Close Menu
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

US Critical Infrastructure at Risk Amid Iran-Israel Tensions

June 16, 2025

8.4 Million Users’ Data Breached in Zoomcar Hack

June 16, 2025

Hack Attack: Journalists’ Accounts Compromised

June 16, 2025
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance
The CISO Brief
Home » Twitter down: X users report a series of outages
Cybercrime

Twitter down: X users report a series of outages

Staff WriterBy Staff WriterMay 24, 2025No Comments4 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


Hours after a series of outages Monday that left X unavailable to thousands of users, Elon Musk claimed that the social media platform was being targeted in a “massive cyberattack.”

“We get attacked every day, but this was done with a lot of resources,” Musk claimed in a post. “Either a large, coordinated group and/or a country is involved. Tracing …”

Later on Monday, Musk said on Fox Business Network’s Kudlow that the attackers had “IP addresses originating in the Ukraine area” without going into detail on what this might mean.

Cybersecurity experts quickly pointed out, however, that this doesn’t necessarily mean that an attack originated in Ukraine. Security researcher Kevin Beaumont said on Bluesky that Musk’s claim is “missing a key fact — it was actually IPs from worldwide, not just Ukraine.”

Specifically, he said it was a Mirai variant botnet, which is made of compromised cameras. He said while he is not sure who is behind the attack, it “Smells of APTs — advanced persistent teenagers.”

Allan Liska of the cybersecurity firm Recorded Future, meanwhile, pointed out that even if “every IP address that hit Twitter today originated from Ukraine (doubtful), they were most likely compromised machines controlled by a botnet run by a third party that could be located anywhere in the world.”

Complaints about outages spiked Monday at 6 a.m. Eastern and again at 10 a.m, with more than 40,000 users reporting no access to the platform, according to the tracking website Downdetector.com. By afternoon, the reports had dropped to the low thousands.

A sustained outage that lasted at least an hour began at noon, with the heaviest disruptions occurring along the U.S. coasts.

Downdetector.com said that 56% of problems were reported for the X app, while 33% were reported for the website.

It’s not possible to definitively verify Musk’s claims without seeing technical data from X, and the likelihood of them releasing that is “pretty low,” said Nicholas Reese, an adjunct instructor at the Center for Global Affairs in New York University’s School of Professional Studies and expert in cyber operations.

Reese said the likelihood that a state actor is behind the outages “doesn’t make a lot of sense” given their short duration — unless it was a warning for something larger to come.

“There are kind of two types of cyber attacks — there are ones that are designed to be very loud and there are ones that are designed to be very quiet,” he said. “And the ones that are usually the most valuable are the ones that are very quiet. Something like this was designed to be discovered. So to me that almost certainly eliminates state actors. And the value that they would have gained from it is pretty low.”

Reese added that it’s possible that a group was trying to make a statement with causing X outages, but added that such a temporary outage “is not much of a statement to me.”

“It’s only really a statement if there is some kind of follow on action, which I would not rule out at this point,” he said.

In March 2023 the social media platform then known as Twitter experienced a bevy of glitches for over an hour as links stopped working, some users were unable to log in and images were not loading for others.

“X outage” was trending on rival social media platform BlueSky, with some posts welcoming users to the site and urging them to stick around.

Musk bought the former Twitter in 2022 and also serves as the CEO of Tesla. He’s running X while simultaneously having access to U.S. government data systems — often wearing a shirt that says “tech support.”



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleKeeper Security Added to CISA’s CDM Approved Products List
Next Article Tigera Launches Free Calico Cloud for Network Security & Visibility
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Protecting your 23andMe data against resale

June 11, 2025

Tanzania blocks access to X after it says hackers targeted government accounts

May 28, 2025

Dutch intelligence agencies say Russian hackers stole police data in cyberattack

May 28, 2025
Leave A Reply Cancel Reply

Latest Posts

8.4 Million Users’ Data Breached in Zoomcar Hack

June 16, 20250 Views

Hack Attack: Journalists’ Accounts Compromised

June 16, 20250 Views

Anubis Ransomware: Total File Encyption and Wipe Threatens Recovery

June 16, 20250 Views

Dark Web’s Archetyp Market Crushed by Law Enforcement

June 16, 20250 Views
Don't Miss

Big Risks for Malicious Code, Vulns

By Staff WriterFebruary 14, 2025

Attackers are finding more and more ways to post malicious projects to Hugging Face and…

North Korea’s Kimsuky Attacks Rivals’ Trusted Platforms

February 19, 2025

Deepwatch Acquires Dassana to Boost Cyber Resilience With AI

February 18, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

US Critical Infrastructure at Risk Amid Iran-Israel Tensions

June 16, 2025

8.4 Million Users’ Data Breached in Zoomcar Hack

June 16, 2025

Hack Attack: Journalists’ Accounts Compromised

June 16, 2025
Most Popular

Attackers lodge backdoors into Ivanti Connect Secure devices

February 15, 20255 Views

VanHelsing Ransomware Builder Leaked: New Threat Emerges!

May 20, 20254 Views

SonicWall SMA 1000 series appliances left exposed on the internet

February 14, 20254 Views
© 2025 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.