X Goes Down Worldwide as Hacktivists Launch Major DDoS Assault

by | Mar 11, 2025 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

Dark Storm Hacktivist Group Claims Responsibility for DDoS Attacks on X

On Monday, X (formerly Twitter) suffered multiple global outages due to what owner Elon Musk described as a “massive cyberattack.”

While Musk did not explicitly confirm a DDoS (Distributed Denial-of-Service) attack, he suggested that the attack involved “a large, coordinated group and/or a country.”

 

Dark Storm Claims Responsibility

The pro-Palestinian hacktivist group, Dark Storm, has taken credit for the attack, posting screenshots and links to Check-host.net on their Telegram channel as proof of their activity.

Dark Storm post on TelegramDark Storm post on Telegram

Check-host.net is a website that allows users to check site availability globally, often used by threat actors during DDoS campaigns to demonstrate an attack’s effectiveness.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

X Enables Cloudflare DDoS Protections

In response, X enabled Cloudflare’s DDoS protection, which now presents CAPTCHAs to suspicious IP addresses making excessive requests.

  • help.x.com currently requires a CAPTCHA for all requests, suggesting Cloudflare is filtering out attack traffic.

 

Cloudflare captcha on X.comCloudflare captcha on X.com
Source: BleepingComputer




Hacktivist DDoS Attacks: A Growing Threat

Hacktivists have repeatedly disrupted major platforms using botnets and other high-resource DDoS techniques.

  • In 2024, the U.S. indicted two Sudanese brothers suspected of operating Anonymous Sudan, a hacktivist group that successfully disrupted Microsoft, Cloudflare, and OpenAI through similar DDoS attacks.

As hacktivist cyber campaigns continue to evolve, large-scale DDoS attacks on major platforms are expected to persist.

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This