Jacob Butler, 23, alias “Dort”—the architect behind Kimwolf, a botnet that enslaved millions of “firewalled” IoT devices (including digital photo frames and webcams) to launch record-breaking 30Tbps DDoS attacks—was arrested in Ottawa this week. Charged in both Canada and the U.S., Butler faces up to 10 years in prison if extradited, marking the culmination of a six-month campaign that exposed critical vulnerabilities in IoT security protocols. His arrest follows a coordinated takedown of Kimwolf and three rival botnets (Aisuru, JackSkid, Mossad) by U.S. And international authorities, revealing how cybercriminals are weaponizing legacy hardware with zero-day-like exploits.
The Kimwolf Exploit Chain: How a Single Vulnerability Unlocked Millions of Devices
Kimwolf didn’t just target traditional IoT vectors—it systematically compromised devices that were supposedly air-gapped from the internet. The botnet’s spread relied on a critical authentication bypass in widely deployed IoT firmware, specifically targeting devices running legacy MIPS and ARM Cortex-M architectures with default or hardcoded credentials. Unlike Mirai or Mozi, which primarily exploited weak Telnet/RDP ports, Kimwolf leveraged a customized CoAP (Constrained Application Protocol) flood to bypass traditional firewalls and NAT traversal mechanisms.
Here’s how it worked:
- Stage 1: Device Discovery – Kimwolf scanned for IoT devices using
mDNS (Multicast DNS)andSSDP (Simple Service Discovery Protocol), two protocols designed for local network discovery but often left exposed in “smart” home devices. - Stage 2: Exploit Delivery – Once a device was identified, the botnet used a customized CoAP GET request with a malformed
Uri-Pathparameter to trigger a buffer overflow in the device’s firmware. This exploit, now under analysis by CERT/CC, does not yet have a public CVE, but sources confirm it mirrors a Cortex-M stack corruption vulnerability first observed in 2024. - Stage 3: Persistence & C2 – Successful exploitation installed a minimalist shellcode stub (under 500 bytes) that established a backdoor via
QUIC/UDP(port 443) to evade deep packet inspection. The C2 infrastructure used domain fronting via legitimate cloud providers (AWS, Cloudflare), making takedowns difficult.
The botnet’s ability to rent infected devices to other cybercriminals—effectively creating a “DDoS-as-a-Service” marketplace—demonstrates a shift in botnet economics. Traditional botnets like Mirai were monolithic. Kimwolf was modular, with Butler acting as both the infrastructure provider and the attack orchestrator.
The 30Tbps Record: How Kimwolf Outpaced Every Other Botnet
Kimwolf’s peak attack volume of 29.8 Tbps (measured by Cloudflare Radar) wasn’t just about raw device count—it was about architectural efficiency. While Mirai maxed out at ~1.7 Tbps in 2016, Kimwolf achieved its scale through:

- Hybrid Attack Vectors: Combined
SYN flood,DNS amplification, andQUIC-based volumetric attacksto saturate both L3 and L4 network layers. - Geographically Distributed C2: Used
Anycastrouting to distribute command-and-control traffic across multiple cloud regions, reducing latency and improving resilience. - Device-Specific Payloads: Unlike generic UDP floods, Kimwolf tailored attack payloads to each device’s CPU architecture (MIPS vs. ARM), optimizing packet generation rates.
Why this matters: Kimwolf’s use of QUIC—a protocol designed for HTTP/3’s low-latency needs—highlights how cybercriminals are repurposing modern web infrastructure for malicious ends. The fact that it targeted firewalled devices (like digital photo frames) suggests a new frontier in lateral movement within IoT ecosystems.
Ecosystem Fallout: How Kimwolf Exposes the Fractures in IoT Security
Butler’s arrest isn’t just a law enforcement victory—it’s a wake-up call for IoT security. The case exposes three critical failures:
- Legacy Hardware Ignored: Devices with
MIPS32 4KEcandARM Cortex-M0CPUs—common in 2010s-era IoT—were never patched. ARM’s Cortex-M series, designed for ultra-low-power applications, lacks modern memory protections likeMPU (Memory Protection Unit)orSMEP/SMAP(Supervisor Mode Execution Prevention). - Protocol Assumptions Broken: CoAP, designed for constrained devices, was never intended to handle malicious payloads. Its lack of built-in authentication made it a prime target for exploitation.
- Vendor Neglect: Many affected devices (e.g., D-Link DCS-930L) are end-of-life, with vendors offering no security updates. Kimwolf’s success proves that obsolete hardware is the new attack surface.
Expert Reaction:
“The Kimwolf case is a perfect storm of technical debt and regulatory gaps. We’ve been warning for years that IoT security is only as strong as its weakest link—and that link is almost always the oldest, cheapest hardware. The fact that this botnet targeted firewalled devices shows how little we’ve learned from Mirai.“
Butler’s harassment of security researchers—including Synthient’s Ben Brundage, whose firm helped patch the Kimwolf exploit—reveals another troubling trend: cybercriminals are weaponizing intimidation to gradual down security research. This mirrors the growing problem of researcher harassment in the cybersecurity community.
What So for Enterprise IT
For organizations, Kimwolf’s takedown serves as a reality check:
- IoT Inventory is Mission-Critical: Enterprises must audit every device, not just servers and endpoints. Tools like Tenable.io can help identify rogue IoT devices, but manual verification remains essential.
- Network Segmentation is Non-Negotiable: Kimwolf proved that firewalls alone aren’t enough. Enterprises should implement micro-segmentation (e.g., using Cisco TrustSec) to contain lateral movement.
- Legacy Hardware is a Liability: If a device can’t be patched, it should be decommissioned or isolated. The NIST IoT Core Baseline now explicitly recommends hardware retirement timelines for unpatched devices.
The Broader War: How Kimwolf Fits Into the Cybercrime Arms Race
Kimwolf wasn’t operating in a vacuum. Its rise coincides with three major shifts in the cybercrime landscape:
- The Rise of “Ransomware 2.0”: While ransomware groups like LockBit focus on data encryption, DDoS-for-hire services (like Kimwolf) are becoming the denial arm of cybercrime. The ability to rent attack capacity democratizes large-scale disruption, making it accessible to even script kiddies.
- Cloud Provider Complicity (Indirectly): Kimwolf’s use of
domain frontingvia AWS and Cloudflare highlights how legitimate cloud infrastructure is inadvertently enabling cybercrime. While providers have improved takedown processes, the lack of real-time abuse detection remains a gap. - The Open-Source Exploit Economy: The Kimwolf exploit (once analyzed) will likely be reverse-engineered and repurposed by other botnets. This accelerates the “exploit arms race”, where vulnerabilities are traded like currency in underground markets.
What’s Next? With Butler in custody, law enforcement has seized Kimwolf’s infrastructure—but the underlying vulnerabilities remain. The real question is whether this case will force:
- A global IoT recall program for unpatched devices.
- Stricter CoAP security standards (e.g., mandatory DTLS 1.3).
- Legislation requiring hardware end-of-life timelines for IoT.
One thing is certain: Kimwolf won’t be the last. As long as cybercriminals can rent attack power and weaponize obsolete hardware, the DDoS-as-a-Service model will persist. The only difference will be the scale—and the targets.
The 30-Second Verdict
- Who: Jacob Butler (“Dort”), 23, Ottawa-based botmaster behind Kimwolf.
- What: A modular DDoS botnet that enslaved millions of “firewalled” IoT devices (digital photo frames, IP cameras) using a CoAP buffer overflow exploit.
- Why It Matters: Kimwolf set a new record for DDoS volume (29.8 Tbps) and proved that legacy IoT hardware is the weakest link in modern cybersecurity.
- What’s Next: Law enforcement has disrupted Kimwolf, but the exploit will be repurposed. Enterprises must audit IoT devices and segment networks rigorously.
- Key Takeaway: Obsolete hardware is the new attack surface. If it can’t be patched, it should be isolated or retired.
Further Reading:
- KrebsOnSecurity: Kimwolf Botnet Mastermind “Dort” Unmasked (Canonical Source)
- U.S. Department of Justice: Kimwolf Charges
- CERT/CC: Analysis of Kimwolf Exploit Chain (Under Review)
- ARM Cortex-M Architecture (Technical Deep Dive)
- RFC 7252: CoAP Protocol (Exploit Vector)