Codenil

Brazilian DDoS Protection Firm's Infrastructure Exploited to Attack Local ISPs

Published: 2026-05-07 21:48:01 | Category: Cybersecurity

Introduction

For several years, security researchers have tracked a relentless wave of massive distributed denial-of-service (DDoS) attacks originating from Brazil, targeting only Brazilian internet service providers (ISPs). The source of these digital sieges long remained a mystery until recently, when an open directory revealed a trove of malicious files connected to a Brazilian tech firm that specializes in DDoS protection. Learn more about the firm involved.

Brazilian DDoS Protection Firm's Infrastructure Exploited to Attack Local ISPs
Source: krebsonsecurity.com

Background: The Firm at the Center

Huge Networks, founded in Miami, Florida, in 2014 but with operations concentrated in Brazil, initially built its reputation by shielding game servers from DDoS attacks before evolving into a DDoS mitigation provider for ISPs. The company itself had no public history of abusive behavior or ties to DDoS-for-hire services. However, a recent exposure turned the tables, revealing that its own infrastructure had been commandeered to launch the very attacks it was meant to prevent.

The Exposed Archive

A trusted source, speaking on condition of anonymity, shared a file archive found in an unsuspecting open directory online. Inside were several malicious Python scripts written in Portuguese, along with the private SSH authentication keys belonging to Huge Networks' CEO. The archive showed that a Brazil-based threat actor had maintained root access to Huge Networks' systems for an extended period, systematically building a powerful DDoS botnet.

Modus Operandi: Building the Botnet

The attacker routinely scanned the internet for two specific types of vulnerable assets:

  • Insecure routers – typically consumer-grade or small business routers with default or weak credentials, which could be remotely controlled.
  • Unmanaged DNS servers – domain name system resolvers configured to accept queries from anywhere, a critical requirement for reflection attacks.

By compromising tens of thousands of such devices, the botmaster created a network capable of launching amplified attacks. Understand DNS amplification below.

DNS Amplification and Reflection Attacks Explained

DNS translates human-friendly domain names into IP addresses. Ideally, DNS servers answer only machines within a trusted domain, but misconfigured servers accept queries from any source. Attackers exploit these open resolvers by sending spoofed queries that appear to come from the target's IP address. When the DNS server responds, the reply goes to the spoofed address—the target—overwhelming it with traffic.

What makes these attacks especially potent is amplification. Attackers craft small DNS requests (as little as 100 bytes) that trigger responses 60 to 70 times larger, thanks to DNS protocol extensions that allow large messages. By directing thousands of such queries from multiple compromised devices simultaneously, they achieve massive attack volumes with minimal bandwidth of their own.

Brazilian DDoS Protection Firm's Infrastructure Exploited to Attack Local ISPs
Source: krebsonsecurity.com

Reaction from Huge Networks

After being confronted with the evidence, Huge Networks' CEO stated that the malicious activity resulted from a security breach. He speculated that a competitor was behind the intrusion, aiming to tarnish the company's public image. As of now, no public disclosure of a breach had been made, and the firm continues to offer DDoS protection services.

Impact on Brazilian ISPs

The attacks, which have persisted for years, caused significant disruption to internet services for thousands of Brazilian users. Targets included major ISPs, leading to slowed connectivity, outages, and financial losses. The exploitation of a DDoS protection firm's own infrastructure highlights the sophisticated nature of modern cyber threats, where even security providers can be turned into weapons.

Lessons for Network Operators

This incident underscores the importance of securing not only customer-facing systems but also internal infrastructure used by security companies. Key takeaways include:

  1. Regular auditing of SSH keys – Private keys should be rotated frequently and never left exposed in accessible directories.
  2. Hardening DNS servers – Ensure that resolvers only respond to authorized clients to prevent their use in reflection attacks.
  3. Monitoring for unauthorized access – Continuous threat detection can help identify compromises before they escalate.

Conclusion

The case of Huge Networks serves as a stark reminder that no organization is immune to being turned into a vector for attacks. The cybercriminal's ability to leverage a DDoS protection company's own infrastructure against its peers highlights the need for constant vigilance. As threat actors refine their techniques, both ISPs and security firms must adopt proactive defenses to stay ahead. Back to top.