## Federal Crackdown on DDoS Cybercrime: Rapper Bot Takedown
A significant cybercrime investigation has culminated in the dismantling of one of the most notorious DDoS-for-hire botnets, known as Rapper Bot. Central to this case is a 22-year-old from Eugene, Oregon: Ethan Foltz. As per a federal criminal complaint filed in Alaska on August 6, 2025, Foltz is accused of masterminding a botnet that executed hundreds of thousands of disruptive attacks globally.
### What is Rapper Bot?
Rapper Bot, also referred to as the “Eleven Eleven Botnet” or “CowBot,” functioned as a large-scale DDoS-for-hire service. This type of cybercrime involves hacking into various internet-connected devices, such as WiFi routers and digital video recorders (DVRs). Once compromised, these devices could unleash a torrent of internet traffic on targeted systems, leading to Distributed Denial of Service (DDoS) attacks that incapacitate websites, digital services, and entire networks in mere seconds.
### The Scale and Consequence of Rapper Bot’s Operations
Between April 2025 and the filing of the complaint, Rapper Bot is reported to have initiated over 370,000 separate attacks against more than 18,000 unique victims across upwards of 80 countries. This botnet was formidable, utilizing between 65,000 and 95,000 infected devices at any given time. Traffic from these attacks often peaked at 2 to 3 Terabits per second, with some reaching an astonishing 6 Terabits per second.
Notable targets of these attacks included U.S. government entities, major tech companies, and a leading social media platform. Investigators confirmed that at least five of the compromised devices used in these cyberattacks were located in Alaska.
### Monetizing Cybercrime: A Profitable Operation
Ethan Foltz and his co-conspirators reportedly monetized Rapper Bot by offering clients access to its DDoS capabilities. Some customers allegedly employed the botnet for extortion purposes, threatening to launch devastating attacks unless their demands were met. According to estimates, a single 30-second DDoS attack could inflict between $500 to $10,000 in damages and recovery costs, underscoring the financial risk associated with such cyber threats.
### Law Enforcement’s Response: The Takedown of Rapper Bot
The turning point in this investigation came on August 6, 2025, when federal authorities executed a search warrant at Foltz’s Oregon residence. In this pivotal operation, law enforcement gained control of Rapper Bot, effectively disabling its attack infrastructure. Since that time, there have been no reported incidents involving Rapper Bot, following the transfer of its command and control systems to the Defense Criminal Investigative Service (DCIS).
U.S. Attorney Michael J. Heyman for the District of Alaska stated, “Rapper Bot was one of the most powerful DDoS botnets to ever exist, but the outstanding investigatory work by DCIS cyber agents has put an end to Foltz’s operations as administrator.”
### Legal Ramifications and Future Actions
Ethan Foltz faces a charge of aiding and abetting computer intrusions, a felony that carries a maximum sentence of up to 10 years in prison if convicted. The prosecution is being led by Assistant U.S. Attorney Adam Alexander, with the investigation conducted by the DCIS in collaboration with key industry partners.
This crackdown is part of a broader initiative known as Operation PowerOFF, an international law enforcement effort aimed at dismantling DDoS-for-hire botnets worldwide. It’s important to note that Foltz is presumed innocent until proven guilty in a court of law.
### Conclusion
This significant takedown highlights the ongoing battle against cybercrime and the importance of law enforcement collaboration in protecting against the growing threats posed by DDoS attacks. As technology evolves, so too does the need for vigilant safeguarding of digital infrastructures.


