Phone : +91 95 8290 7788 | Email : sales@itmonteur.net

Register & Request Quote | Submit Support Ticket

Home » Cyber Security News » Experts debunk Elon Musk’s claim that Ukrainian hackers were behind the attack, ET CISO

Experts debunk Elon Musk’s claim that Ukrainian hackers were behind the attack, ET CISO

Experts debunk Elon Musk’s claim that Ukrainian hackers were behind the attack, ET CISO

— Extremely difficult to find the exact origin of DDoS attacks

— Botnets often route attacks through devices in unrelated regions

— Spoofing techniques allow attackers to mask the true origins

— Use of proxy servers or VPNs

US billionaire and owner of social media platform X Elon Musk has claimed that the war-torn country Ukraine was behind the cyberattack on X. This claim is being contested by several top cybersecurity experts of India. The distributed denial of service (DDoS) cyberattack disrupted X on March 10, with widespread outage of the social networking site.

“The reality of the attack is only known to the people involved in responding to the digital disruption because no details have been disclosed yet. Let us face it, it would not be far-fetched to believe that X would be subject to DDOS attacks just like any other social media platform. A pro-Palestinian group has claimed responsibility,” says infosec leader Agnidipta Sarkar, Vice President CISO Advisory, ColorTokens Inc. and former biocon group CISO.

“I am hoping X still has good cyber crisis managers. I guess we have to wait and watch to see if X makes an SEC disclosure or any other type of disclosure of what really happened,” adds Sarkar.

Were Ukranian actors behind the DDoS attack?

Elon Musk has suggested that IP addresses involved in the attack were traced to locations “in the Ukraine area,” but this claim is disputed by cybersecurity experts, who argue that such attacks typically involve a global network of compromised devices.

“Since when has someone been able to pin point the origin of a DDOS attack? Isn’t that the whole point of D in DDoS?” questions an infosec expert.

Pinpointing the exact origin of DDoS attacks is extremely challenging due to their distributed nature and deliberate obfuscation techniques. Botnets often route attacks through devices in unrelated regions. Moreover, there are spoofing techniques involved in which attackers mask the true origins using proxy servers or VPNs. Furthermore, there is a “background noise” infrastructure under which many botnets operate as for-hire services with no clear geopolitical ties.

“True, it is hard to catch the origin of the IP but it is possible. I’m sharing my opinion not the fact that it will be possible. Bot IPs may be suspicious and we can check the suspicious IP and mark them red and try to find the original IP or nonsuspicious IP then investigate them. It takes time to consume but could help to find the origin IP,” opines another cybersecurity expert.

Understanding a DDoS cyberattack

A DDoS (Distributed Denial of Service) cyberattack occurs when multiple compromised systems flood a target server or network with excessive traffic, overwhelming it and causing it to become unavailable. The impact of a DDoS attack can be devastating for businesses, organizations, and individuals. One of the primary consequences is downtime, which disrupts online services, causing loss of revenue and damaging the organization’s reputation. For businesses that rely on e-commerce or online platforms, even a short period of inaccessibility can lead to significant financial losses.

Moreover, DDoS attacks can strain IT resources, requiring costly mitigation efforts. This often involves deploying specialized DDoS protection services or additional infrastructure to handle the traffic, which can be expensive and time-consuming. In some cases, attackers may also use DDoS attacks as a smokescreen for other malicious activities, such as data theft or network intrusion. The impact can extend beyond the immediate financial losses. Customer trust may be eroded, and clients might seek more secure alternatives. The cumulative effect of repeated attacks could lead to long-term reputational damage, especially if the business struggles to recover or experiences ongoing vulnerabilities.

In conclusion

It is no surprise that companies tend to use the cyber-attack as an excuse sometimes to deflect attention from IT mismanagement. And then there were the job cuts. Ignoring the political aspect of the situation and the fact that Musk blames it on Ukraine, it does raise a few questions. For example, was the attack so severe that it overwhelmed the Anti-DDOS capability of X? Or how did the attacker manage to disable the CDN? Or why did the attack happen in spurts? There are several questions which remain unanswered.

  • Published On Mar 15, 2025 at 09:40 AM IST

Join the community of 2M+ industry professionals

Subscribe to our newsletter to get latest insights & analysis.

Download ETCISO App

  • Get Realtime updates
  • Save your favourite articles


Scan to download App

Information Security - InfoSec - Cyber Security - Firewall Providers Company in India

 

 

 

 

 

 

 

 

 

 

 

 

What is Firewall? A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet.

 

Secure your network at the gateway against threats such as intrusions, Viruses, Spyware, Worms, Trojans, Adware, Keyloggers, Malicious Mobile Code (MMC), and other dangerous applications for total protection in a convenient, affordable subscription-based service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services. Stateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols.

 

Firewall Firm is an IT Monteur Firewall Company provides Managed Firewall Support, Firewall providers , Firewall Security Service Provider, Network Security Services, Firewall Solutions India , New Delhi - India's capital territory , Mumbai - Bombay , Kolkata - Calcutta , Chennai - Madras , Bangaluru - Bangalore , Bhubaneswar, Ahmedabad, Hyderabad, Pune, Surat, Jaipur, Firewall Service Providers in India

Sales Number : +91 95 8290 7788 | Support Number : +91 94 8585 7788
Sales Email : sales@itmonteur.net | Support Email : support@itmonteur.net

Register & Request Quote | Submit Support Ticket