top of page

Welcome to Crime and Justice News

Elon Musk Claims X Was Under 'Massive Cyberattack'

Hours after a series of outages Monday that left X unavailable to thousands of users, Elon Musk claimed that the social media platform was being targeted in a “massive cyberattack.” “We get attacked every day, but this was done with a lot of resources,” Musk said. “Either a large, coordinated group and/or a country is involved. Tracing …” Later on Monday, Musk said that the attackers had “IP addresses originating in the Ukraine area” without going into detail on what this might mean, the Associated Press reports. Cybersecurity experts pointed out that this doesn’t necessarily mean that an attack originated in Ukraine. Security researcher Kevin Beaumont said on Bluesky that Musk’s claim is “missing a key fact — it was actually IPs from worldwide, not just Ukraine.” He said it was a Mirai variant botnet, which is made of compromised cameras, adding, “Smells of APTs — advanced persistent teenagers.” Allan Liska of the cybersecurity firm Recorded Future said that even if “every IP address that hit Twitter ... originated from Ukraine (doubtful), they were most likely compromised machines controlled by a botnet run by a third party that could be located anywhere in the world.”


Complaints about outages spiked Monday at 6 a.m. Eastern and again at 10 a.m, with more than 40,000 users reporting no access to the platform, according to the tracking website Downdetector.com. By afternoon, the reports had dropped to the low thousands. A sustained outage that lasted at least an hour began at noon, with the heaviest disruptions occurring along the U.S. coasts. Downdetector.com said that 56% of problems were reported for the X app, while 33% were reported for the website. It's not possible to verify claims without seeing technical data from X, and the likelihood of them releasing that is “pretty low,” said Nicholas Reese of the Center for Global Affairs in New York University’s School of Professional Studies . Reese said, “There are kind of two types of cyber attacks — there are ones that are designed to be very loud and there are ones that are designed to be very quiet,” he said. “And the ones that are usually the most valuable are the ones that are very quiet. Something like this was designed to be discovered. So to me that almost certainly eliminates state actors. And the value that they would have gained from it is pretty low.”


Recent Posts

See All

Comments


A daily report co-sponsored by Arizona State University, Criminal Justice Journalists, and the National Criminal Justice Association

bottom of page