A security researcher's disclosure of a vulnerability in January 2026 exposed Kimwolf, a massive botnet subsequently weaponized by an operator using the handle "Dort." The botmaster has orchestrated sustained attacks against both the researcher and Brian Krebs, leveraging Kimwolf's infrastructure to execute distributed denial-of-service assaults, doxing campaigns, and email flooding operations. Dort escalated tactics by coordinating a swatting attack that deployed a SWAT team to the researcher's residence. KrebsOnSecurity's investigation examines publicly available information to identify and profile Dort, establishing a record of the threat actor's operational patterns and retaliatory methods. The case demonstrates how vulnerability disclosures can trigger coordinated harassment campaigns from malicious actors controlling critical infrastructure. Defenders should monitor for Kimwolf-related DDoS indicators, track swatting patterns linked to researcher targeting, and implement incident response procedures for multi-vector attacks combining technical exploitation with physical intimidation tactics.