​Encrypted email firm ProtonMail stiffed after paying DDoS ransom

Switzerland-based encrypted email provider ProtonMail provider says a payment to stop attackers overloading its network didn’t work. Now it's appealing to the public to fund its "top-of-line" DDoS protection provider.

The privacy-focussed email provider, which crowd-funded its 2014 launch in the wake of Edward Snowden’s disclosures, was knocked offline on Tuesday by what it said was an “extremely powerful” distributed denial of service (DDoS) attack.

The company today detailed its two day ordeal with the attack, explaining to users that it began with an extortion email from a group that’s been targeted Swiss firms over the past month.

ProtonMail pointed to a warning in September from Switzerland’s GovCERT that a group known as “Armada Collective” had targeted Swiss hosting providers in recent weeks with demands of 10 Bitcoin, equivalent at the time to US $2500 with the currency’s recent rise in value is today worth over $4,000.

Swiss CERT recommended victims not pay the group and instead talk to their ISP about mitigation plans.

Later on Tuesday ProtonMail was served the attacker’s signature 15 minute “demo DDoS”, which, according to Swiss CERT, is done to show the threat is credible, at a volume large enough to rattle but not disable a target’s network.

The attack began in earnest at 11am on Wednesday at which point the firm and its ISP bunkered down to weather the assault.

However, within hours the attacks took on an “unprecedented level of sophistication” and by 2pm the speed of the attack against ProtonMail’s ISP exceeded 100Gbps. There have been larger attacks, but according to ProtonMail, this was unprecedented in Switzerland and large enough to spill over knock out the ISP and hundreds of its clients.

That’s when ProtonMail said it decided “under a lot of pressure by third parties” to pay the ransom, which it did “grudgingly” to this bitcoin address, showing up on the Blockchain ledger as a payment of 15 BTC from ProtonMail, valued at $6,120.

Unfortunately for ProtonMail, the payment didn’t stop the attack and the company has now decided it’s necessary to pay for a DDoS protection service — costing upwards of $100,000 a year — that it can’t sustain.

In a strange twist to the ordeal, ProtonMail said the criminals that stiffed it later wrote to it denying responsibility for the second attack.

“The attack disrupted traffic across the ISP’s entire network and got so serious that the criminals who extorted us previously even found it necessary to write us to deny responsibility for the second attack,” it said.

There is a possibility that the criminal group was telling the truth. As ProtonMail explains the first attack was “volumetric” and only targeted its IP addresses, whereas the second “more complex” attack targeted its ISP’s infrastructure.

Read more: The week in security: Celebrities face Apple's naked truth

“This second phase has not been observed in any other recent attacks on Swiss companies and was technically much more sophisticated,” it said.

MELANI, a government agency which Switzerland’s GovCERT reports, is investigating the incident, however that doesn’t help ProtonMail’s financial predicament. To aid that effort, the firm is going back to its crowdfunding roots and has appealed to the public to support its “defense fund”, which is seeking to raise $50,000 to help its mission to protect privacy and help it pay for “top-of-the-line solutions typically used by large companies such as Twitter, Facebook, etc”

Want to know more?

Why not become a CSO member and subscribe to CSO's mailing list.

Get newsletters, updates, events and more right here.

Join the CSO newsletter!

Error: Please check your email address.

Tags ProtonMailDDoS ransomEdward SnowdenSwiss CERT​Encrypted(DDoS) attackCSO AustraliaSwitzerland

More about BTCCSOFacebookSwitzerlandTwitter

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Liam Tung

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts