{"id":2271,"date":"2025-03-11T10:57:09","date_gmt":"2025-03-11T10:57:09","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=2271"},"modified":"2025-03-11T10:57:09","modified_gmt":"2025-03-11T10:57:09","slug":"musk-links-cyberattack-on-x-to-ukraine-without-evidence","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=2271","title":{"rendered":"Musk links cyberattack on X to Ukraine without evidence"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>Elon Musk owned X experienced a flurry of outages on Monday, even as the Dark Storm hacking group claimed <a href=\"https:\/\/www.csoonline.com\/article\/571981\/ddos-attacks-definition-examples-and-techniques.html\">DDoS attacks<\/a> on the text-heavy social media giant.<\/p>\n<p>The pro-palestinian hacktivist group reportedly claimed the attacks on a Telegram channel, posting \u201cTwitter has been taken offline by Dark Storm Team.\u201d<\/p>\n<p>Also added in the post were links to <a href=\"https:\/\/x.com\/YourAnonNews\/status\/1899114589473669229\/photo\/1\">CheckHost.net reports<\/a> from Monday that showed X website and application being down for several IPs across the globe.<\/p>\n<p>Political activist and social media influencer Ed Krassenstein <a href=\"https:\/\/x.com\/EdKrassen\/status\/1899164720453538204\">claimed<\/a> on X that he has been in contact with the leader of DarkStorm who said the attack was \u201cjust a demonstration of our strength\u201d and they next plan to attack a large bank in Africa.<\/p>\n<h2 class=\"wp-block-heading\"><a><\/a>Elon links attack to Ukraine<\/h2>\n<p>On Monday, Musk<a href=\"https:\/\/x.com\/elonmusk\/status\/1899149509407473825\"> <\/a><a href=\"https:\/\/x.com\/elonmusk\/status\/1899149509407473825\">confirmed<\/a> the cyberattack on X. \u201cThere was (still is) a massive cyberattack against X.\u201d he said in an X post. \u201cWe get attacked every day, but this was done with a lot of resources. Either a large, coordinated group and\/or a country is involved.\u201d<\/p>\n<p>A few hours later, Musk claimed on national television that a preliminary investigation revealed a connection to Ukraine.<\/p>\n<p>\u201cThere was a massive cyberattack, trying to bring down the X systems, with IP addresses originating in the Ukraine area,\u201d he said.<\/p>\n<p>Krassenstein, however, debunked Musk\u2019s claims as propaganda as he <a href=\"https:\/\/x.com\/EdKrassen\/status\/1899197695224647753\">said<\/a> he\u2019s in touch with Dark Storm and they aren\u2019t in Ukraine.<\/p>\n<p>In one of the followup comments on his X post, Krassenstein claimed he spoke to Musk and told him about his conversation with Dark Storm\u2019s leader. \u201cThis seems like an attempt to attack Ukraine to me,\u201d he <a href=\"https:\/\/x.com\/EdKrassen\/status\/1899198993554346229\">added<\/a> as Musk made allegations about Ukraine anyway.<\/p>\n<h2 class=\"wp-block-heading\"><a><\/a>Nation-state involvement is possible<\/h2>\n<p>While very less is known about the attack, despite a bunch of revelations, experts think a nation-state involvement is indeed possible.<\/p>\n<p>\u201cX is under relentless cyberattacks: 24\/7\/365 and this is far beyond simple DoS attempts,\u201d said Chad Cragle, CISO at DeepWatch. \u201cWhile technical issues can occur, X\u2019s engineers understand scalability and redundancy. This isn\u2019t incompetence; it\u2019s cyberwar hitting at full force. With Musk in the spotlight and political tensions at a peak, these attacks bear all the indicators of nation-state aggression.\u201d<\/p>\n<p>Krassenstein, however, shared further alleged evidence to show Musk\u2019s Ukrainian IP claims to be false. In a few chat screenshots shared, he could be seen asking Dark Storm about the Ukraine claim to which they said, \u201cElon Musk must provide evidence for his claim, and we will provide evidence for ours.\u201d<\/p>\n<p>\u201cWe can attack again. A stronger attack this time, not only on X but Tesla and others.\u201d Dark Storm<a href=\"https:\/\/x.com\/EdKrassen\/status\/1899219850003673188\/photo\/2\"> <\/a><a href=\"https:\/\/x.com\/EdKrassen\/status\/1899219850003673188\/photo\/2\">could be seen<\/a> adding in the chat. Dark Storm Team is a hacktivist group <a href=\"https:\/\/www.ndtv.com\/world-news\/twitter-cyberattack-elon-musk-what-is-dark-storm-pro-palestine-group-allegedly-behind-x-cyberattack-7897600?utm_source=chatgpt.com\">reportedly<\/a> founded in 2023, and is known for launching cyberattacks against entities they perceive as supporting Israel.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Elon Musk owned X experienced a flurry of outages on Monday, even as the Dark Storm hacking group claimed DDoS attacks on the text-heavy social media giant. The pro-palestinian hacktivist group reportedly claimed the attacks on a Telegram channel, posting \u201cTwitter has been taken offline by Dark Storm Team.\u201d Also added in the post were [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":2266,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-2271","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/2271"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2271"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/2271\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/2266"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2271"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2271"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}