Elon Musk’s declare that the DDoS assault on X (previously Twitter) originated from Ukraine drew skepticism from cybersecurity specialists, who argue that attributing assaults primarily based on IP addresses is unreliable.
Attackers steadily use digital non-public networks (VPNs) and different strategies to obfuscate their origins, making pinpointing a selected geographic supply troublesome.
On Monday, X was the goal of a distributed denial-of-service assault that intermittently shut down the favored social media web site for customers worldwide. The X DDoS assault was linked to Darkish Storm Crew, a infamous hackivist group recognized for launching comparable large-scale cyber disruptions.
Hours after the assault, Musk claimed throughout an interview with Fox Enterprise that the IP addresses related to the assault originated within the Ukraine space.
Tech-savvy customers on X rapidly identified that IP addresses might be masked or spoofed, making them seem to originate from one area after they truly originate from one other.
Expensive Elon:
You possibly can’t attribute an assault to any geographic location by IP tackle alone.
See: VPN, location spoofing, and so on.
Additionally See: How botnets are managed remotely
Additionally Additionally See: Ask a cybersecurity particular person that can assist you.— MikeTalonNYC (@MikeTalonNYC) March 10, 2025
Cybersecurity professionals additionally cautioned in opposition to drawing conclusions primarily based solely on IP tackle information.
“Attackers use methods like IP Spoofing, VPNs and servers contaminated with malware to carry out these assaults,” Siri Vegiraju, Software program Growth Engineer at Microsoft Azure informed Decrypt. “Particularly, with IP spoofing attackers create packets with false supply IP addresses to principally impersonate different programs.”
Including to the problem of stopping DDoS assaults is that they’re inherently decentralized, making them troublesome to hint.
“If one have been conducting a DDoS assault you would not essentially see every connection originating from an IP tackle from a selected nation or netblock,” Scott Renna, Senior Options Architect with blockchain safety agency Halborn, informed Decrypt. “By definition, the assault must come from a number of IP addresses.”
Renna identified that attackers distribute their visitors throughout quite a few areas to keep away from detection and mitigation efforts.
“From an optics perspective and a blocking and prevention standpoint, it is simply not the way it’s usually performed,” he mentioned.
Whereas the origins of the X assault stay a thriller, DDoS-as-a-Service web sites are popping as much as facilitate the launch of large-scale assaults. These web sites let clients pay to launch DDoS assaults.
There are two major sorts of DaaS.
“Stresser” providers, that are professional instruments corporations use to check and strengthen their IT infrastructure. Then there are “Booter” providers, that are malicious platforms designed to disrupt or take down focused programs.
Cybersecurity groups can use DDoS blackhole routing and geo-blocking to attenuate the influence of DDoS assaults, which might have prevented the kind of assault that disrupted X this week.
Blackhole routing is an emergency measure that immediately blocks all visitors to a focused IP throughout an assault, nevertheless it additionally impacts professional customers, making it a short lived answer.
Geo-blocking limits entry from high-risk areas, lowering cyber threats with out disrupting most customers.
In April 2022, web safety supplier Cloudflare efficiently mitigated an enormous DDoS assault focusing on an unidentified cryptocurrency web site that tried to overwhelm the service with 15.3 million requests per second.
Whereas providers like Cloudflare excel at defending in opposition to cyber threats, Renna emphasised the significance of getting ready for potential failures.
“Providers like Cloudflare do a superb job for companies,” Renna mentioned. “But it surely comes all the way down to what occurs when these fail.”
Edited by Sebastian Sinclair
Editor’s word: Provides extra feedback from Microsoft Software program Growth Engineer at Azure Siri Vegiraju
Typically Clever Publication
A weekly AI journey narrated by Gen, a generative AI mannequin.