{"id":833161,"date":"2025-03-11T08:11:57","date_gmt":"2025-03-11T13:11:57","guid":{"rendered":"https:\/\/newsycanuse.com\/index.php\/2025\/03\/11\/if-ips-for-x-cyberattack-emerge-in-ukraine-what-does-it-mean-about-the-origin-of-attack\/"},"modified":"2025-03-11T08:11:57","modified_gmt":"2025-03-11T13:11:57","slug":"if-ips-for-x-cyberattack-emerge-in-ukraine-what-does-it-mean-about-the-origin-of-attack","status":"publish","type":"post","link":"https:\/\/newsycanuse.com\/index.php\/2025\/03\/11\/if-ips-for-x-cyberattack-emerge-in-ukraine-what-does-it-mean-about-the-origin-of-attack\/","title":{"rendered":"If IPs for X cyberattack emerge in Ukraine, what does it mean about the origin of attack?"},"content":{"rendered":"<div id=\"article-index-0\" readability=\"62.4\">\n<p>Tech billionaire <a class=\"manualbacklink\" target=\"_blank\" href=\"https:\/\/www.livemint.com\/news\/us-news\/x-global-outage-elon-musk-terms-it-as-a-cyberattack-hints-at-involvement-of-a-large-group-and-or-a-country-11741629439122.html\">Elon Musk<\/a> on March 10 claimed that his social media platform X (formerly known as Twitter), was under a massive cyberattack. In a post he emphasised that this attack was significant, writing: \u201cWe get attacked every day, but this was done with a lot of resources. Either a large, coordinated group and\/or a country is involved. Tracing \u2026\u201d<\/p>\n<\/div>\n<div id=\"article-index-1\" readability=\"55.384615384615\">\n<p>Then, speaking to Fox Business Network the same day, Elon Musk told the channel that the <a class=\"manualbacklink\" target=\"_blank\" href=\"https:\/\/www.livemint.com\/news\/trends\/why-would-ukraine-block-its-own-access-to-x-netizens-question-elon-musks-cyberattack-claim-11741653957569.html\">cyberattacker&#8217;s<\/a> IP addresses had been \u201ctraced\u201d to Ukraine. He did not elaborate or give other details.<\/p>\n<\/div>\n<div id=\"article-index-2\" readability=\"56.171232876712\">\n<p>So, we see what experts feel about the issue if IP addresses were traced back to <a class=\"manualbacklink\" target=\"_blank\" href=\"https:\/\/www.livemint.com\/global\/america-and-ukraine-prepare-for-brutal-negotiations-11741585447839.html\">Ukraine<\/a>\u2026 does that mean the disruption originated from Ukraine?<\/p>\n<\/div>\n<div id=\"article-index-4\" readability=\"57.310344827586\">\n<h2>X Down, IPs Traced to Ukraine: What Do Experts Say?<\/h2>\n<p>According to an AP report, <a class=\"manualbacklink\" target=\"_blank\" href=\"https:\/\/www.livemint.com\/news\/us-news\/us-news-judge-extends-ban-elon-musks-doge-access-to-treasury-info-amid-cybersecurity-concerns-white-house-11740188383802.html\">cybersecurity<\/a> experts dismissed the idea that tracing the IP address meant you had found the definitive source of the attack. They pointed out that IP addresses don&#8217;t necessarily indicate the origin of an attack.<\/p>\n<\/div>\n<div id=\"article-index-5\" readability=\"58.446511627907\">\n<p>Writing on social media platform Bluesky, security researcher Kevin Beaumont said that <a class=\"manualbacklink\" target=\"_blank\" href=\"https:\/\/www.livemint.com\/news\/us-news\/x-global-outage-elon-musk-terms-it-as-a-cyberattack-hints-at-involvement-of-a-large-group-and-or-a-country-11741629439122.html\">Elon Musk<\/a>&#8216;s claim about the Ukraine origin is \u201cmissing a key fact \u2014 it was actually IPs from worldwide, not just Ukraine.\u201d<\/p>\n<\/div>\n<div id=\"article-index-6\" readability=\"63\">\n<p>Beaumont noted that the cyberattack was conducted using the Mirai variant botnet, which uses compromised cameras. From his expertise, speaking about who is likely behind the attack, he pointed to teens saying, \u201cSmells of APTs \u2014 advanced persistent teenagers.