🛡 VULNERABILIDADES 🛡

Empresa de Anti-DDoS desata ataques contra ISPs brasileños

🛡CyberObservatorio
Empresa de Anti-DDoS desata ataques contra ISPs brasileños
Idioma

Empresa de Anti-DDoS desata ataques contra ISPs brasileños

Fuente: Krebs on Security

**Título: La oscura conexión detrás de los ataques DDoS en Brasil: Un caso de competencia desleal en la ciberseguridad**

**Introducción contextual**

En un entorno digital cada vez más interconectado, las empresas de ciberseguridad se encuentran en una constante lucha para proteger las redes de sus clientes de amenazas emergentes. Sin embargo, en Brasil, un reciente escándalo ha revelado cómo una firma de tecnología, supuestamente dedicada a la protección contra ataques de denegación de servicio distribuido (DDoS), ha estado involucrada en la creación de una botnet que ha perpetrado una serie de ataques masivos contra otros proveedores de servicios de Internet (ISP) brasileños. Este fenómeno no solo afecta a las empresas involucradas, sino que también pone en riesgo a los usuarios finales, quienes pueden experimentar interrupciones en sus servicios de internet y una disminución en la confianza hacia sus proveedores.

Imagen del articulo

**Detalles técnicos**

Los ataques DDoS son una técnica maliciosa en la que múltiples sistemas comprometidos (botnets) envían un tráfico abrumador a un objetivo específico, con el fin de colapsar sus servicios. En este caso, se ha identificado que la botnet en cuestión se alimenta de dispositivos TP-Link Archer AX21, que son vulnerables a una falla específica de inyección de comandos no autenticados, clasificada como CVE-2023-1389. Esta vulnerabilidad fue corregida en abril de 2023, pero muchos dispositivos aún no han sido actualizados, lo que los convierte en blancos fáciles para los atacantes.

La botnet aprovecha el protocolo DNS para llevar a cabo ataques de amplificación y reflexión. En estos ataques, los infractores envían consultas DNS enmascaradas que parecen originarse desde el objetivo, lo que lleva a que los servidores DNS respondan con datos masivos, amplificando el volumen del ataque. Por ejemplo, una consulta de menos de 100 bytes puede provocar una respuesta que supere los 6,000 bytes, lo que resulta en un ataque de gran escala cuando miles de dispositivos comprometidos envían estas solicitudes simultáneamente.

**Datos fácticos**

La firma en cuestión, Huge Networks, fundada en 2014 y con sede en Miami, se ha dedicado a ofrecer servicios de mitigación de DDoS, especialmente a otros operadores brasileños. Sin embargo, la reciente filtración de un archivo que contenía programas maliciosos en Python y las claves de autenticación SSH del CEO de la empresa, Erick Nascimento, sugiere que un actor malicioso con acceso a sus sistemas ha estado utilizando su infraestructura para llevar a cabo ataques DDoS. El archivo expuesto también incluía dominios maliciosos que han sido asociados con una botnet de dispositivos IoT impulsada por una variante del malware Mirai, que ha sido responsable de algunos de los ataques DDoS más devastadores en la historia reciente.

La actividad maliciosa se ha rastreado a un servidor de Digital Ocean que ha sido marcado como abusivo en múltiples ocasiones a lo largo del último año. Los scripts maliciosos revelan que los ataques se limitaron estrictamente a rangos de direcciones IP brasileñas y que cada dirección seleccionada fue atacada durante un período de entre 10 y 60 segundos, utilizando múltiples procesos en paralelo.

**Impacto y consecuencias**

El impacto de esta situación es significativo para el ecosistema de proveedores de servicios de Internet en Brasil. Los ataques DDoS no solo interrumpen los servicios, sino que también generan desconfianza en la capacidad de las empresas para proteger a sus clientes. Además, el hecho de que una firma que se presenta como defensora contra estos ataques esté supuestamente involucrada en la creación de una botnet plantea serias preguntas sobre la ética en el sector de la ciberseguridad. Si se confirma que Huge Networks ha sido víctima de un ataque interno, esto podría abrir las puertas a un debate más amplio sobre la seguridad de las infraestructuras críticas y la necesidad de protocolos más estrictos en la gestión de datos sensibles.

