Cyber Attackers Strike X

Elon Musk says that the social media platform X (previously called Twitter)  has been cyber attacked  and thousands of users in the UK and US reported outages. According to data from tracking website Downdetector at least than 40,000 users reported they could not access X throughout Monday 10th March,

Musk, who has owned X since late 2022, thinks the attack could continue. "There was (still is) a massive cyber attack against X," Musk said in a post on the platform. "We get attacked every day, but this was done with a lot of resources".  He said that "either a large, coordinated group and/or a country is involved".

This happened after the outage monitor Downdetector said it had witnessed tens of thousands of messages from US users saying they had serious technical issues  - there were thousands of UK outage reports from UK on Monday 10th March as well. Many users trying to access the platform and refresh feeds on its app and desktop site during the outages, but couldn’t.

Musk has previously claimed that the platform has been targeted by DDoS attacks in an attempt to take a website offline by overwhelming it with Internet traffic. DDOS is typically used to cause a disruption, which also makes confirming the source of these types of attacks more difficult. 

After Musk bought Twitter for $44 billion the majority of employees left or were fired, raising concerns about whether staffing was in place to maintain the social media platform. In addition to unhappy ex-employees, ther are numerous others with the motivation to attack Elon Musk, not least others in US government agencies threatened by Musk's leadership  of the Department of Government Efficiency (DOGE). 

There has been speculation about the involvement of cyber criminal groups in the attack on X and now a hacktivist group known as the ‘Dark Storm Team’ have claimed responsibility on their Telegram channel for the cyber attack against X.

The Dark Storm Team is a hacktivist group - a collective of activists that leverage cyber tactics to retaliate against foreign policy developments whilst targeting high-profile companies for maximum publicity.  However, it should be noted that the group did not provide any evidence to bolster their claims.

The Dark Storm Team are known primarily for launching DDoS attacks and offers their services for hire. However, messages published on the group's Telegram channel suggest that the actors also have the tooling capability to engage in web defacement attacks where they take down the contents of a target website and replace this with messages that support their cause.

In expert comment, Craig Watt, Threat Intelligence Consultant at Quorum Cyber, said "The Dark Storm Team mainly target organisations within Israel and its allied states, such as the US, indicating that they are acting from a pro-Palestinian stance. If the group did indeed carry this attack against the X platform, there could be a likely explanation...  

"Although not stated by the group, it is possible that the DDoS attack was a retaliation against the US government recently rejecting a plan outlined at an emergency Arab League Summit that was held in Cairo on the 4th March 2025. The Arab plan proposed reconstructing the Gaza Strip to allow Palestinian citizens to remain in the region and was designed to counter President Trump’s proposal for the US to take over Gaza and transform it into the “Riviera of the Middle East”.

"With Elon Musk owning the X platform, as well as being a senior advisor to President Trump and the de facto head of DOGE - this could provide an explanation for why the Dark Storm Team, assuming that their claim is credible, attacked the social media giant." Watt concluded. 

PhoneWord   |   @elonmusk   |    BBC   |  CNN   |   France 24   |  KCBD   |    Sky   |    Telegraph  

Image: Ideogram

You Might Also Read: 

X Is A Vehicle For Political Propaganda:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« ZTNA - Back To Basics
How CISOs Can Demonstrate The Value Of Their Investments »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Law Enforcement Cyber Center (LECC)

Law Enforcement Cyber Center (LECC)

LECC is designed to assist police, digital forensic investigators, detectives, and prosecutors who are investigating and preventing crimes that involve technology.

Copper Horse Solutions

Copper Horse Solutions

Copper Horse specialises in mobile and IoT security, engineering solutions throughout the product lifecycle from requirements to product security investigations.

CONCERT

CONCERT

CONCERT is a Computer Emergency Response Team and cyber security information sharing network for companies, institutes and government in Korea.

Combitech

Combitech

Combitech is the Nordic region’s leading cyber security consultancy firm, with about 260 certified security consultants helping companies and authorities prevent and manage cyber threats.

Security University

Security University

Security University is a leading provider of Qualified Hands-On Cybersecurity Education, Information Assurance Training and Certifications for IT and Security Professionals.

ShadowDragon

ShadowDragon

ShadowDragon develops digital tools that simplify the complexities of modern investigations that involve multiple online environments and technologies.

Zerocopter

Zerocopter

Zerocopter enables you to confidently leverage the skills of the world's most knowledgable ethical hackers to secure your applications.

Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

SWEDAC is the national accreditation body for Sweden. The directory of members provides details of organisations offering certification services for ISO 27001.

Elpha Secure

Elpha Secure

Elpha Secure provides a comprehensive cybersecurity solution, combining technology and insurance to protect against cyber threats.

Duality Technologies

Duality Technologies

Duality Technologies combine Advanced Cryptography with Data Science to deliver High-Performance Privacy-Protecting Computing to Regulated Industries.

SAFECode

SAFECode

SAFECode is a global industry forum where business leaders and technical experts come together to exchange insights on creating, improving, and promoting effective software security programs.

Cardonet

Cardonet

Cardonet is an IT Support and IT Services business offering end-to-end IT services, 24x7 IT Support to IT Consultancy, Managed IT and Cyber Security.

Bluefin Payment Systems

Bluefin Payment Systems

Bluefin is the recognized integrated payments leader in encryption and tokenization technologies that protect payments and sensitive data.

Appknox

Appknox

Appknox is the world’s most powerful plug-and-play security platform that helps developers, security researchers, and enterprises to build a safe and secure mobile ecosystem.

Neptune Shield

Neptune Shield

Neptune Shield's mission is to deliver cutting edge Maritime focused Cyber Security & Threat Protection through our Hampton Roads based Tech & Cyber Security Hub.

Cyber Castle

Cyber Castle

Linux Demands Sophisticated, Purpose-Built Security. Cyber Castle is the solution. A safe, deployable platform down to the edge device for monitoring Linux security anywhere across the globe.