A hacker broke into Doublespeed's backend, the a16z-funded startup that runs phone farms to pump out AI-generated TikTok accounts. The attacker queued a meme calling a16z the 'antichrist,' featuring Marc Andreessen alongside a woman pole dancing and the occult symbol Baphomet, according to screenshots seen by 404 Media journalists Joseph Cox and Emanuel Maiberg. The posts never went live. The breach went deeper than a meme stunt. The hacker claimed to have exfiltrated 47MB of data, with access to 573 accounts and 413 phones. Doublespeed co-founder Zuhair Lakhani told 404 Media the access came through 'an older system for queuing posts' and was addressed quickly. This is the company's second compromise. A December 2025 hack revealed at least 400 TikTok accounts pushing supplements, massagers, and dating apps without disclosing they were fake personas or paid ads.
Doublespeed's business model is straightforward: help customers evade social media policies against inauthentic behavior. They use physical phones instead of cloud servers. Real devices have legitimate fingerprints. They connect through residential networks, making them harder for platforms to flag as bots. Customers manage their fake influencer fleets through a centralized dashboard. Andreessen Horowitz put $1 million into this through its Speedrun accelerator program. The wrinkle? Marc Andreessen sits on Meta's board while his firm backs a company built to violate Meta's own authenticity policies. Meta didn't respond to 404 Media's questions about that.
This breach shows a structural problem for agent infrastructure. Distributed physical hardware helps dodge platform detection. But concentrating control of hundreds of phones and accounts into one backend creates a fat target. One compromised system hands an attacker the keys to everything. Doublespeed has now learned this lesson twice.