**Contexto histórico**

Este tipo de incidentes no son nuevos en el ámbito de la ciberseguridad. En el pasado, el malware Mirai ha sido responsable de ataques DDoS masivos, destacando en 2016 cuando colapsó importantes servicios en línea, como el de Dyn, que afectó a plataformas como Twitter y Spotify. La historia de la ciberseguridad está plagada de incidentes donde la competencia desleal y el sabotaje digital se han utilizado como herramientas para obtener ventajas comerciales, poniendo en riesgo la integridad y la confianza en el sector.

**Recomendaciones**

Ante esta situación, es crucial que las empresas de ciberseguridad fortalezcan sus protocolos de seguridad y realicen auditorías regulares de sus sistemas para detectar posibles vulnerabilidades. Las organizaciones deben implementar medidas de mitigación de DDoS, como el uso de servicios de protección especializados y el fortalecimiento de la configuración de sus servidores DNS. Además, la educación continua sobre ciberseguridad para el personal técnico es fundamental para prevenir brechas de seguridad que puedan ser explotadas por competidores deshonestos.

En conclusión, la revelación de que una firma de ciberseguridad puede estar involucrada en una botnet DDoS plantea serias preguntas sobre la ética en la industria y la necesidad urgente de reforzar las medidas de seguridad. La comunidad de ciberseguridad y los usuarios finales deben estar alertas y exigir transparencia en un sector que, en última instancia, tiene la responsabilidad de proteger nuestra infraestructura digital.

Anti-DDoS Firm Heaped Attacks on Brazilian ISPs

Source: Krebs on Security

A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other network operators in Brazil, KrebsOnSecurity has learned. The firm’s chief executive says the malicious activity resulted from a security breach and was likely the work of a competitor trying to tarnish his company’s public image. An Archer AX21 router from TP-Link. Image: tp-link.com. For the past several years, security experts have tracked a series of massive DDoS attacks originating from Brazil and solely targeting Brazilian ISPs. Until recently, it was less than clear who or what was behind these digital sieges. That changed earlier this month when a trusted source who asked to remain anonymous shared a curious file archive that was exposed in an open directory online. The exposed archive contained several Portuguese-language malicious programs written in Python. It also included the privateSSH authentication keysbelonging to the CEO ofHuge Networks, a Brazilian ISP that primarily offers DDoS protection to other Brazilian network operators. Founded in Miami, Fla. in 2014, Huge Networks’s operations are centered in Brazil. The company originated from protecting game servers against DDoS attacks and evolved into an ISP-focused DDoS mitigation provider. It does not appear in any public abuse complaints and is not associated with any knownDDoS-for-hire services. Nevertheless, the exposed archive shows that a Brazil-based threat actor maintained root access to Huge Networks infrastructure and built a powerful DDoS botnet by routinely mass-scanning the Internet for insecure Internet routers and unmanageddomain name system (DNS)servers on the Web that could be enlisted in attacks. DNS is what allows Internet users to reach websites by typing familiar domain names instead of the associated IP addresses. Ideally, DNS servers only provide answers to machines within a trusted domain. But so-called “DNS reflection” attacks rely on DNS servers that are (mis)configured to accept queries from anywhere on the Web. Attackers can send spoofed DNS queries to these servers so that the request appears to come from the target’s network. That way, when the DNS servers respond, they reply to the spoofed (targeted) address. By taking advantage of an extension to the DNS protocol that enables large DNS messages, botmasters can dramatically boost the size and impact of a reflection attack — crafting DNS queries so that the responses are much bigger than the requests. For example, an attacker could compose a DNS request of less than 100 bytes, prompting a response that is 60-70 times as large. This amplification effect is especially pronounced when the perpetrators can query many DNS servers with these spoofed requests from tens of thousands of compromised devices simultaneously. A DNS amplification and reflection attack, illustrated. Image: veracara.digicert.com. The exposed file archive includesa command-line historyshowing exactly how this attacker built and maintained a powerful botnet by scouring the Internet forTP-Link Archer AX21routers. Specifically, the botnet seeks out TP-Link devices that remain vulnerable toCVE-2023-1389, an unauthenticated command injection vulnerability that was patched back in April 2023. Malicious domains in the exposed Python attack scripts included DNS lookups forhikylover[.]st, andc.loyaltyservices[.]lol, both domains that have been flagged in the past year as control servers for an Internet of Things (IoT) botnet powered by aMirai malwarevariant. The leaked archive shows the botmaster coordinated their scanning from a Digital Ocean server that has beenflagged for abusive activity hundreds of timesin the past year. The Python scripts invoke multiple Internet addresses assigned to Huge Networks that were used to identify targets and execute DDoS campaigns. The attacks were strictly limited to Brazilian IP address ranges, and the scripts show that each selected IP address prefix was attacked for 10-60 seconds with four parallel processes per host before the botnet moved on to the next target. The archive also shows these malicious Python scripts relied on private SSH keys belonging to Huge Networks’s CEO,Erick Nascimento. Reached for comment about the files, Mr. Nascimento said he did not write the attack programs and that he didn’t realize the extent of the DDoS campaigns until contacted by KrebsOnSecurity. “We received and notified many Tier 1 upstreams regarding very very large DDoS attacks against small ISPs,” Nascimento said. “We didn’t dig deep enough at the time, and what you sent makes that clear.” Nascimento said the unauthorized activity is likely related to a digital intrusion first detected in January 2026 that compromised two of the company’s development servers, as well as his personal SSH keys. But he said there’s no evidence those keys were used after January. “We notified the team in writing the same day, wiped the boxes, and rotated keys,” Nascimento said, sharing a screenshot of a January 11 notification from Digital Ocean. “All documented internally.” Mr. Nascimento said Huge Networks has since engaged a third-party network forensics firm to investigate further. “Our working assessment so far is that this all started with a single internal compromise — one pivot point that gave the attacker downstream access to some resources, including a legacy personal droplet of mine,” he wrote. “The compromise happened through a bastion/jump server that several people had access to,” Nascimento continued. “Digital Ocean flagged the droplet on January 11 — compromised due to a leaked SSH key, in their wording — I was traveling at the time and addressed it on return. That droplet was deprecated and destroyed, and it was never part of Huge Networks infrastructure.” The malicious software that powers the botnet of TP-Link devices used in the DDoS attacks on Brazilian ISPs is based onMirai, a malware strain that made its public debut in September 2016 by launchinga then record-smashing DDoS attackthat kept this websiteoffline for four days. In January 2017, KrebsOnSecurityidentified the Mirai authorsas the co-owners of a DDoS mitigation firm that was using the botnet to attack gaming servers and scare up new clients. In May 2025, KrebsOnSecurity was hit by another Mirai-based DDoS that Google calledthe largest attack it had ever mitigated. That report implicated a 20-something Brazilian man who was running a DDoS mitigation company as well as several DDoS-for-hire services that have since been seized by the FBI. Nascimento flatly denied being involved in DDoS attacks against Brazilian operators to generate business for his company’s services. “We don’t run DDoS attacks against Brazilian operators to sell protection,” Nascimento wrote in response to questions. “Our sales model is mostly inbound and through channel integrator, distributors, partners — not active prospecting based on market incidents. The targets in the scripts you received are small regional providers, the vast majority of which are neither in our customer base nor in our commercial pipeline — a fact verifiable through public sources likeQRator.” Nascimento maintains he has “strong evidence stored on the blockchain” that this was all done by a competitor. As for who that competitor might be, the CEO wouldn’t say. “I would love to share this with you, but it could not be published as it would lose the surprise factor against my dishonest competitor,” he explained. “Coincidentally or not, your contact happened a week before an important event – ​​one that this competitor has NEVER participated in (and it’s a traditional event in the sector). And this year, they will be participating. Strange, isn’t it?” Strange indeed.

Empresa de Anti-DDoS desata ataques contra ISPs brasileños | Ciberseguridad - NarcoObservatorio