Cyberattack Suspected in Worldwide X Outage
by ZeroFox Intelligence

Key Findings
- On March 10, 2025, social media platform X (formerly Twitter) experienced multiple service outages affecting a reported 1.6 million users worldwide and lasting several hours. As of the writing of this report, X services appear to be functional.
- Several hours later, the “Dark Storm” threat collective posted on its Telegram channel, claiming to have conducted a distributed-denial-of-service (DDoS) attack which resulted in X being “taken offline.”
- Ideologically motivated hackers, particularly pro-Russia hacktivist collectives, almost certainly view Elon Musk—and his high-profile government appointment and assumed political allegiances—as an acceptable and in-bounds target for disruptive cyberattacks.
- There is a likely chance that Dark Storm is responsible for a DDoS attack targeting X infrastructure as claimed. Although the collective offered no evidence to support its involvement, there is a robust correlation between the chosen target, Dark Storm’s publicly stated allegiances and motivations, and the historic tactics, techniques, and procedures (TTPs) of other pro-Russia, anti-Western hacktivist collectives.
Details
On March 10, 2025, social media platform X experienced multiple service outages affecting a reported 1.6 million users worldwide.1,2 Elon Musk, the organization’s Chairman and Chief Technology Officer (CTO), posted to the platform claiming that services had been and continue to be disrupted by a “massive” cyberattack, adding that the activity was conducted with “a lot” of resources by either “a large group and/or a country.”3 As of the writing of this report, X services appear to be functional.
Several hours later, the Dark Storm threat collective posted in its Telegram channel, claiming to have conducted a DDoS attack that resulted in “Twitter” (X) being “taken offline.”
- Dark Storm is a hacktivist threat collective first observed in mid-2023. The group is vocal about its support for Palestine and its contempt for Israel and its allies—both national governments and private organizations. The collective is very likely primarily politically and ideologically motivated.
- Dark Storm primarily operates in the messaging app Telegram, where intermittent posts claim responsibility for attacks, make threats, and also offer DDoS-for-hire services, indicating some extent of financial motivation.
- During 2023 and 2024, Dark Storm claimed responsibility for numerous disruptive attacks against Western targets, including airports and other critical national infrastructure.4 The collective has also made threats against the North Atlantic Treaty Organization (NATO).5
- Like other hacktivist collectives, Dark Storm has previously been observed falsely claiming responsibility for disruptive DDoS attacks. This behavior is almost certainly intended to gain notoriety (both within public discourse and amongst peers), market malicious services, and draw attention to Dark Storm’s political and ideological affiliations.
As of the writing of this report, several channels seemingly associated with Dark Storm have been removed from the Telegram platform. It is unclear if they were deleted by the collective or removed by platform moderators, though other channels associated with Dark Storm have been removed in the past.
- ZeroFox has previously observed other primarily pro-Russian hacktivist collectives proclaiming allegiance to and cooperation with Dark Storm.
Elon Musk is currently serving as a senior advisor to U.S. President Donald Trump, as well as undertaking a leadership role within the Department of Government Efficiency (DOGE). Due to his assumed allegiances, politically and ideologically motivated pro-Russia hacktivist collectives almost certainly deem Musk and his associated government departments and private organizations as high-value targets for disruptive cyberattacks.
- On March 10, 2025, pro-Russia hacktivist collective “keymous+” posted in its Telegram channel claiming responsibility for unspecified cyberattacks against Tesla, an automotive organization owned by Musk. No further detail was given, but Musk appeared to confirm the incident. Any attack that occurred is likely to have been DDoS targeting of digital infrastructure.
Shortly after the X outage, Musk alleged that internet protocol (IP) addresses “originating in the Ukraine area” were involved in the attack, though no further detail was offered.6 The full extent of any basis for these claims is unclear, though Musk and other entities within the U.S. government have recently been overtly critical of both NATO and Ukrainian state decision-making in relation to the ongoing Russia-Ukraine war.7,8 Threat collective Dark Storm responded to this statement in a Telegram post, denying any association with Ukraine.
There is a likely chance that Dark Storm is responsible for a DDoS attack targeting X infrastructure as claimed. While the collective offered no evidence to support its involvement, there is a robust correlation between the chosen target, Dark Storm’s publicly stated allegiances and motivations, and the historic TTPs of other pro-Russia, anti-Western hacktivist collectives. If Dark Storm was indeed responsible, it is almost certain that the collective’s intent was to undermine Elon Musk—and the West by extension—as well as gain notoriety through publicity.
ZeroFox can neither confirm nor deny the public allegation regarding the use of Ukraine-based IP addresses involved in the suspected X cyberattack. Additionally, ZeroFox notes that their presence does not necessarily imply Ukraine state involvement or that those responsible were physically located in Ukraine. Threat actors (including nation-state sponsored actors) regularly use spoofing, virtual private networks (VPNs), and previously compromised servers to falsify and obfuscate associated IP addresses.
ZeroFox Intelligence Recommendations
- Implement secure password policies with phishing-resistant multi-factor authentication, complex passwords, and unique credentials.
- Configure ongoing monitoring for Compromised Account Credentials.
- Proactively monitor for compromised accounts being brokered in DDW forums.
- Leverage cyber threat intelligence to inform the detection of ransomware and digital extortion (R&DE) threats, their associated TTPs, and Indicators of Compromise (IOCs).
- Ensure critical, proprietary, or sensitive data is always backed up to secure, off-site, or cloud servers at least once per year—and ideally more frequently.
- Adopt a Zero-Trust cybersecurity posture based upon a principle of least privilege.
- Implement network segmentation to separate resources.
- Develop a comprehensive incident response strategy.
- Configure email servers to block emails with malicious indicators, and deploy authentication protocols to prevent spoofed emails.
- Deploy a holistic patch management system, and ensure all business IT assets are updated with the latest software as quickly as possible.
Appendix A: Traffic Light Protocol for Information Dissemination
Appendix B: ZeroFox Intelligence Probability Scale
All ZeroFox intelligence products leverage probabilistic assessment language in analytic judgments. Qualitative statements used in these judgments refer to associated probability ranges, which state the likelihood of occurrence of an event or development. Ranges are used to avoid a false impression of accuracy. This scale is a standard that aligns with how readers should interpret such terms.
- hXXps://www.bbc[.]co[.]uk/news/articles/c62x5k44rl0o
- hXXps://downdetector[.]com/status/twitter/
- hXXps://x[.]com/elonmusk?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor
- hXXps://www.techmonitor[.]ai/technology/cybersecurity/opfrance-cyberattack-charles-de-gaulle-airport?cf-view
- hXXps://thecyberexpress[.]com/dark-storm-team-announces-cyberattack/
- hXXps://news.sky[.]com/story/elon-musk-says-x-hit-by-massive-cyber-attack-as-users-unable-to-log-in-13325939
- hXXps://www.bbc[.[com/news/articles/cy87vg38dnpo
- hXXps://x[.]com/elonmusk?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor
Tags: Threat Intelligence