Monday, February 10, 2025
HomeCyber CrimeUK Teen Got 3 Years Jailed for Bomb Threats Against 1,700 Schools,...

UK Teen Got 3 Years Jailed for Bomb Threats Against 1,700 Schools, Aircraft With 295 Passengers & DDoS Attacks

Published on

SIEM as a Service

Follow Us on Google News

A hoaxer from United Kingdom got arrested and sentenced 3 years in prison for bomb threat across UK schools, colleges, universities, Airlines also launching DDoS on various famous websites.

A 19-year teenager George Duke-Cohan involved with various cyber crimes and act as a hoaxer to create a serious threat against educational institutes and Airlines in the United Kingdom and the investigation says he also planed his threats to united states.

He dismissed a hoax email More than 400 schools across the UK and the email warned a student had entered schools with a bomb – and demanded $5,000 to be deposited in VeltPvP’s account.

He launched multiple DDOS attacks on a various famous website including cybersecurity investigation website Kerbsonsecurity by ran a DDoS-for-hire service.

He is also a part of an attention-seeking group called Apophis Squad and his team followed another online fame seeking group called Lizard Squad who has involved various crime such as DDoS-for-hire service and called Airlines for bomb threat.

Another incident of falsely reporting by George that he hijack of a plane which had almost 300 passengers on board.

In this case, Apophis Squad hosted their website and DDoS-for-hire service on the same server where Lizard Squad used for their operations.

According to Krebs,  KrebsOnSecurity.com came under sustained attack from the Apophis Squad, who took to Twitter to taunt this author while the attacks were underway. Duke-Cohan and other Apophis Squad members also attacked the free email service  Protonmail, even as all of them continued to use their Protonmail accounts to communicate about the attacks.

Also, National cybercrime arrested Duke-Cohan in his home for his  hoax bomb threat and also said that “he now has a criminal record that will harm his future career prospects”

He had no previous convictions and lived with his mother and sister, but was linked to a cyber-hacker group on Twitter calling itself the Apophis Squad.

According to BBC, Also authorities seized his laptops, USB sticks and mobile phones from his home and he was sentenced to one year in jail for the emails sent to schools and two years for the airport security scare.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Indian Cyber Crime Police Arrested Largest Tech Support Scam Operators in India With the Help of Microsoft

UK Teen Finally Arrested for DDoS Attack on ProtonMail Behalf of Russian Hackers Group

42-year-old man Arrested For Hacking More than 2,000 Computers From 50 countries With DarkComet RAT

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

NetSupport RAT Grant Attackers Full Access to Victims Systems

The eSentire Threat Response Unit (TRU) has reported a significant rise in incidents involving...

Quishing via QR Codes Emerging as a Top Attack Vector Used by Hackers

QR codes, once a symbol of convenience and security in digital interactions, have become...

New ‘BYOTB’ Attack Exploits Trusted Binaries to Evade Detection, Researchers Reveal

A recent cybersecurity presentation at BSides London 2024 has unveiled a sophisticated attack technique...

SAML Bypass Authentication on GitHub Enterprise Servers to Login as Other User Account

A severe security vulnerability, tracked as CVE-2025-23369, has been identified in GitHub Enterprise Server...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

NetSupport RAT Grant Attackers Full Access to Victims Systems

The eSentire Threat Response Unit (TRU) has reported a significant rise in incidents involving...

Quishing via QR Codes Emerging as a Top Attack Vector Used by Hackers

QR codes, once a symbol of convenience and security in digital interactions, have become...

New ‘BYOTB’ Attack Exploits Trusted Binaries to Evade Detection, Researchers Reveal

A recent cybersecurity presentation at BSides London 2024 has unveiled a sophisticated attack technique...