Close Menu
  • Home
  • Alternative News
    • Politics & Policy
    • Independent Journalism
    • Geopolitics & War
    • Economy & Power
    • Investigative Reports
  • Double Speak
    • Media Bias
    • Fact Check & Misinformation
    • Political Spin
    • Propaganda & Narrative
  • Truth or Scare
    • UFO & Extraterrestrial
    • Myth Busting & Debunking
    • Paranormal & Mysteries
    • Conspiracy Theories
  • Contact Us
  • About Us

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Ceasefire Day 45: Peace Talks Move ‘A Little Bit’ as Pakistani Mediators Go to Tehran

May 22, 2026

In gerrymandering fight, democracy is losing

May 22, 2026

Should billionaires pay more taxes?

May 22, 2026
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
TheOthernews
Subscribe
  • Home
  • Alternative News
    • Politics & Policy
    • Independent Journalism
    • Geopolitics & War
    • Economy & Power
    • Investigative Reports
  • Double Speak
    • Media Bias
    • Fact Check & Misinformation
    • Political Spin
    • Propaganda & Narrative
  • Truth or Scare
    • UFO & Extraterrestrial
    • Myth Busting & Debunking
    • Paranormal & Mysteries
    • Conspiracy Theories
  • Contact Us
  • About Us
TheOthernews
Home»Conspiracy Theories»Router Sabotage Exposed: Clear Evidence of Targeted Attacks via TR-069 on Equibit Founder’s Network
Conspiracy Theories

Router Sabotage Exposed: Clear Evidence of Targeted Attacks via TR-069 on Equibit Founder’s Network

nickBy nickMay 22, 2026No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email

If you are new to the Equibit story, please read The Assassination of Equibit, originally released in 2023.

In the ongoing campaign of digital harassment and sabotage documented by Chris Horlacher, one of the most technical and intrusive episodes involves repeated compromises of his home routers in Mexico. These incidents directly affected Chris Horlacher’s ability to work, communicate securely, and access the internet—targeting only specific devices while sparing others on the same network.

This pattern aligns with advanced persistent threats, often linked to state-level or ISP-enabled capabilities.

Background: Part of a Broader Pattern

After fleeing Canada due to chronic digital intrusions and other events stemming from what he believed to be the lawsuits he just filed, Chris continued facing disruptions. VPN instability, selective device blocking, and unexplained connectivity issues prompted deeper investigation. Factory resets provided temporary relief, but problems returned rapidly—classic behavior of persistent malware or remote management exploits

The Attacks: Huawei HG8145V5V3 and ZTE F670L Routers

Key Anomalies Observed:

  • 1981 Timestamps: Multiple log entries show dates like 1981-01-01. This is a strong indicator of Real-Time Clock (RTC) reset or deliberate log tampering/manipulation, often seen when firmware is altered or during boot-level interference. Security analysis reports explicitly flag these as “Backdated logs to 1981 (RTC reset or tampering).”
  • Custom Firewall Rules & Selective Blocking: Firewall settings changed to “user defined.” Specific devices (Chris’s and his wife’s) lost internet access while others worked, consistent with targeted rules or a Remote Access Trojan (RAT).
  • Rapid Re-infection Post-Reset: Issues returned within hours, even on a replacement router from the ISP (Telmex).

From the ZTE Log (August 2025, post-reset):

2025-08-04T16:16:01Z [Error] |dnsmasq| bind interface socket failed 99
2025-08-04T16:16:01Z [Error] !!!!!![high Alert for send msg in POWERON]...
[Warning] RunPCB process[omci] Event[0x3e81]...

High-priority OMCI/GPON messages immediately after boot, IPv6 route injections before full WAN negotiation, and MultiAPD errors point to remote provisioning activity.

From Huawei Logs (July 2025):

Numerous 1981-01-01 entries alongside PPPoE renegotiations, deprecated SSL methods, and DHCP NAKs (potential MAC spoofing or rogue activity). Frequent PPPoE sessions suggest possible DoS or disruption attempts.

