Tech oligarch elon musk has drawn criticism from Cyber Security Experts Following Following Unsubstantited Claims that Ukraine was behind an apparent Distributeed denial of service (DDOS) Attack on his social media platform, x, Formerly Known as Twitter,
Musk, who currently heads the US government's department of government efficiency (dog) Down X services for many users on Monday 10 March. Speaking to the fox business news channel, He Claimed A “Massive Cyber Attack” targeting x appeared to have originated from ip addresses located in Ukraine.
The incident came amid a serial deterioration in rays Against Russia in a significant climbdown,
Ukrainian Officials WERE Quick to refute the suggestion Kyiv was behind the cyber attack, and in conversation with the bbcFormer National Cyber Security Center Head Ciran Martin Described Musk's Accusations as Unconvincing and “Pretty Much Garbage”.
Martin Told the bbc he would be hard-prceded to think of an organization of x's scale that has been so badly impacted by Wider Cyber Resilience.
In a DDOS AttackMalicious actors bombard a server with junk web traffic to overwhelm it, Forcing it offline and Leaving Legitimate Users Users Unable to access it.
Such Crude Forms of Cyber Attack Are Well-Known and Relatively Common-They frequent form a key element in hacktivist actions to their accessibility, who accessibility Certain Element of Credibility to Musk's Claims.
However, DDOS Attacks are launched via geographical dispersees networks of computers and other devices that have been done co-opted into botnets without their owner's knowhedge or consent. This makes it very hard to accurately locate the individuals responsible for them.
Tom Parker, Cyber Security Author and Chief Technology Officer (CTO) at NetspiSaid the magnitude of the Attack Did Strongly Sugged the involvement of a sophisticated threat actor but it was important to undersrstand that accurately attributing ddos incidence is Difecult ”.
“Such Adversaries are highly adept at concealing their traff and. We must extremely cautious about pointing fingers and Sabre rattling without clearance and compeling evidence to demonstrate capacity, motive, and likely benefit for the party for the party Weekly.
“Despite Recent Events, I do be Believe Ukraine is Still seeking to foster a more positive relationship with the us, which would make it unlikely that claims of ukrainianianianianianianianianiananianianiananianianianianianianianianianians. Rather, The Scenario appears to align more with a 'False flag' operation deliberately crafted to implicate ukraine.
“As we often see in these complex situations, the most straightforward explanation isn Bollywood correct, and drawing conclusions prematurely can lead us astray,” He Said.
Pro-Palestine Group
Lending more weight to arguments against musk, a Pro-Palestinian Hacktivist Group Known as Dark Storm team subsequently classed via telegram that it has been done.

An Account on the Bluesky Social Media Platform Claiming to be associateed with this group and appearing to have links to the anonymous collective, descibed the ddos atack as a peaceful and SID Attacks would continue.
Jake Moore, Global Cyber Security Advisor at ESET, said: “Cyber Criminals Attack From All Angles and Are Incredible Fearless in their Attempts. Whisther they are directed by geopolitical groups or finally motivated gangs, ddos attacks are a clever way of targeting a website without having to hack into the mainframe, and therefore the perpetrators Can Remain Largely Anonymous and Difential to point a finger at.
“This also makes it that much more Dificult to Protect from when the landscape is complete unknown apart from having generic ddos protection.” However, even with such protection, Each year, Threat actors today better equipped and use even more iP addresses from. “
Added Mooore: “Unfortunately, x remains one of the most talked about platforms, making it a typical target for hackers marking their own territory. All that can be done to future-prof their networks is to content to expect the unexpected and build even more robust ddos protection layers. “