Friday, March 29, 2024

UK Teen Finally Arrested for DDoS Attack on ProtonMail Behalf of Russian Hackers Group

National Crime Agency (NCA) from the UK finally arrested the Teen for a heavy DDoS attack on ProtonMail email service.

19-year-old Teen George Duke-Cohan who was roaming on the internet under the name ‘7R1D3N7′, ‘DoubleParalla’ and ‘optcz1′, was launched a heavy DDoS attack on ProtonMail.

In this case, Protonmail faced a DDoS Attack on their network daily basis and five separate groups have been conducting this cyber attack.

George was one among the Russian cybercrime group “Apophis Squad” and he was involved in various cybercrime including several times for a number of DDoS attacks.

Also, he was responsible for making bomb threats to thousands of schools and a United Airlines flight traveling from the UK to San Francisco last month and he sent a mass email to schools in the UK and the US claiming that pipe bombs.

Also Read: Stop DDoS Attacks In 10 Seconds – Organization’s Most Important Consideration for DDOS Attack Mitigation

According to National Crime Agency, They investigators working with the FBI identified that whilst on pre-charge bail for the threats to schools, Duke-Cohan made bomb threats to the US-bound flight via phone calls to San Francisco Airport and their Bureau police.

 Apophis Squad cybercrime gang also claimed on their Twitter page that they are ultimately responsible for flight UAL 949 had been grounded.

In this case, ProtonMail started their investigation after the first attacks were launched, they found the attackers behind the Apophis Squad groups do not technically sound good and they found that some of the attackers in this group also ProtonMail users.

According to ProtonMail, Also George Duke-Cohan working with a number of hacking groups, On Aug. 31, officers from the British National Crime Agency (NCA) arrested Duke-Cohan outside of London.

“On Monday, he pleaded guilty in a UK court to three counts of making bomb threats to schools and airlines. We believe further charges are pending, along with possible extradition to the US.”

ProtonMail has been survived during the DDoS Attack due to the efforts of Radware, F5 Networks, and their own security team, they ware minimize the attack.

Protect website from future attacks Also Check your Companies DDOS Attack Downtime Cost.

So an organization should always ensure and focus on maximum Protection level for enterprise networks to Stop DDoS Attacks and you can try a free trial to Stop DDoS Attack in 10 Seconds.

Also Read

Stop DDoS Attacks In 10 Seconds – Organization’s Most Important Consideration for DDOS Attack Mitigation

DDoS Protection Bootcamp – Free Training Course to Improve Your DDoS Protection Skills

DDoS Attack Prevention Method on Your Enterprise’s Systems – A Detailed Report

Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles