Elon Musk’s X DDoS Accusation Ignores Basics of Cyber Attacks, Expert Says

Elon Musk’s X DDoS Accusation Ignores Basics of Cyber Attacks, Expert Says



Elon Musk’s claim that the DDoS attack on X (formerly Twitter) originated from Ukraine drew skepticism from cybersecurity experts, who argue that attributing attacks based on IP addresses is unreliable.

Attackers frequently use virtual private networks (VPNs) and other methods to obfuscate their origins, making pinpointing a specific geographic source difficult.

On Monday, X was the target of a distributed denial-of-service attack that intermittently shut down the popular social media site for users worldwide. The X DDoS attack was linked to Dark Storm Team, a notorious hackivist group known for launching similar large-scale cyber disruptions.

Hours after the attack, Musk claimed during an interview with Fox Business that the IP addresses associated with the attack originated in the Ukraine area.

okex

Tech-savvy users on X quickly pointed out that IP addresses can be masked or spoofed, making them appear to originate from one region when they actually originate from another.

Cybersecurity professionals also cautioned against drawing conclusions based solely on IP address data.

“If one were conducting a DDoS attack you wouldn’t necessarily see each connection originating from an IP address from a specific nation or netblock,” Scott Renna, Senior Solutions Architect with blockchain security firm Halborn, told Decrypt. “By definition, the attack would have to come from multiple IP addresses.”

Renna pointed out that attackers distribute their traffic across numerous locations to avoid detection and mitigation efforts.

“From an optics perspective and a blocking and prevention standpoint, it’s just not how it’s typically done,” he said.

While the origins of the X attack remain a mystery, DDoS-as-a-Service websites are popping up to facilitate the launch of large-scale attacks. These websites let customers pay to launch DDoS attacks.

There are two main types of DaaS.

“Stresser” services, which are legitimate tools companies use to test and strengthen their IT infrastructure. Then there are “Booter” services, which are malicious platforms designed to disrupt or take down targeted systems.

Cybersecurity teams can use DDoS blackhole routing and geo-blocking to minimize the impact of DDoS attacks, which could have prevented the type of attack that disrupted X this week.

Blackhole routing is an emergency measure that instantly blocks all traffic to a targeted IP during an attack, but it also affects legitimate users, making it a temporary solution.

Geo-blocking limits access from high-risk regions, reducing cyber threats without disrupting most users.

​In April 2022, internet security provider Cloudflare successfully mitigated a massive DDoS attack targeting an unidentified cryptocurrency website that attempted to overwhelm the service with 15.3 million requests per second.

While services like Cloudflare excel at defending against cyber threats, Renna emphasized the importance of preparing for potential failures.

“Services like Cloudflare do a good job for businesses,” Renna said. “But it comes down to what happens when those fail.”

Edited by Sebastian Sinclair

Generally Intelligent Newsletter

A weekly AI journey narrated by Gen, a generative AI model.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *

You have not selected any currency to display

Pin It on Pinterest

Ico-Investor
Bybit
Ico-Investor
Elon Musk’s X DDoS Accusation Ignores Basics of Cyber Attacks, Expert Says
okex
Binance
Czech Government Faces No-Confidence Vote Over $45M Bitcoin Scandal
Ethereum Foundation Restructures R&D Division, Plans 'Rethink' on Design and Development
BitMEX Blocks Lazarus Phishing Attempt, Calls Tactics ‘Unsophisticated’
Performance Art Duo Operator 'Make Movement Collectible' With NFTs
Nigel Farage Pledges to Slash Crypto Capital Gains, Force UK Bitcoin Reserve
Coinbase to Open New San Francisco Office After Dropping HQ Model
Blockfi
Changelly
Riot Hires Data Center Chief as Bitcoin Miner Ramps Up HPC and AI Hosting Plans
Czech Government Faces No-Confidence Vote Over $45M Bitcoin Scandal
Blockchain can end the food fraud crisis, but it’s a costly battle
Gold climbing to new record highs bodes well for the price of Bitcoin
top loser
Riot Hires Data Center Chief as Bitcoin Miner Ramps Up HPC and AI Hosting Plans
Czech Government Faces No-Confidence Vote Over $45M Bitcoin Scandal
Blockchain can end the food fraud crisis, but it’s a costly battle
Gold climbing to new record highs bodes well for the price of Bitcoin