Particle.news

Download on the App Store

U.S. Charges Oregon Man as Alleged Operator of Rapper Bot After Botnet Seizure

Authorities say they seized control of the Mirai‑derived network on August 6 under Operation PowerOFF, halting new attacks.

Image
arrest
Image
RapperBot botnet takedown

Overview

  • Ethan Foltz, 22, was charged in the District of Alaska with aiding and abetting computer intrusions and faces up to 10 years in prison if convicted.
  • Investigators say DCIS obtained administrative control of Rapper Bot during an August 6 search in Oregon, and private-sector monitors have reported no further activity since.
  • From April to early August 2025, the botnet allegedly launched more than 370,000 DDoS attacks against about 18,000 unique victims in over 80 countries.
  • Officials estimate Rapper Bot leveraged roughly 65,000–95,000 infected DVRs and routers to deliver attacks typically measuring 2–3 Tbps, with at least one possibly exceeding 6 Tbps.
  • Court filings describe a DDoS‑for‑hire scheme that included extortion; investigators cite PayPal and IP log links, say Foltz admitted acting as primary administrator, and note he identified a partner known as “SlayKings,” with media reports naming X as a targeted social platform.