Thursday, December 5, 2024
HomeCyber CrimeUK Teen Finally Arrested for DDoS Attack on ProtonMail Behalf of Russian...

UK Teen Finally Arrested for DDoS Attack on ProtonMail Behalf of Russian Hackers Group

Published on

SIEM as a Service

National Crime Agency (NCA) from the UK finally arrested the Teen for a heavy DDoS attack on ProtonMail email service.

19-year-old Teen George Duke-Cohan who was roaming on the internet under the name ‘7R1D3N7′, ‘DoubleParalla’ and ‘optcz1′, was launched a heavy DDoS attack on ProtonMail.

In this case, Protonmail faced a DDoS Attack on their network daily basis and five separate groups have been conducting this cyber attack.

- Advertisement - SIEM as a Service

George was one among the Russian cybercrime group “Apophis Squad” and he was involved in various cybercrime including several times for a number of DDoS attacks.

Also, he was responsible for making bomb threats to thousands of schools and a United Airlines flight traveling from the UK to San Francisco last month and he sent a mass email to schools in the UK and the US claiming that pipe bombs.

Also Read: Stop DDoS Attacks In 10 Seconds – Organization’s Most Important Consideration for DDOS Attack Mitigation

According to National Crime Agency, They investigators working with the FBI identified that whilst on pre-charge bail for the threats to schools, Duke-Cohan made bomb threats to the US-bound flight via phone calls to San Francisco Airport and their Bureau police.

 Apophis Squad cybercrime gang also claimed on their Twitter page that they are ultimately responsible for flight UAL 949 had been grounded.

In this case, ProtonMail started their investigation after the first attacks were launched, they found the attackers behind the Apophis Squad groups do not technically sound good and they found that some of the attackers in this group also ProtonMail users.

According to ProtonMail, Also George Duke-Cohan working with a number of hacking groups, On Aug. 31, officers from the British National Crime Agency (NCA) arrested Duke-Cohan outside of London.

“On Monday, he pleaded guilty in a UK court to three counts of making bomb threats to schools and airlines. We believe further charges are pending, along with possible extradition to the US.”

ProtonMail has been survived during the DDoS Attack due to the efforts of Radware, F5 Networks, and their own security team, they ware minimize the attack.

Protect website from future attacks Also Check your Companies DDOS Attack Downtime Cost.

So an organization should always ensure and focus on maximum Protection level for enterprise networks to Stop DDoS Attacks and you can try a free trial to Stop DDoS Attack in 10 Seconds.

Also Read

Stop DDoS Attacks In 10 Seconds – Organization’s Most Important Consideration for DDOS Attack Mitigation

DDoS Protection Bootcamp – Free Training Course to Improve Your DDoS Protection Skills

DDoS Attack Prevention Method on Your Enterprise’s Systems – A Detailed Report

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

HCL DevOps Deploy / Launch Vulnerability Let Embed arbitrary HTML tags

Recently identified by security researchers, a new vulnerability in HCL DevOps Deploy and HCL...

CISA Warns of Zyxel Firewalls, CyberPanel, North Grid, & ProjectSend Flaws Exploited in Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has issued warnings about several vulnerabilities being...

HackSynth : Autonomous Pentesting Framework For Simulating Cyberattacks

HackSynth is an autonomous penetration testing agent that leverages Large Language Models (LLMs) to...

Fuji Electric Indonesia Hit by Ransomware Attack

Fuji Electric Indonesia has fallen victim to a ransomware attack, impacting its operations and...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Hackers Exploit Docker Remote API Servers To Inject Gafgyt Malware

Attackers are exploiting publicly exposed Docker Remote API servers to deploy Gafgyt malware by...

Matrix, A Single Actor Orchestrate Global DDOS Attack Campaign

Cybersecurity researchers have uncovered a widespread Distributed Denial-of-Service (DDoS) campaign attributed to a threat...

RomCom Hackers Exploits Windows & Firefox Zero-Day in Advanced Cyberattacks

In a new wave of cyberattacks, the Russia-aligned hacking group "RomCom" has been found...