Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Saturday November 07 2015, @09:11AM   Printer-friendly
from the small-change-this-time dept.

A secure-email firm, based in Switzerland, has paid a ransom of more than £3,600 after web attacks crippled its website. The hi-tech criminals behind the web attacks said the payment would stop the deluge of data hitting the site. But despite paying up, the web attacks continued, leaving Protonmail struggling to operate. It has now launched a fund-raising drive to raise cash to tackle any future attacks.

Protonmail did not respond to the message and, soon afterwards, was hit by what is known as a distributed denial of service (DDoS) attack. This tries to knock a server offline by bombarding it with more data than it can handle. Protonmail is a free, web-based, encrypted email service that needs its site up and running to serve customers. The first attack knocked out Protonmail for about 15 minutes and then stopped. A second attack the next day was much bigger and overwhelmed efforts by the email firm and its ISP to stop it.

"This co-ordinated assault on key infrastructure eventually managed to bring down both the datacenter and the ISP, which impacted hundreds of other companies, not just Protonmail," it said on the blog. In a bid to halt the attack, Protonmail said it "grudgingly" paid the 15 bitcoin ransom.

[...]

Post-attack analysis suggests Protonmail was targeted in two phases, the company said. The first aided the ransom demand but the second was "not afraid of causing massive collateral damage in order to get at us".

Switzerland's national Computer Emergency Response Team (Cert), which helped Protonmail cope, said the attack was carried out by a cybercrime group known as the Armada Collective. This group has also targeted many other Swiss web companies over the last few weeks, the team said.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Informative) by mrpg on Saturday November 07 2015, @02:48PM

    by mrpg (5708) Subscriber Badge <reversethis-{gro ... yos} {ta} {gprm}> on Saturday November 07 2015, @02:48PM (#259969) Homepage

    And neomailbox and runbox and vfemail

    https://twitter.com/neomailbox [twitter.com]
    https://blog.runbox.com/2015/11/new-ddos-attack-friday/ [runbox.com]
    https://twitter.com/VFEmail [twitter.com]

    Starting Score:    1  point
    Moderation   +2  
       Informative=2, Total=2
    Extra 'Informative' Modifier   0  

    Total Score:   3  
  • (Score: 5, Interesting) by pTamok on Saturday November 07 2015, @07:04PM

    by pTamok (3042) on Saturday November 07 2015, @07:04PM (#260060)

    So the big news, not reported on any mainstream news network, is that multiple providers of security enhanced email services have been targetted with sophisticated DDOS attacks - to the extent that some may be forced to stop operating as other companies using the same ISPs don't like the downtime they cause.

    That's remarkably convenient for some people, and looks like an assault on liberty. By whom, I wonder. State actors have been mentioned.

    I would find it difficult to believe a criminal organisation is behind it, as criminals like secure email.

    I sincerely hope security enhanced email remains an option for people who need it.