Physical Address

304 North Cardinal St.
Dorchester Center, MA 02124

What Really Happened With the DDoS Attacks That Took Down X


Social network X On Monday, a situation has occasional results as a result of occasional Elon musk The “massive cybershacum” belongs to. Musk said in the initial X article committed by the attack by “either a large, coordinated group and / or country.” In a post TelegramA Palestinian group known as a dark storm team took a loan for the attacks within a few hours. On Monday, Musk, Fox Business Network claimed that the attacks came from Ukrainian IP addresses.

Botnet’s botnets, which have a target of web traffic analysis, types of attacks, seminar rejections, attacks, attacks, attacks, attacks, attacks or “botnet” or “botnet or” botnet or “botnet or” botnet or “botnet or” botnet or “botnet or” botnet or “botnet or” botnet or “botnet or” botnet or botnet or system) are generally generated by various IP addresses, create traffic with various IP addresses, create and monitor the world’s traffic can cover complicating mechanisms.

“It is important to recognize the only IP attribute not only definitive. The attackers often use preferred devices, VPNS or proxy networks,” says networking, networking edwards, network connection firm General Security Specialist.

X did not return string inquiries for comment on the attacks.

Multiple researchers say they say that the first start of the first start of the first start of the first start with the last explosion on Monday afternoon, he said.

Ciscon’s Mineeyes’s Internet Intelligence Group, “Mine in violations, a network conditions that are characteristic of a DDO attack, including significant traffic losses, which prevent users’ application, observed important traffic conditions.”

DDOS attacks are very common and almost all modern Internet services are regularly practicing and must be active to defend themselves. As the musk himself puts him on Monday, “We are attacking every day.” Why did these DDOS attacks lead to results for X? Musk, “It was done with many sources, but independent security researcher Kevin Beaumont and other analysts, some X origin servers that respond to web inquiries, were not properly provided behind the company’s CloudFare DDOS protection clearly visible. As a result, the attackers could take them directly. X provided servers.

“Botnet attacked directly IP More than a bunch of yesterday x subnet. It is a botnet of cameras and DVRs, “said Beaumont.

A few hours after the final attack, Musk, Musk, Fox Business presenter Larry Kudlow said, “We are not sure what happened, but there is a massive cyberattack to try to download the X system with IP addresses in the Ukrainian region.”

There are musk mockery Ukraine and his President, Volodymyr ZelenskyIn February 2022, it has repeatedly occupying Russia’s neighbor. A great campaign donor to the President Donald TrumpMusk Now heads the so-called government efficiency department or DouseSince the trump’s inauguration ceremony, the US federal government and the workforce took several weeks. Meanwhile, the Trump management recently warmed up with Russia and moved the United States from Ukraine’s long time support. Musk has already been This is in geopolitics Owned in a variety of company context, EmptyWorking on Satellite Internet Service Starlink Many Ukrainians trust.

DDOS traffic analysis can break firefighting roads in different ways by listing countries involved in an attack in different ways, including different ways. As they have the authority to talk about Xi, a researcher, which requires anonymity, said they did not see Ukraine in the division of the best 20 IP addresses in absentia.

If Ukrainian IP addresses contributed to the attacks, although many researchers said that the fact that he was not only noteworthy.

“What we can conclude from IP data is the geographical division of traffic sources, which will be able to provide information about the botnet content or infrastructure,” says Zayon’s Edwards. “What we can’t conclude with certainty is the identity or intention of the actual sinner.”

Additional report by Zoë Schiffer.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *