7721
Cybersecurity

How a Brazilian Anti-DDoS Firm Became the Source of Massive Attacks

Introduction

A Brazilian cybersecurity company that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has inadvertently been the launching pad for a sustained wave of massive DDoS assaults against other Brazilian internet service providers (ISPs). Recent investigations have revealed that the firm's own infrastructure was compromised and used to build a powerful botnet. The company's CEO claims the breach was the work of a malicious competitor aiming to damage the firm's reputation.

How a Brazilian Anti-DDoS Firm Became the Source of Massive Attacks
Source: krebsonsecurity.com

Background on Huge Networks

Founded in Miami, Florida in 2014, Huge Networks operates primarily in Brazil. Initially catering to game server protection against DDoS attacks, the company evolved into a full-fledged DDoS mitigation provider for ISPs. Despite its role in defending networks, Huge Networks has no public record of abuse complaints and is not linked to any known DDoS-for-hire services.

The Exposed Archive and What It Contained

For years, security researchers tracked a series of devastating DDoS attacks originating from Brazil and targeting Brazilian ISPs, but the source remained elusive. That changed when a confidential source shared a curious archive found exposed in an open online directory. The archive contained Portuguese-language malicious Python scripts, along with the private SSH authentication keys of Huge Networks' CEO.

This discovery revealed that a Brazil-based threat actor had maintained root access to Huge Networks' infrastructure. The attacker routinely scanned the internet for insecure routers and misconfigured DNS servers, building a formidable botnet capable of launching amplified attacks.

Botnet Techniques: DNS Amplification and Router Exploitation

DNS Reflection and Amplification

The botnet exploited a technique known as DNS reflection, where attackers send spoofed queries to open DNS servers. Because the source IP is forged to appear as the target, the server's response floods the victim's network. Further amplification is achieved by leveraging the DNS protocol's extension for large messages. A request of under 100 bytes can trigger a response 60–70 times larger, magnifying the attack's impact.

How a Brazilian Anti-DDoS Firm Became the Source of Massive Attacks
Source: krebsonsecurity.com

Scanning for Insecure Devices

Additionally, the threat actor mass-scanned the internet for vulnerable routers, particularly those with default credentials or unpatched firmware. Compromised routers were enlisted as additional attack nodes. The combination of thousands of infected devices and open DNS servers created a botnet capable of generating traffic volumes that overwhelmed even stout defenses.

CEO's Response and Possible Motives

The chief executive of Huge Networks stated that the malicious activity stemmed from a security breach, not from any internal wrongdoing. He suspects a rival DDoS protection company orchestrated the attacks to tarnish Huge Networks' image and steal clients. The CEO emphasized that the firm is cooperating with authorities to secure its systems and identify the perpetrators.

Conclusion

This incident underscores the paradox of a company built to defend against DDoS attacks being turned into an attack vector. It highlights the critical need for rigorous security practices even among cybersecurity firms. The Brazilian ISP community now faces the task of hardening their own infrastructures against future waves of botnet-driven assaults, while Huge Networks works to restore trust and shore up defenses.

For further reading on DDoS mitigation and network security, explore our articles on botnet techniques and incident response strategies.

💬 Comments ↑ Share ☆ Save