Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

The Seizure of "Rapper Bot": A Breakthrough in the Fight Against Malicious Cyberactivity




The U.S. Department of Justice has announced that it has seized the command and control infrastructure of the "Rapper Bot" malware, a DDoS-for-hire botnet linked to high-profile attacks on various organizations worldwide. The alleged developer, Ethan Foltz, is facing charges related to aiding and abetting computer intrusions. This development marks an important breakthrough in the fight against cybercrime and serves as a testament to the ongoing efforts of law enforcement agencies and cybersecurity professionals.

  • The U.S. Department of Justice has seized the command and control infrastructure of the Rapper Bot malware botnet.
  • Ethan Foltz, 22, from Eugene, Oregon, is facing charges related to aiding and abetting computer intrusions for his alleged role in developing the botnet.
  • The Rapper Bot malware botnet has been linked to various high-profile attacks on U.S. government systems, major media platforms, gaming companies, and large tech firms.
  • The botnet's firepower can reach up to 6 terabits per second, making it a formidable force in cyber warfare.
  • The malicious activities of Rapper Bot have expanded to include cryptomining, allowing the botnet to mine cryptocurrency from compromised devices.
  • The DoJ estimates that Rapper Bot has launched over 370,000 attacks, racking up billions of packets per second since April 2025.
  • The scale and reach of these attacks have resulted in significant financial losses for victims, with costs ranging from $500 to $10,000 for short-lived DDoS attacks.



  • The world of cybercrime has witnessed its fair share of nefarious activities, but the recent seizure of the "Rapper Bot" malware and the subsequent charges brought against its alleged developer have sent a strong message to malicious actors worldwide. The U.S. Department of Justice (DoJ) has announced that it has seized the command and control infrastructure of this DDoS-for-hire botnet, and has identified the alleged developer, Ethan Foltz, 22, from Eugene, Oregon, who is now facing charges.

    According to the DoJ, Rapper Bot is a Mirai-based malware botnet that was first active in 2021. The network has been linked to various high-profile attacks, including those on U.S. government systems, major media platforms, gaming companies, and large tech firms. The botnet's firepower can range between 2 to 6 terabits per second, making it a formidable force in the realm of cyber warfare.

    The malicious activities of Rapper Bot have been diversified over time, with the addition of a cryptomining module in 2023. This move has allowed the botnet to not only carry out DDoS attacks but also mine cryptocurrency from compromised devices. The DoJ estimates that since April 2025, Rapper Bot has launched over 370,000 attacks, racking up billions of packets per second.

    The scale and reach of these attacks have made them a significant concern for organizations worldwide. According to the DoJ, even short-lived DDoS attacks can result in substantial financial losses for victims. The agency explains that attacks averaging over two terabits per second lasting 30 seconds might cost a victim anywhere from $500 to $10,000.

    The impact of Rapper Bot's malicious activities extends beyond financial losses, with many of its attacks involving extortion demands. By leveraging the DDoS attack volumes of the botnet, some of its customers have used these tactics to extort victims, making the situation even more dire for those affected.

    Ethan Foltz, 22, from Eugene, Oregon, has been identified as the alleged developer and administrator of Rapper Bot. According to the DoJ, Foltz is facing charges related to aiding and abetting computer intrusions, with a maximum sentence of up to ten years in prison if convicted.

    While Foltz remains free pending the outcome of his case, the seizure of Rapper Bot's command and control infrastructure has dealt a significant blow to the botnet. The authorities believe that this development makes it unlikely for other operators to utilize these backup C2s, thereby limiting the potential resurgence of malicious activity from Rapper Bot.

    The recent takedown of Rapper Bot serves as a testament to the ongoing efforts of law enforcement agencies and cybersecurity professionals in their quest to combat cybercrime. The determination and vigilance displayed by these individuals are crucial in ensuring that malicious actors such as Foltz are held accountable for their actions.

    In conclusion, the seizure of "Rapper Bot" malware marks an important milestone in the fight against malicious cyberactivity. As we continue to navigate this complex landscape, it is essential to acknowledge the dedication and expertise of those who work tirelessly to protect our digital infrastructure.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/The-Seizure-of-Rapper-Bot-A-Breakthrough-in-the-Fight-Against-Malicious-Cyberactivity-ehn.shtml

  • https://www.bleepingcomputer.com/news/legal/rapper-bot-malware-seized-alleged-developer-identified-and-charged/


  • Published: Wed Aug 20 14:08:12 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us