Expert Security Analysis

Independent analysis by a professional (using SIEM-style detection) on both routers confirmed:

  • TR-069/OMCI remote provisioning activity.
  • Backdated logs and tampering indicators.
  • Potential RAT presence and DoS patterns.
  • Recommendations: Replace/reflash router, disable TR-069, scan devices, and isolate vulnerable hardware (e.g., older Smart TV).

Huawei Router Analysis Report (PDF)

ZTE Router Analysis Report (PDF)

TR-069 (CWMP) Vulnerabilities: This Broadband Forum protocol enables ISPs to remotely manage Customer Premises Equipment (CPE) like routers via an Auto-Configuration Server (ACS), often over port 7547. While intended for legitimate management, it is notoriously exploitable. Compromised ACS servers or weak implementations allow attackers full remote control, DNS redirection, firmware backdoors, and persistent access. It has been weaponized in botnets (e.g., Mirai variants) and enables exactly the selective targeting and re-infection seen here. Many ISPs do not allow users to fully disable it.

Video Evidence: Router Investigations

Watch Chris document the issues in real-time:

Part 1: Initial router access and strange behavior.

YouTube thumbnailYouTube icon


Part 2: Firewall changes, selective blocking, and admin interface interference.

YouTube thumbnailYouTube icon


Part 3: Factory reset, log downloads, and post-reset observations.

YouTube thumbnailYouTube icon


Part 4 (Short): Post-reset functionality vs. actual device connectivity failure.

YouTube thumbnailYouTube icon


Implications

These attacks go beyond typical criminal hacking. The precision (device-specific blocking), persistence across hardware swaps, use of ISP-managed protocols, and alignment with other documented sabotage (e.g., Microsoft OneDrive tampering, email spoofing, bank disruptions) point to sophisticated actors with significant resources—potentially leveraging intelligence or ISP cooperation.

Combined with the broader evidence in the Factum (honeypot hits from government networks, Keybase anomalies, etc.), this leaves little doubt that Chris Horlacher’s infrastructure was under targeted surveillance and disruption.

What You Can Do:

  • Demand transparency from ISPs on remote management (TR-069/OMCI).
  • Support calls for accountability in intelligence oversight.
  • Share this post—stories like this highlight risks to innovators and due process.

Full logs and analysis reports (Huawei and ZTE PDFs) are available for review upon request for credible researchers/journalists.

This is not paranoia. This is documented technical evidence of invasive digital warfare against a Canadian entrepreneur and litigant, across national boundaries, violating the property of a foreign ISP.

Stay tuned to equibitlawsuit.com for more updates on the Equibit lawsuits against CSIS and related actors.



Source link
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
nick
  • Website

Related Posts

Political Psychiatry and the Genesis of the Trans Epidemic

May 22, 2026

Multipolarity & the Function of the Fake Binary

May 22, 2026

If You Think Prices Are High Now, Just Wait Until The Shortages Really Start Kicking In

May 22, 2026
Leave A Reply Cancel Reply

Demo
Our Picks

Putin Says Western Sanctions are Akin to Declaration of War

January 9, 2020

Investors Jump into Commodities While Keeping Eye on Recession Risk

January 8, 2020

Marquez Explains Lack of Confidence During Qatar GP Race

January 7, 2020

There’s No Bigger Prospect in World Football Than Pedri

January 6, 2020
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo
Don't Miss

Ceasefire Day 45: Peace Talks Move ‘A Little Bit’ as Pakistani Mediators Go to Tehran

Media Bias May 22, 2026

Secretary of State Marco Rubio said that indirect talks between Washington and Tehran over a…

In gerrymandering fight, democracy is losing

May 22, 2026

Should billionaires pay more taxes?

May 22, 2026

Corsairs of the Mediterranean: Israel’s Latest Act of State Piracy Unmasks the Zionist Regime, Yet Again

May 22, 2026

Subscribe to Updates

Get the latest creative news from SmartMag about art & design.

Facebook X (Twitter) Instagram Pinterest
© 2026 ThemeSphere. Designed by ThemeSphere.

Type above and press Enter to search. Press Esc to cancel.