Read more at source.
Read more at source.
The attack on X was a distributed denial-of-service (DDoS) type, which involves a coordinated army of computers, or a botnet, bombarding a target with junk traffic in an attempt to overwhelm and take down its systems. These botnets are typically dispersed around the world and generate traffic with geographically diverse IP addresses. However, Shawn Edwards, chief security officer of the network connectivity firm Zayo, emphasizes that IP attribution alone is not conclusive, as attackers often use compromised devices, VPNs, or proxy networks to obfuscate their true origin.
DDoS attacks are common, and virtually all modern internet services must proactively defend themselves against them. Despite this, the attack on X caused outages. Musk attributed this to the significant resources used in the attack. Independent security researcher Kevin Beaumont and other analysts, however, point to vulnerabilities in X's security infrastructure. Some X origin servers, which respond to web requests, weren't properly secured and were publicly visible, allowing attackers to target them directly.
The incident has raised questions about the geopolitical implications of cyber warfare. Musk has previously mocked Ukraine and its president, Volodymyr Zelensky, and is a major campaign donor to President Donald Trump. His involvement in these geopolitics extends to his other company, SpaceX, which operates the satellite internet service Starlink that many Ukrainians rely on. The Trump administration has recently warmed relations with Russia, moving the US away from its longtime support of Ukraine.
It's important to recognize that IP attribution alone is not conclusive. Attackers frequently use compromised devices, VPNs, or proxy networks to obfuscate their true origin. - Shawn Edwards, Chief Security Officer, Zayo