Overview
- Ethan Foltz, 22, was charged in the District of Alaska with aiding and abetting computer intrusions and faces up to 10 years in prison if convicted.
- Investigators say DCIS obtained administrative control of Rapper Bot during an August 6 search in Oregon, and private-sector monitors have reported no further activity since.
- From April to early August 2025, the botnet allegedly launched more than 370,000 DDoS attacks against about 18,000 unique victims in over 80 countries.
- Officials estimate Rapper Bot leveraged roughly 65,000–95,000 infected DVRs and routers to deliver attacks typically measuring 2–3 Tbps, with at least one possibly exceeding 6 Tbps.
- Court filings describe a DDoS‑for‑hire scheme that included extortion; investigators cite PayPal and IP log links, say Foltz admitted acting as primary administrator, and note he identified a partner known as “SlayKings,” with media reports naming X as a targeted social platform.