Thursday, February 27, 2025
HomeCyber CrimeUK Teen Finally Arrested for DDoS Attack on ProtonMail Behalf of Russian...

UK Teen Finally Arrested for DDoS Attack on ProtonMail Behalf of Russian Hackers Group

Published on

SIEM as a Service

Follow Us on Google News

National Crime Agency (NCA) from the UK finally arrested the Teen for a heavy DDoS attack on ProtonMail email service.

19-year-old Teen George Duke-Cohan who was roaming on the internet under the name ‘7R1D3N7′, ‘DoubleParalla’ and ‘optcz1′, was launched a heavy DDoS attack on ProtonMail.

In this case, Protonmail faced a DDoS Attack on their network daily basis and five separate groups have been conducting this cyber attack.

George was one among the Russian cybercrime group “Apophis Squad” and he was involved in various cybercrime including several times for a number of DDoS attacks.

Also, he was responsible for making bomb threats to thousands of schools and a United Airlines flight traveling from the UK to San Francisco last month and he sent a mass email to schools in the UK and the US claiming that pipe bombs.

Also Read: Stop DDoS Attacks In 10 Seconds – Organization’s Most Important Consideration for DDOS Attack Mitigation

According to National Crime Agency, They investigators working with the FBI identified that whilst on pre-charge bail for the threats to schools, Duke-Cohan made bomb threats to the US-bound flight via phone calls to San Francisco Airport and their Bureau police.

 Apophis Squad cybercrime gang also claimed on their Twitter page that they are ultimately responsible for flight UAL 949 had been grounded.

In this case, ProtonMail started their investigation after the first attacks were launched, they found the attackers behind the Apophis Squad groups do not technically sound good and they found that some of the attackers in this group also ProtonMail users.

According to ProtonMail, Also George Duke-Cohan working with a number of hacking groups, On Aug. 31, officers from the British National Crime Agency (NCA) arrested Duke-Cohan outside of London.

“On Monday, he pleaded guilty in a UK court to three counts of making bomb threats to schools and airlines. We believe further charges are pending, along with possible extradition to the US.”

ProtonMail has been survived during the DDoS Attack due to the efforts of Radware, F5 Networks, and their own security team, they ware minimize the attack.

Protect website from future attacks Also Check your Companies DDOS Attack Downtime Cost.

So an organization should always ensure and focus on maximum Protection level for enterprise networks to Stop DDoS Attacks and you can try a free trial to Stop DDoS Attack in 10 Seconds.

Also Read

Stop DDoS Attacks In 10 Seconds – Organization’s Most Important Consideration for DDOS Attack Mitigation

DDoS Protection Bootcamp – Free Training Course to Improve Your DDoS Protection Skills

DDoS Attack Prevention Method on Your Enterprise’s Systems – A Detailed Report

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

VS Code Extension with 9 Million Installs Attacks Developers with Malicious Code

Microsoft has removed two widely-used Visual Studio Code (VS Code) extensions, “Material Theme Free”...

New Anubis Ransomware Targets Windows, Linux, NAS, and ESXi x64/x32 Environments

A new ransomware group, dubbed Anubis, has emerged as a significant threat in the...

WordPress Admins Warned of Fake Plugins Injecting Malicious Links into Websites

A new wave of cyberattacks targeting WordPress websites has been uncovered, with attackers leveraging...

LARVA-208 Hackers Compromise 618 Organizations Stealing Logins and Deploying Ransomware

A newly identified cybercriminal group, LARVA-208, also known as EncryptHub, has successfully infiltrated 618...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Zhong Stealer Malware Exploit Zendesk to Attack Fintech and Cryptocurrency

A newly identified malware, dubbed Zhong Stealer, has emerged as a significant threat to...

Russian Government Proposes Stricter Penalties to Tackle Cybercrime

The Russian government has unveiled sweeping legislative reforms aimed at curbing cybercrime, introducing stricter...

Palo Alto Firewall Flaw Exploited in RA World Ransomware Attacks

A recent ransomware attack leveraging a vulnerability in Palo Alto Networks' PAN-OS firewall software...