P13x13t : The Apophis Squad, Cyber Threat Evolution, and the Realities of Modern Ransomware
If you are outside the cybersecurity bubble, the string of characters “p13x13t” probably looks like a typo, a randomly generated Wi-Fi password, or a glitch on your screen. But if you have spent any time tracking threat actors, analyzing malware signatures, or studying the wild, often chaotic landscape of cybercrime in the late 2010s, that specific keyword rings an immediate bell. It is not just a random string; it is an alias—a digital fingerprint left behind by a threat actor who caused massive, real-world disruption.
To understand p13x13t is to understand a very specific, highly volatile era of cybercrime. We are talking about the rise of decentralized hacker groups, the commercialization of ransomware, and the terrifying bridge between digital annoyance and physical-world terror. This isn’t just a story about code; it’s a case study in human psychology, poor operational security (OpSec), and the evolving challenges that network defenders face every single day.
Let’s take a deep dive into the origins of this alias, the infamous Apophis Squad it was associated with, the technical mechanics of the malware they deployed, and—most importantly—what this historical threat teaches us about securing our digital lives today. Grab your coffee, and let’s get into it.
Who or What is P13x13t? The Origins and The Apophis Squad
At its core, “p13x13t” was one of several online monikers used by a UK-based hacker named George Duke-Cohan. Operating under aliases like 7R1D3N7, DigitalCrimes, Optlcz, and p13x13t, he became a central figure in a notorious cybercrime collective known as the Apophis Squad. The group, named after the ancient Egyptian deity of chaos and darkness, certainly lived up to its namesake during its peak activity around 2018.
The Apophis Squad was representative of a very specific breed of cybercriminals. Unlike Advanced Persistent Threats (APTs) backed by nation-states, which operate with military precision and stealth, groups like Apophis were loud, boastful, and driven by ego. They thrived on chaos and notoriety. They didn’t just want to steal data or money; they wanted the world to know they were the ones doing it. You could frequently find the p13x13t alias plastered across Twitter (now X), taunting law enforcement, doxxing rivals, and claiming responsibility for various digital attacks.
What makes the psychology of the p13x13t alias so fascinating to security researchers is the sheer brazenness of the operation. This wasn’t a criminal mastermind operating out of a heavily fortified bunker; it was a teenager in Hertfordshire operating out of his bedroom. Yet, by leveraging easily accessible malicious tools and a deep understanding of social engineering, he and his co-conspirators were able to punch far above their weight class. They proved that in the modern digital age, you don’t need a massive budget to cause international panic; you just need an internet connection and a lack of moral boundaries.
Ultimately, the p13x13t moniker became synonymous with a “script kiddie” mentality that rapidly escalated into serious felony territory. It serves as a stark reminder to the cybersecurity community that threat actors do not fit into a single, predictable box. Sometimes the most disruptive threats come not from sophisticated espionage units, but from chaotic actors looking to make a name for themselves on underground forums.
The Apophis Ransomware Connection: How P13x13t Fit Into the Picture

P13x13t ,If you were a malware analyst in early 2018, you likely came across the Apophis Ransomware. This malicious software was a particularly nasty variant in the broader Jigsaw ransomware family, and it bore the unmistakable signature of our keyword. In fact, if a victim was unfortunate enough to have their system infected, the ransom note that popped up on their screen proudly proclaimed: “Maker: P13x13t.” They were literally signing their digital weapons.
From a technical perspective, the Apophis Ransomware was brutally effective despite not being entirely novel. It was typically delivered via phishing campaigns—specifically, corrupted spam emails containing seemingly innocuous Microsoft Word documents (DOCX files). Once a victim opened the document and foolishly enabled macros, a script would execute in the background, downloading and installing the ransomware payload via a simple executable named msiexec.exe. It was a classic, textbook delivery method that prayed on human error rather than zero-day vulnerabilities.
Once inside, the malware didn’t mess around. It used a devastating combination of AES 256 and RSA encryption to lock down the victim’s personal files, appending a cruel .fun extension to the end of every encrypted document. As if losing your data wasn’t stressful enough, the p13x13t variant introduced a psychological torture element: a strict 24-hour countdown timer. The ransom note demanded $500 in Bitcoin and threatened to start permanently deleting files once the timer ran out. The interface even mocked the user with messages like, “Do not panic, we will let you fix this… XD.”
