Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

DOJ Charges Man Behind RapperBot Botnet

August 20, 2025
Reading Time: 3 mins read
in News
DOJ Charges Man Behind RapperBot Botnet

Federal authorities have charged Ethan Foltz, a 22-year-old from Eugene, Oregon, with allegedly developing and operating RapperBot, a powerful distributed denial-of-service (DDoS) botnet offered as a criminal service. This DDoS-for-hire operation, which infected devices like digital video recorders (DVRs) and Wi-Fi routers, has been used to conduct over 370,000 attacks since at least 2021, targeting victims in more than 80 countries. The U.S. Department of Justice (DoJ) and other law enforcement agencies successfully took down the botnet by seizing its command-and-control infrastructure during a search of Foltz’s residence on August 6, 2025. This action is a significant victory in the ongoing global fight against cybercrime.

A botnet is a network of internet-connected devices infected with malware that allows an attacker to control them remotely. These compromised devices, often referred to as “bots” or “zombies,” can then be used to perform malicious tasks without their owners’ knowledge. RapperBot, also known as “Eleven Eleven Botnet” and “CowBot,” was heavily inspired by well-known botnets like fBot (aka Satori) and Mirai. It worked by using brute-force attacks via SSH or Telnet to guess weak or default credentials, gaining access to insecure devices like routers. Once a device was infected, it was conscripted into the botnet, ready to be commanded to launch DDoS attacks. By leveraging a massive number of compromised devices, the botnet could flood a target’s server with so much fake traffic that it would become unavailable to legitimate users.

The primary way Foltz and his co-conspirators monetized RapperBot was by selling access to the botnet’s attack capabilities. Paying customers could use the service to unleash DDoS attacks against any internet-connected target. From April 2025 to early August alone, the botnet targeted approximately 18,000 unique victims across various countries, including China, Japan, the United States, Ireland, and Hong Kong. The attacks were massive, with prosecutors alleging the botnet comprised 65,000 to 95,000 devices capable of generating attacks measuring between 2 and 3 Terabits per second (Tbps), with one attack likely exceeding 6 Tbps. Some of the botnet’s clients even used the attacks as a form of ransom, extorting money from victims. A 2023 report also detailed how the botnet expanded its operations into cryptojacking, illicitly using the compromised devices’ computing power to mine Monero cryptocurrency for additional profit.

The investigation into RapperBot’s operations was a collaborative effort involving multiple agencies and private sector partners. Amazon Web Services (AWS) played a crucial role, helping law enforcement identify the botnet’s command-and-control (C2) infrastructure and reverse-engineer the malware to map its operations. This technical assistance was key to the investigation, which ultimately traced the botnet to Foltz through IP address links to his online services, including his PayPal and Gmail accounts. Evidence also showed that Foltz had searched for “RapperBot” over 100 times, further linking him to the criminal enterprise. His arrest and the takedown of the botnet are part of a larger, ongoing international initiative called Operation PowerOFF, which aims to dismantle DDoS-for-hire services globally.

Ethan Foltz has been charged with one count of aiding and abetting computer intrusions. If convicted, he faces a maximum sentence of 10 years in prison. His case underscores the severe legal consequences for those who develop and operate cybercrime services, even from what might seem like a distance. The coordinated action in this case, spanning multiple countries and involving both law enforcement and private tech companies, highlights the increasing commitment to disrupting the financial incentives and technical infrastructure that fuel the DDoS-for-hire market. It sends a clear message that these “booter” or “stresser” services, which lower the barrier to entry for cyberattacks, are being aggressively targeted and that the operators will be held accountable.

Reference:

  • DOJ Charges 22-Year-Old Linked to RapperBot Botnet Behind 370K DDoS Attacks
Tags: August 2025Cyber NewsCyber News 2025Cyber threats
ADVERTISEMENT

Related Posts

Glilot Capital Raises 500 Million Fund

Glilot Capital Raises 500 Million Fund

September 18, 2025
Glilot Capital Raises 500 Million Fund

Researchers Uncover Ransomware Links

September 18, 2025
Glilot Capital Raises 500 Million Fund

DOJ Resentences BreachForums Founder

September 18, 2025
RaccoonO365 Phishing Network Down

RaccoonO365 Phishing Network Down

September 17, 2025
Windows 10 Support Ends in 30 Days

Windows 10 Support Ends in 30 Days

September 17, 2025
RaccoonO365 Phishing Network Down

Exchange 2016, 2019 Support Ends Soon

September 17, 2025

Latest Alerts

FileFix Uses Steganography To Drop StealC

Apple Backports Fix For Exploited Bug

Google Removes 224 Android Malware Apps

ChatGPT Calendar Flaw Lets Email Theft

Windows Update Breaks SMBv1 Shares

Scattered Spider Returns Despite Exit

Subscribe to our newsletter

    Latest Incidents

    AI Forged Military IDs Used In Phishing

    Insight Partners Warns After Data Breach

    ShinyHunters Claims Salesforce Data Theft

    DHS Data Hub Leaked Sensitive Intel

    Worm Infects 180 npm Packages

    Jaguar Land Rover Delays Restart After Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial