Skip to main content
News Directory 3
  • Home
  • Business
  • Entertainment
  • Health
  • News
  • Sports
  • Tech
  • World
Menu
  • Home
  • Business
  • Entertainment
  • Health
  • News
  • Sports
  • Tech
  • World
Brazilian DDoS Protection Firm Linked to Massive Botnet Attacks - News Directory 3

Brazilian DDoS Protection Firm Linked to Massive Botnet Attacks

May 3, 2026 Lisa Park Tech
News Context
At a glance
  • Huge Networks, a Brazilian internet service provider that specializes in providing distributed denial-of-service (DDoS) protection to other network operators, has been linked to a botnet used in a...
  • The exposed archive contained several Portuguese-language malicious programs written in Python and the private SSH authentication keys of Huge Networks CEO Erick Nascimento.
  • The botnet was constructed by mass-scanning the internet for unmanaged domain name system (DNS) servers and insecure routers.
Original source: krebsonsecurity.com

Huge Networks, a Brazilian internet service provider that specializes in providing distributed denial-of-service (DDoS) protection to other network operators, has been linked to a botnet used in a campaign of massive DDoS attacks against other Brazilian ISPs. According to reporting from KrebsOnSecurity, the discovery followed the exposure of a file archive in an open online directory.

The exposed archive contained several Portuguese-language malicious programs written in Python and the private SSH authentication keys of Huge Networks CEO Erick Nascimento. The data indicates that a threat actor based in Brazil maintained root access to the company’s infrastructure to build and manage a powerful botnet.

Technical Execution and Botnet Recruitment

The botnet was constructed by mass-scanning the internet for unmanaged domain name system (DNS) servers and insecure routers. Specifically, the attacker targeted TP-Link Archer AX21 routers that remained vulnerable to CVE-2023-1389, an unauthenticated command injection vulnerability that received a patch in April 2023.

Technical Execution and Botnet Recruitment
Protection Firm Linked Brazilian Python

The campaign utilized DNS reflection attacks, a method where attackers send spoofed DNS queries to misconfigured servers. These servers then send their responses to the spoofed address—the target’s network—rather than the attacker. By using a DNS protocol extension that allows for larger messages, the botmaster could achieve a significant amplification effect.

For instance, a DNS request of less than 100 bytes could prompt a response 60-70 times larger. When executed by tens of thousands of compromised devices simultaneously, this creates a massive surge of traffic designed to overwhelm the target.

The malicious Python scripts identified in the archive used multiple IP addresses assigned to Huge Networks to identify targets and execute the campaigns. These attacks were strictly limited to Brazilian IP address ranges. The scripts show that each selected IP address prefix was attacked for 10-60 seconds using four parallel processes per host before the botnet moved to the next target.

The botnet’s software is based on Mirai, a malware strain first appearing in September 2016. The exposed scripts included DNS lookups for c.loyaltyservices[.]lol and hikylover[.]st, both of which were flagged within the year preceding April 2026 as control servers for a Mirai-powered Internet of Things (IoT) botnet.

Corporate Response and Breach Claims

Erick Nascimento denied writing the attack programs and stated he was unaware of the extent of the DDoS campaigns until contacted by KrebsOnSecurity.

“We received and notified many Tier 1 upstreams regarding very very large DDoS attacks against small ISPs,” Nascimento said. “We didn’t dig deep enough at the time, and what you sent makes that clear.”

Erick Nascimento, CEO of Huge Networks

Nascimento attributed the activity to a security breach first detected in January 2026, which compromised his personal SSH keys and two development servers. He provided a screenshot of a January 11, 2026, notification from Digital Ocean, the provider of the server used to coordinate the scanning, which had been flagged for abusive activity hundreds of times in the previous year.

“Our working assessment so far is that this all started with a single internal compromise — one pivot point that gave the attacker downstream access to some resources, including a legacy personal droplet of mine,” he wrote. “The compromise happened through a bastion/jump server that several people had access to.”

Erick Nascimento, CEO of Huge Networks

Nascimento claimed that the compromised Digital Ocean droplet was deprecated and destroyed and was not part of the formal Huge Networks infrastructure. He stated that the company wiped the affected boxes and rotated keys on the day of the January 11 notification.

Allegations of Competitive Sabotage

Nascimento flatly denied the possibility that Huge Networks launched attacks to create demand for its own DDoS protection services. He argued that the targets in the scripts were small regional providers that were not part of the company’s customer base or commercial pipeline.

Allegations of Competitive Sabotage
Protection Firm Linked Erick Nascimento Brazilian

“We don’t run DDoS attacks against Brazilian operators to sell protection,” Nascimento wrote. “Our sales model is mostly inbound and through channel integrator, distributors, partners — not active prospecting based on market incidents.”

Erick Nascimento, CEO of Huge Networks

The CEO further alleged that the entire operation was the work of a competitor intended to damage the company’s reputation. While he declined to name the rival, he claimed to have strong evidence stored on the blockchain to support the theory.

“I would love to share this with you, but it could not be published as it would lose the surprise factor against my dishonest competitor,” he explained. “Coincidentally or not, your contact happened a week before an important event – ​​one that this competitor has NEVER participated in (and it’s a traditional event in the sector). And this year, they will be participating.”

Erick Nascimento, CEO of Huge Networks

Huge Networks has since engaged a third-party network forensics firm to investigate the incident.

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X

Related

Search:

News Directory 3

ByoDirectory is a comprehensive directory of businesses and services across the United States. Find what you need, when you need it.

Quick Links

  • Disclaimer
  • Terms and Conditions
  • About Us
  • Advertising Policy
  • Contact Us
  • Cookie Policy
  • Editorial Guidelines
  • Privacy Policy

Browse by State

  • Alabama
  • Alaska
  • Arizona
  • Arkansas
  • California
  • Colorado

Connect With Us

© 2026 News Directory 3. All rights reserved.

Privacy Policy Terms of Service