- X suffered outages on Monday 10 March on account of a “huge cyberattack”
- CEO Elon Musk attributed “IP addresses originating within the Ukraine space”
- Safety specialists counsel the true origin of the assault can’t be recognized
Tl;DR What trigger the outage?
Analysts consider a distributed denial-of-service assault overloaded X’s servers with bogus visitors, interrupting entry for real customers. Due to the character of the assault, it’s probably not potential to establish with certainty the place it originated. Hackers used gadgets in a number of areas, routing visitors by numerous hijacked IP addresses.
The social media platform X, previously often called Twitter, suffered a number of outages on Monday 10 March. 1000’s of X customers in each the US and the UK reported being unable to entry the web site all through the day.
Chatting with Fox Enterprise, proprietor Elon Musk attributed the outages to a “huge cyberattack” and claimed that “IP addresses originating within the Ukraine space” have been behind it.
With reported issues peaking at 40,000 on Downdetector, the dimensions of the outage will not be in any doubt. It’s probably the most important interruption of service that the platform has suffered in years, with the results of the outages lasting for a number of hours.
However now the mud has settled, what precisely prompted the outage? Listed below are the unique theories, adopted by the ideas of cybersecurity specialists…
The declare: Ukraine-based hackers have been behind the X cyberattack

Within the aftermath of the X outage, query marks stay over its trigger – and who may be behind it.
Elon Musk took to X on Monday to share his perception that the assault had been carried out “with a whole lot of assets”. He went on to assert that “both a big, coordinated group and/or a rustic is concerned”, adopted by his later feedback on Fox Enterprise that it got here from “IP addresses originating within the Ukraine space”.
There was (nonetheless is) an enormous cyberattack in opposition to 𝕏. We get attacked each day, however this was completed with a whole lot of assets. Both a big, coordinated group and/or a rustic is concerned. Tracing … https://t.co/aZSO1a92noMarch 10, 2025
The Hacking group Darkish Storm Staff briefly claimed accountability for the assault on Telegram, though the publish was later deleted.
Amid the uncertainty and finger-pointing, we’ve pieced collectively a clearer image of what occurred and deciphered Musk’s claims amid the continued geo-political spat with President Volodymyr Zelensky.
The truth: it is inconceivable to pinpoint the actual supply of the X assault

Analysts throughout the online are broadly united of their understanding that X suffered a distributed denial-of-service (DDoS) assault on Monday. That is historically fairly a crude type of cyberattack. It floods a goal’s servers with illegitimate visitors, overwhelming their capability and stopping actual customers from accessing the web site in query.
Chatting with BBC Radio 4’s In the present day program, Ciaran Martin – a professor at Oxford College’s Blavatnik College of Authorities and former head of the UK’s Nationwide Cyber Safety Centre – described the approach as “not that subtle.”
Some specialists counsel in any other case. David Mound, Senior Penetration Tester at third-party danger administration platform Safety Scorecard, stated in a press release that “DDoS assault techniques have advanced dramatically”. He identified that “attackers now distribute visitors throughout complete subnets”.
That echoes feedback from business insiders elsewhere. A number of specialists have highlighted that DDoS assaults are normally orchestrated utilizing a battalion of gadgets across the globe. Site visitors tends to be generated from IP addresses that are distributed throughout totally different areas, making it arduous to pinpoint precisely the place the assault originated from.
Chatting with Wired, Shawn Edwards, chief safety officer of Zayo, a community connectivity agency, stated that “attackers steadily use compromised gadgets, VPNs, or proxy networks to obfuscate their true origin.”
Consequently, it’s tough to pinpoint the actual supply of an assault. Even when visitors did come from IP addresses inside a selected nation, as Musk urged, that doesn’t imply the cyberattackers have been situated in that nation. Within the phrases of Professor Martin, it “tells you completely nothing.”

By the way, Wired additionally quoted an nameless researcher who acknowledged that not one of the high 20 visitors sources concerned within the assault have been situated in Ukraine. If appropriate, that will disprove Musk’s assertion relating to Ukrainian hackers. There seems to be no proof behind his declare that IP addresses concerned within the assault originated in Ukraine. Even when they did, that alone wouldn’t be proof that any group within the nation was truly concerned within the assault.
That’s to not say a state actor couldn’t be concerned. Mound made clear that “nation-state actors are additionally using DDoS as a part of broader cyber affect and disruption campaigns, notably in geopolitical conflicts”.
One other query is how the assault was in a position to affect X so considerably. DDoS assaults are comparatively commonplace, with Musk himself posting on Monday that X will get “attacked each day”. So why did this one convey down X? Musk is eager to counsel {that a} closely resourced group is behind it.
Nonetheless, numerous unbiased analysts have recognized that X’s servers weren’t correctly secured, leaving them publicly uncovered to the assault. To cite Professor Martin once more, it “does not replicate effectively on their cyber safety.”
Cyber specialists are warning of a rise within the regularity and complexity of DDoS assaults. In some instances, attackers are “extorting companies by threatening extended downtime,” says Mound. Others are threatening “politically motivated disruptions in opposition to governments, monetary establishments, and infrastructure suppliers.”
Mound concludes: “With attackers frequently refining their strategies, a proactive, adaptive safety posture is important to face up to fashionable DDoS threats.”
You may also like…




