Canadian authorities have arrested a 23-year-old Ottawa man, identified as Jacob Butler, on allegations that he developed and operated the Kimwolf botnet. This internet-of-things (IoT) network is accused of enslaving millions of devices, including web cameras and digital photo frames, to facilitate massive distributed denial-of-service (DDoS) attacks over the past six months.
A criminal complaint unsealed in an Alaska district court outlines charges against Butler, who operated under the alias “Dort.” According to the Department of Justice, the complaint follows an investigation by the Ontario Provincial Police, which executed a search warrant at Butler’s residence on March 19. Butler remains in Canadian custody and is scheduled for a court hearing early next week.
Impact and Investigation
The Kimwolf botnet’s activities were not limited to commercial targets. the government stated that the attacks affected internet address ranges belonging to the Department of Defense. The DoD’s Defense Criminal Investigative Service, supported by the FBI field office in Anchorage, has been actively investigating the case.

Investigators connected Butler to the botnet’s infrastructure by analyzing IP addresses, transaction records and online messaging history. The criminal complaint indicates that the suspect failed to effectively separate his personal identity from his cybercriminal activities, facilitating the investigation.
Potential Legal Outcomes
In Canada, Butler faces charges including unauthorized use of a computer, possession of devices for unauthorized system access, and mischief in relation to computer data. In the United States, he faces a charge of aiding and abetting computer intrusion.
If Butler is extradited and convicted in a U.S. Court, he could face a maximum sentence of 10 years in prison. However, legal experts note that this maximum may be significantly reduced by U.S. Sentencing Guidelines, which account for factors such as the defendant’s age, lack of prior criminal history, and the extent of his cooperation with federal authorities.
Frequently Asked Questions
What is the Kimwolf botnet?
Kimwolf is an IoT botnet that targeted devices traditionally considered “firewalled” from the internet, such as web cameras and digital photo frames, to conduct massive DDoS attacks and rent out infected systems to other cybercriminals.
How was the suspect identified?
Authorities connected Butler to the botnet through IP addresses, online account information, transaction records, and messaging application records. Security researchers had previously identified the suspect by tracking his activity on cybercrime forums and public communication servers.
What happens to the botnet infrastructure?
U.S. Authorities and international partners have already taken steps to disrupt the infrastructure of Kimwolf and competing botnets, including seizing technical infrastructure and domain names associated with various DDoS-for-hire services.
How do you think the increased focus on individual botmasters will affect the prevalence of large-scale DDoS attacks in the future?
