It underscores the need for stronger identity‑verification and rapid patching in residential proxy services.

Key Takeaways

  • •Dort likely Canadian teen, alias CPacket, born Aug 2003
  • •Operated Kimwolf botnet, used DDoS, doxing, swatting
  • •Sold disposable email and CAPTCHA‑bypass tools on SIM Land
  • •Partnered with hacker “Qoft” to steal $250k Xbox accounts
  • •Threatened Krebs and Synthient founder after vulnerability disclosure

Pulse Analysis

The investigative trail pieced together by KrebsOnSecurity and multiple cyber‑intelligence firms paints a detailed portrait of Dort, a self‑styled teenage hacker from Ottawa. By cross‑referencing a 2020 doxx, GitHub activity, and forum registrations tied to a Rogers Canada IP, analysts linked the monikers CPacket, M1CE, and DortDev to a single individual. This granular OSINT work illustrates how even low‑profile actors can leave a digital breadcrumb trail that, when aggregated, reveals their full operational footprint.

Beyond identity, Dort’s criminal enterprise evolved from Minecraft cheat tools to sophisticated infrastructure‑as‑a‑service offerings. The SIM Land Telegram channel showcased disposable‑email generators and CAPTCHA‑bypass scripts, services that enable mass account creation and fraud. Partnering with the hacker known as Qoft, Dort’s operation reportedly harvested stolen payment data to generate over $250,000 in Xbox Game Pass subscriptions, demonstrating the lucrative intersection of botnet control and credential‑theft marketplaces. Such services lower the barrier for other cybercriminals, amplifying the overall threat landscape.

The retaliation against KrebsOnSecurity and Synthient founder Benjamin Brundage underscores a dangerous escalation from technical exploitation to physical intimidation. After a vulnerability disclosure crippled Kimwolf’s growth, Dort orchestrated DDoS attacks, personal doxing, and a swatting hoax that prompted an actual police response. This pattern highlights the real‑world consequences of cyber‑research disclosures and the necessity for coordinated incident response, rapid patch deployment, and protective measures for investigators facing targeted harassment.

Who is the Kimwolf Botmaster “Dort”?

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...