News Ababil.
Explore
SYS_NODE: ONLINE // Cyber Security

Inside the Botnet Behind the Massive Brazilian ISP DDoS Attacks

DECRYPTED BY: Nova Stirling | TIMESTAMP: 2026-05-12 T 20:40:38 Z | [ 2 MIN READ ]
Inside the Botnet Behind the Massive Brazilian ISP DDoS Attacks
2 Min Read
Share

Brazilian ISP DDoS attacks expose a rogue anti‑DDoS firm

Security researchers have traced a wave of high‑volume denial‑of‑service assaults that swept across Brazil’s regional internet providers to a Miami‑born mitigation company, Huge Networks. The firm, which markets itself as a shield against DDoS, was found to be the unwitting host of a botnet that weaponised thousands of vulnerable TP‑Link Archer AX21 routers.

The leaked archive, obtained from an open‑directory dump, contained Python scripts, private SSH keys belonging to CEO Erick Nascimento, and references to domains previously linked to Mirai‑derived IoT botnets. Analysis shows the code systematically scanned the global address space for devices vulnerable to CVE‑2023‑1389, then launched DNS‑reflection bursts that amplified traffic to ↓ 1.2 Tbps for brief 10‑60 second windows.

How the amplification chain worked

Attackers sent spoofed DNS queries to misconfigured resolvers, exploiting the EDNS(0) extension to inflate responses up to 70‑fold. By chaining tens of thousands of compromised routers, the botnet flooded target prefixes within Brazil’s 200.0.0.0/8 range, overwhelming small ISPs that lack Tier‑1 upstream capacity.

“We were alerted by Tier‑1 carriers about unprecedented traffic spikes,” Nascimento told KrebsOnSecurity, adding that the breach was first detected in January 2026.

Huge Networks claims the incident stemmed from a single compromised “jump server” on Digital Ocean, which the provider flagged for abusive activity hundreds of times. The company says it wiped the droplet, rotated all keys, and hired an external forensics team.

Independent experts note that the same Mirai variant resurfaced in a Reuters report on a global DDoS surge earlier this year, suggesting a broader ecosystem of opportunistic actors. There is no evidence that Huge Networks orchestrated the attacks for profit.


Words by Nova Stirling (Aerospace & Space Tech Correspondent).

Global Data Feed

More from this Intel

Why the Riskiest SOC Alerts Remain Ignored – and How Radiant Security Fixes the Gap

Why the Riskiest SOC Alerts Remain Ignored – and How...

May 12, 2026
TrickMo Variant Exploits TON C2 and SOCKS5 to Forge Android Banking Pivots

TrickMo Variant Exploits TON C2 and SOCKS5 to Forge Android...

May 12, 2026
Tool Registry Poisoning Reveals Massive Flaw in Enterprise AI Agent Security

Tool Registry Poisoning Reveals Massive Flaw in Enterprise AI Agent...

May 11, 2026
Canvas breach halts classes across U.S. schools and colleges

Canvas breach halts classes across U.S. schools and colleges

May 11, 2026
AI Pentesting Slashes $40,000 Costs, Delivers Results in Minutes

AI Pentesting Slashes $40,000 Costs, Delivers Results in Minutes

May 10, 2026
cPanel vulnerability patch: Three critical flaws fixed in WHM

cPanel vulnerability patch: Three critical flaws fixed in WHM

May 09, 2026

Join The Elite

Get the top 0.1% global intelligence and market insights delivered directly to your inbox before the masses.

We respect your privacy. No spam.