Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • Security Week
  • Elon Musk Claims X Being Targeted in ‘Massive Cyberattack’ as Service Goes Down
  • Security Week

Elon Musk Claims X Being Targeted in ‘Massive Cyberattack’ as Service Goes Down

Associated Press March 10, 2025
0

Hours after a series of outages Monday that left X unavailable to thousands of users, Elon Musk claimed that the social media platform was being targeted in a “massive cyberattack.”

“We get attacked every day, but this was done with a lot of resources,” Musk claimed in a post. “Either a large, coordinated group and/or a country is involved. Tracing …”

Complaints about outages spiked Monday at 6 a.m. Eastern and again at 10 a.m, with more than 40,000 users reporting no access to the platform, according to the tracking website Downdetector.com. By afternoon, the reports had dropped to the low thousands.

A sustained outage that lasted at least an hour began at noon, with the heaviest disruptions occurring along the U.S. coasts.

Downdetector.com said that 56% of problems were reported for the X app, while 33% were reported for the website.

It’s not possible to definitively verify Musk’s claims without seeing technical data from X, and the likelihood of them releasing that is “pretty low,” said Nicholas Reese, an adjunct instructor at the Center for Global Affairs in New York University’s School of Professional Studies and expert in cyber operations.

Reese said the likelihood that a state actor is behind the outages “doesn’t make a lot of sense” given their short duration — unless it was a warning for something larger to come.

“There are kind of two types of cyberattacks — there are ones that are designed to be very loud and there are ones that are designed to be very quiet,” he said. “And the ones that are usually the most valuable are the ones that are very quiet. Something like this was designed to be discovered. So to me that almost certainly eliminates state actors. And the value that they would have gained from it is pretty low.”

Advertisement. Scroll to continue reading.

Reese added that it’s possible that a group was trying to make a statement with causing X outages, but added that such a temporary outage “is not much of a statement to me.”

“It’s only really a statement if there is some kind of follow on action, which I would not rule out at this point,” he said.

In March 2023 the social media platform then known as Twitter experienced a bevy of glitches for over an hour as links stopped working, some users were unable to log in and images were not loading for others.

“X outage” was trending on rival social media platform BlueSky, with some posts welcoming users to the site and urging them to stick around.

Musk bought the former Twitter in 2022 and also serves as the CEO of Tesla. He’s running X while simultaneously having access to U.S. government data systems — often wearing a shirt that says “tech support.”

About The Author

Associated Press

See author's posts

Original post here

Continue Reading

Previous: Trump Coins Used as Lure in Malware Campaign
Next: CISA Adds Five Actively Exploited Vulnerabilities in Advantive VeraCore and Ivanti EPM to KEV List

Trending Now

Oops: DanaBot Malware Devs Infected Their Own PCs danabot.png 1

Oops: DanaBot Malware Devs Infected Their Own PCs

May 22, 2025
Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks chinese-hackers-attacking.jpg 2

Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks

May 22, 2025
Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise exploitss.jpg 3

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise

May 22, 2025
Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks chinese.jpg 4

Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks

May 22, 2025
Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program cyber-program.jpg 5

Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program

May 22, 2025
Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host exploit.jpg 6

Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host

May 22, 2025

Related Stories

Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers

Ionut Arghire April 15, 2025 0
ransomware.jpeg
  • Security Week

Kidney Dialysis Services Provider DaVita Hit by Ransomware

Ionut Arghire April 15, 2025 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Conduent Says Names, Social Security Numbers Stolen in Cyberattack

Ionut Arghire April 15, 2025 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches

Ionut Arghire April 15, 2025 0
VC-Funding_China-tech.jpg
  • Security Week

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games

Associated Press April 15, 2025 0
Satellite-Link-Cybersecurity.jpg
  • Security Week

Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats

Kevin Townsend April 15, 2025 0

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

Oops: DanaBot Malware Devs Infected Their Own PCs danabot.png 1
  • Krebs On Security

Oops: DanaBot Malware Devs Infected Their Own PCs

May 22, 2025
Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks chinese-hackers-attacking.jpg 2
  • The Hacker News

Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks

May 22, 2025
Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise exploitss.jpg 3
  • The Hacker News

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise

May 22, 2025
Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks chinese.jpg 4
  • The Hacker News

Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks

May 22, 2025
Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program cyber-program.jpg 5
  • The Hacker News

Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program

May 22, 2025
Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host exploit.jpg 6
  • The Hacker News

Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host

May 22, 2025
Identity Security Has an Automation Problem—And It’s Bigger Than You Think main.jpg 7
  • The Hacker News

Identity Security Has an Automation Problem—And It’s Bigger Than You Think

May 22, 2025

You may have missed

danabot.png
  • Krebs On Security

Oops: DanaBot Malware Devs Infected Their Own PCs

BrianKrebs May 22, 2025 0
chinese-hackers-attacking.jpg
  • The Hacker News

Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks

[email protected] The Hacker News May 22, 2025 0
exploitss.jpg
  • The Hacker News

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise

[email protected] The Hacker News May 22, 2025 0
chinese.jpg
  • The Hacker News

Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks

[email protected] The Hacker News May 22, 2025 0
Copyright © 2025 All rights reserved. | MoreNews by AF themes.