\u201d<\/p>\n<\/div>\n<div id=\"article-index-8\" readability=\"61.018099547511\">\n<h2>Does IPs Being Traced to Ukraine Mean the Cyberattack Originated in Ukraine?<\/h2>\n<p>The AP report also cited Allan Liska from cybersecurity company Recorded Future, who cast doubt that IP addresses pin point origin. He said that even if \u201cevery IP address that hit <a class=\"manualbacklink\" target=\"_blank\" href=\"https:\/\/www.livemint.com\/companies\/news\/musk-to-face-questioning-in-suit-over-twitter-buyout-flipflop-11741396864910.html\">Twitter<\/a> today originated from Ukraine (doubtful), they were most likely compromised machines controlled by a botnet run by a third party that could be located anywhere in the world.\u201d<\/p>\n<\/div>\n<div id=\"article-index-9\" readability=\"62\">\n<p>Further, Nicholas Reese, an adjunct instructor at the Center for Global Affairs in New York University\u2019s School of Professional Studies and expert in cyber operations told AP the possibility of definitively verifying Elon Musk&#8217;s claims without technical data from X is \u201cpretty low\u201d. He also noted that a state actor being behing the disruption \u201cdoesn&#8217;t make a lot of sense\u201d as the attack lasted a few short hours.<\/p>\n<\/div>\n<div id=\"article-index-10\" readability=\"59.3133640553\">\n<p>Reese explained to AP, \u201cThere are kind of two types of <a class=\"manualbacklink\" target=\"_blank\" href=\"https:\/\/www.livemint.com\/ai\/artificial-intelligence\/chinese-and-iranian-hackers-are-using-us-ai-products-to-bolster-cyberattacks-11738145542538.html\">cyberattacks<\/a> \u2014 there are ones that are designed to be very loud and there are ones that are designed to be very quiet. And the ones that are usually the most valuable are the ones that are very quiet. Something like this was designed to be discovered. So to me that almost certainly eliminates state actors. And the value that they would have gained from it is pretty low.\u201d<\/p>\n<\/div>\n<div id=\"article-index-12\" readability=\"64\">\n<h2>Background: What Happened?<\/h2>\n<p>Users on X began complaining about being unable to access the site from around 6 am ET in the US, with reports of outtages surging to over 40,000 at 10 am, as per data on tracking website Downdetector. By noon, the reports dropped to the \u201clow thousands\u201d, the AP report noted.<\/p>\n<\/div>\n<p><a href=\"https:\/\/www.livemint.com\/news\/us-news\/elon-musk-twitter-ips-x-cyberattack-ukraine-what-does-mean-outtage-origin-global-botnet-us-world-security-user-tech-news-11741654371789.html\" class=\"button purchase\" rel=\"nofollow noopener\" target=\"_blank\">Read More<\/a><br \/>\n Dion Mayoral<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tech billionaire Elon Musk on March 10 claimed that his social media platform X (formerly known as Twitter), was under a massive cyberattack. In a post he emphasised that this attack was significant, writing: \u201cWe get attacked every day, but this was done with a lot of resources. Either a large, coordinated group and\/or a<\/p>\n","protected":false},"author":1,"featured_media":833162,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[31066,3613],"tags":[],"class_list":{"0":"post-833161","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyberattack","8":"category-emerge"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/833161","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/comments?post=833161"}],"version-history":[{"count":0,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/833161\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media\/833162"}],"wp:attachment":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media?parent=833161"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/categories?post=833161"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/tags?post=833161"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}