The inclusion of the p13x13t alias right there in the malware’s code was a massive ego trip, but it was also a fatal flaw from a threat intelligence perspective. By tying their public Twitter persona to their malicious code, the creators gave researchers and law enforcement a direct thread to pull. While the encryption itself was solid—making it practically impossible for victims to recover their data without backups at the time—the deployment strategy was noisy. Security vendors quickly updated their definitions, and the specific p13x13t ransomware variant was eventually neutralized by widespread behavioral detection systems.
Swatting, Hoaxes, and the Escalation of Digital Crimes
While the ransomware attacks were financially motivated and destructive, the legacy of the p13x13t alias took a far darker turn when the Apophis Squad crossed the line from digital extortion into physical-world terrorism. Ransomware is one thing; leveraging the internet to trigger armed police responses and mass evacuations is quite another. This is where the story shifts from a technical malware analysis to a chilling look at the real-world impact of cybercrime.
In 2018, the individuals behind the Apophis Squad orchestrated one of the largest bomb hoax campaigns in recent history. Using spoofed email addresses that made it look like the threats were coming from legitimate sources, they sent thousands of bomb threats to schools across the United Kingdom and the United States. They claimed that explosive devices had been planted on school grounds and demanded ransom payments. This wasn’t a sophisticated hack; it was a mass-scale psychological attack that exploited the very real, post-Columbine fears of school violence.
The disruption was catastrophic. Hundreds of schools were forced to evacuate, exams were canceled, parents were terrified, and critical emergency services were diverted away from actual crises. Furthermore, the group engaged in “swatting”—the act of calling in fake hostage situations or bomb threats to a specific person’s house to prompt a heavily armed SWAT team to raid the property. The p13x13t alias was frequently used to boast about these successful disruptions online, treating the terror of innocent people like a high score in a video game.
However, when you start messing with schools, aviation (they also called in a fake hijacking threat to a United Airlines flight), and emergency response infrastructure, you invite the full, undivided attention of global law enforcement. The FBI and the UK’s National Crime Agency (NCA) do not treat bomb hoaxes lightly. The very ego that drove the Apophis Squad to use aliases like p13x13t publicly led to their downfall. Their operational security was sloppy; they left digital footprints everywhere, leading investigators right to Duke-Cohan’s front door. He was arrested, pleaded guilty, and received a significant prison sentence, closing the book on the p13x13t moniker.
Lessons Learned: Securing Our Networks Against Future P13x13t Threats
So, as security professionals and everyday users, what do we take away from the saga of p13x13t and the Apophis Squad? The first and most glaring lesson is the absolute necessity of robust email security and user awareness training. The Apophis Ransomware relied entirely on a user opening an attachment and clicking “Enable Content” on a malicious macro. Today, organizations must implement strict email filtering, sandbox attachments before they reach the inbox, and, frankly, disable Office macros by default via Group Policy. If a user cannot run the malicious script, the script kiddie cannot win.
Secondly, the p13x13t era cemented the golden rule of data protection: the 3-2-1 backup strategy. You should have three copies of your data, stored on two different types of media, with at least one copy stored offsite or completely offline. When you are hit by AES 256 encryption, paying the ransom is a terrible idea—it funds future attacks and offers no guarantee of recovery. If you have an immutable, offline backup, a ransomware attack shifts from a business-ending catastrophe to a minor IT inconvenience. You wipe the machines, restore from the backup, and ignore the countdown timer completely.
Finally, this case study highlights the importance of Zero Trust architecture and Endpoint Detection and Response (EDR) solutions. We can no longer rely on traditional, signature-based antivirus because threat actors can easily tweak their code to bypass it. Modern networks must assume that a breach will happen. By deploying EDR tools that monitor for anomalous behavior—like a random executable suddenly trying to encrypt hundreds of files per second—we can stop ransomware in its tracks, regardless of what alias the attacker is hiding behind.



