Suspected Russian Hackers Attack ProtonMail

Twitter was abuzz after ProtonMail tweeted that its network had been under sustained attack, the result of a distributed denial-of-service (DDoS) attack traced back to a group claiming to have ties with Russia.

The attack impacted both ProtonMail and ProtonVPN so that the services were "intermittent at best," as one person wrote on Twitter. After several hours, the service has been restored and all queued emails have been sent or delivered.

ProtonMail’s aim is to be a secure email service with built-in end-to-end encryption and state of the art security features. ProtonMail’s goal is to build an Internet that respects privacy and is secure against cyberattacks.

"Our network was hit by a DDoS attack that was unlike the more 'generic' DDoS attacks that we deal with on a daily basis," a ProtonMail spokesperson wrote in an email. "As a result, our upstream DDoS protection service (Radware) needed more time than usual to perform mitigation."

While the entire duration of the attack lasted several hours, the outages were far briefer, with most lasting only minutes at a time, though the longest outage was on the order of 10 minutes.

"Radware is making adjustments to their DDoS protection systems to better mitigate against this type of attack in the future. While we don't yet have our own measurement of the attack size, we have traced the attack back to a group that claims to have ties to Russia, and the attack is said to have been 500 Gbps, which would be among the largest DDoS's on record," the spokesperson wrote.

ProtonMail confirmed that there was no data breach and that no emails were compromised or lost. In order to ensure the safety of the data stored on their servers, ProtonMail uses zero-access encryption to store the content of emails, an added layer of protection in the event of a breach.  

ProtonMail:           Infoesecurity Magazine

You Might Also Read: 

DDoS Attack? There Is An App For That:

Cambridge Analytica Used ProtonMail To Hide Email Paper Trails:


 

« Electronic Warfare Is Expanding
Why Is Rural Broadband Access A Problem? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Korea Internet & Security Agency (KISA)

Korea Internet & Security Agency (KISA)

KISA is committed to improving the competitiveness, reliability and security of Internet information and knowledge in Korea.

First National Technology Solutions (FNTS)

First National Technology Solutions (FNTS)

First National Technology Solutions is a leading provider of flexible, customized hosted and remote managed services including IT security and compliance.

Networkers

Networkers

Networkers is a global recruitment consultancy helping unite job-seekers and hiring companies across the technology industry.

Identillect Technologies

Identillect Technologies

Identillect Technologies provide a user-friendly secure email solution to protect critical information, with an emphasis on simplicity.

Taqnia Cyber

Taqnia Cyber

Taqnia Cyber specializes in the fields of cyber security, intelligence, operations, and training. It offers its services and consultations to both public and private sectors.

Aptible

Aptible

Aptible is a Platform as a Service (PaaS) that gives startups everything developers need to launch and scale apps and databases that are secure, reliable, and compliant.

OcuCloud

OcuCloud

OcuCloud protects businesses' valuable information in the cloud, preventing security breaches caused by employees and remote vendors.

Ordr

Ordr

Ordr Systems Control Engine. The first actionable AI-based systems control engine for the hyper-connected enterprise. You’re in control.

iZOOlogic

iZOOlogic

iZOOlogic protects hundreds of the world’s leading brands, across banking, finance and government from cybercrime. We provide strong cyber defence solutions to protect client digital assets.

VISTA InfoSec

VISTA InfoSec

VISTA InfoSec is a global Information Security Consulting firm with offices based in US, UK, Singapore and India.

ClearHub

ClearHub

The aim of ClearHub is simple: to give businesses like yours access to the best talent, all screened and technically tested by Clearvision’s expert team.

Maxxsure

Maxxsure

Maxxsure provides a platform for executive management, leveraging proprietary technology that identifies, measures, and scores a company’s cyber risks.

Segra

Segra

Segra owns and operates one of the nation’s largest fiber networks and provides best-in-class broadband and data security solutions throughout the Southeast and Mid-Atlantic.

Troye Computer Systems

Troye Computer Systems

Troye provide a complete range of digital workspace solutions that empower people to do their very best work in a safe and secure manner anywhere, anytime, using any device.

Technation

Technation

Technation proudly represents the Canadian technology companies that are furthering our nation and the world into the future through innovation, creativity and ingenuity.

Pontiro

Pontiro

At Pontiro, we are enabling a new era of data-sharing. Bridging the gap between protected data and valuable insights through the use of cutting edge Homomorphic Encryption.