A Brazilian anti-DDoS firm operated a botnet launching sustained attacks against competing ISPs in the country, according to KrebsOnSecurity. The company, which markets itself as a network defense provider, enabled the malicious infrastructure responsible for the campaign. The firm's CEO attributes the activity to a security breach within the company, claiming a competitor orchestrated the attacks to damage the company's reputation. The disclosure reveals a critical conflict of interest. A firm entrusted with network defense capabilities weaponized those same capabilities against rival operators. This case demonstrates how insider access to DDoS mitigation infrastructure creates significant risk when security controls fail. Defenders should scrutinize DDoS protection providers for signs of unusual traffic patterns or administrative anomalies. The incident underscores the need for strict access controls, audit logging, and third-party verification within security service providers. Organizations relying on external DDoS mitigation should demand transparency into incident response procedures and require independent forensics when breaches occur.