HomeIntelligenceBrief
BREACH BRIEF🟠 High ThreatIntel

Botmaster “Dort” Uses Kimwolf Botnet for DDoS, Doxing, and Email‑Flood Campaigns

The individual known as “Dort” controls the Kimwolf botnet and has launched coordinated DDoS, doxing, and email‑flood attacks against security researchers, prompting a SWAT response. The actor’s history of credential reuse and service‑selling on cyber‑crime forums highlights a supply‑chain risk for any organization relying on internet‑facing infrastructure.

LiveThreat™ Intelligence · 📅 April 06, 2026· 📰 krebsonsecurity.com
🟠
Severity
High
TI
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
3 recommended
📰
Source
krebsonsecurity.com

Botmaster “Dort” Uses Kimwolf Botnet for DDoS, Doxing, and Email‑Flood Campaigns

What Happened – The individual known as “Dort” (aliases CPacket, M1ce, DortDev) controls the Kimwolf botnet, the world’s largest DDoS‑capable network. Since January 2026 Dort has launched coordinated DDoS attacks, large‑scale doxing, and email‑flooding campaigns against security researchers and journalists, even prompting a SWAT response.

Why It Matters for TPRM

  • Botnet operators can weaponize compromised third‑party assets, creating downstream service disruptions for vendors.
  • Doxing of vendor personnel can lead to social‑engineering attacks against supply‑chain partners.
  • Email‑flooding can overwhelm incident‑response channels, delaying remediation for client organizations.

Who Is Affected – Technology‑SaaS providers, cloud‑hosting services, MSPs, and any organization that relies on internet‑facing infrastructure.

Recommended Actions

  • Verify that any third‑party services you consume are protected against large‑scale DDoS (e.g., scrubbing services, rate‑limiting).
  • Review employee exposure: enforce strict personal‑information handling policies and monitor for credential reuse.
  • Harden email gateways and implement anti‑spam/anti‑phishing controls to mitigate flooding attacks.

Technical Notes – Dort’s activity stems from a long‑standing GitHub account (jay.miner232@gmail.com) linked to multiple cyber‑crime forum registrations from a Rogers Canada IP (99.241.112.24). The botnet is leveraged for DDoS, while “Dortsolver” provides CAPTCHA‑bypass code and disposable‑email services sold on Telegram’s SIM‑Land channel. No public CVE is associated, but the threat actor demonstrates a clear capability to weaponize compromised devices at scale. Source: Krebs on Security

📰 Original Source
https://krebsonsecurity.com/2026/02/who-is-the-kimwolf-botmaster-dort/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.