
If you are new to the Equibit story, please read The Assassination of Equibit, originally released in 2023.
Chris Horlacher has documented multiple sophisticated intrusions through his Microsoft ecosystem. These incidents go well beyond ordinary malware and align with key moments in his legal activities. They indicate a close collaboration between Microsoft and the Five Eyes to deliver undetectable spyware onto targeted devices in order to steal information and interfere with the normal functions of the computer.
Key Incidents of Unauthorized Access
- July 19, 2025 – Unauthorized Sharing of Sensitive Memo
A confidential memo was suddenly made publicly shareable via OneDrive using Chris’s own Microsoft account. He did not perform this action. During the event, his computer’s built-in screen recorder was disabled. Luckily Chris was able to capture the event with his cell phone’s camera.
Watch the incident:
- August 27, 2025 – Spontaneous File Movement
A critical security report analyzing router compromises was mysteriously moved to the desktop. - October 27, 2025 – Camera Roll Breach
OneDrive logs showed someone browsing the Camera Roll folder containing images taken directly by the device, as well as two files related to psychology that provide insight as to the hacker’s identity (more on that in later posts!)
Watch the Camera Roll intrusion:
Mass Windows & BIOS Updates – Highly Suspicious Timing
On August 18, 2025, immediately before a strategy call with his lawyers about upcoming discovery sessions, Chris’s computer began installing an unusually large wave of updates — including Windows, BIOS, and more than a dozen other components. He described it as one of the largest simultaneous update pushes he had ever experienced. Call quality then rapidly deteriorated and the connection was terminated exactly when the discussion turned to sensitive topics.
This event is especially concerning in the context of Bill C-22, Canada’s proposed Lawful Access Act. Part 2 of the bill would require electronic service providers (including software and operating system vendors) to build and maintain technical capabilities to facilitate authorized access to information by law enforcement and CSIS. Critics argue this could effectively compel companies like Microsoft to enable mechanisms for delivering signed updates or payloads that Windows would trust by default. Because Microsoft-signed updates are automatically trusted by the operating system, they represent a powerful and nearly undetectable vector for delivering targeted tools to specific users.
For more on Bill C-22:
Nightmare Eclipse Zero-Days and Browsergate
These incidents occurred against the backdrop of major Microsoft security controversies. In 2026, researcher Nightmare-Eclipse (also known as Chaotic Eclipse) publicly released several high-impact Windows zero-days, including exploits targeting Windows Defender and privilege escalation mechanisms. Some researchers have speculated that certain vulnerabilities may have been known internally for extended periods before public disclosure.
Additionally, Browsergate exposed serious allegations against LinkedIn (owned by Microsoft). According to a detailed report by Fairlinked e.V.:
- LinkedIn allegedly injected JavaScript that scanned users’ browsers for over 6,000 Chrome extensions.
- The script reportedly collected detailed device telemetry and extension data without clear user consent or prominent disclosure in the privacy policy.
- This allowed LinkedIn to build extensive user profiles, potentially identifying competitors, corporate tools, and other sensitive software.
The revelations led to privacy lawsuits and widespread criticism. You can read the original report here:Â BrowserGate.eu
Broader Implications
These events demonstrate deep access into Chris’s systems, precise timing aligned with legal activities, and the ability to manipulate core operating system functions. When combined with other documented technical attacks, they highlight growing risks around proprietary platforms and the potential for state-level exploitation.
Further Reading & Updates:
- Additional technical evidence and interviews in the Media section
- Ongoing lawsuit developments at equibitlawsuit.com
This case raises important questions about digital privacy, corporate responsibilities, and the balance between security and individual rights. Share this post if you believe these issues deserve greater public scrutiny.
Stay tuned to equibitlawsuit.com for more updates on the Equibit lawsuits against CSIS and related actors.
