Thousands of users face access issues as Musk attributes the attack to a potentially coordinated entity.
Elon Musk, the owner of the social media platform X, announced that the service experienced a "massive" cyberattack that resulted in significant accessibility issues for users.
The announcement was made after a series of outages that affected thousands of users.
Musk claimed that this cyberattack was executed with considerable resources, indicating the possible involvement of a "coordinated group and/or a country," although he did not provide evidence to support these assertions.
Reports from users indicated that access issues began around 6 AM and reoccurred at 10 AM ET on a Monday, leading to over 40,000 complaints logged through the outage tracking site Downdetector.com.
A subsequent outage commenced around noon and lasted for at least one hour, with users in coastal regions of the United States experiencing the most significant disruptions.
Data indicated that 56 percent of the reported problems were associated with the X app, while 33 percent were related to the platform’s website.
This incident is not isolated; a similar disruption occurred in March 2023, when the platform was still branded as Twitter, leading to more than an hour of interruptions affecting functionality, including links, user logins, and the loading of images.
Musk's comments in response to a post suggesting links between protests against a state efficiency department managed by him, disruptions to
Tesla operations, and the current issues on X did not include any corroborating evidence.
Verification of Musk's claims remains elusive, given that access to X’s technical data is necessary, which industry experts suggest is unlikely to be revealed.
Cyber operations expert Nicholas Reese, a faculty member at the Center for Global Affairs at New York University, commented on the incident, noting that the short duration raises questions about the involvement of state actors.
He explained that state-sponsored attacks typically do not manifest in such overt disruptions unless they serve to communicate a warning of a more significant threat.
Reese further categorized cyberattacks into two types: conspicuous and discreet, with the latter being more desirable for perpetrators.
His analysis suggests that the characteristics of the disturbance experienced by users of X might imply the involvement of non-state actors, as such attacks are often engineered to evade detection.