Elon Musk confirmed that X was hit by a large-scale cyber attack, possibly by a nation-state or coordinated group.
Over 40,000 users reported outages, with many unable to log in or experiencing missing content.
Cybersecurity concerns are rising, as analysts link the attack to growing global tech tensions.
Elon Musk has revealed that X (formerly Twitter) has been targeted in a large-scale cyber attack, describing it as highly coordinated and resource-intensive.
JUST IN: Elon Musk confirms there is still a massive cyberattack happening against X
Musk suggested that the attack was executed by either a large, organized group or a nation-state—possibly both.
“We get attacked every day, but this was done with a lot of resources. Either a large, coordinated group and/or a country is involved. Tracing…” Musk posted on X.
There was (still is) a massive cyberattack against 𝕏.
We get attacked every day, but this was done with a lot of resources. Either a large, coordinated group and/or a country is involved.
The attack caused significant outages on the platform, with thousands of users unable to log in. Data from Downdetector.com shows that over 40,000 reports of service disruptions flooded in during the afternoon.
Many users reported being locked out of their accounts, while others faced delays in loading content or missing posts.
Cybersecurity Concerns on the Rise
This breach comes amid increasing cybersecurity concerns worldwide, especially surrounding high-profile platforms like X. Some analysts speculate that the attack could be linked to growing tensions in global tech warfare.
While Musk has assured that engineers are actively working to mitigate the attack, no further details have been provided about who may be responsible or how long the disruptions will last.
Ongoing Developments
This is a developing story, and more details are expected to emerge as X investigates the breach. Users experiencing issues are advised to refresh their feeds and follow official X support channels for updates.
Disclaimer: BlockNews provides independent reporting on crypto, blockchain, and digital finance. All content is for informational purposes only and does not constitute financial advice. Readers should do their own research before making investment decisions. Some articles may use AI tools to assist in drafting, but every piece is reviewed and edited by our editorial team of experienced crypto writers and analysts before publication.
Michael is a BSBA Management graduate from Mindanao State University and has been a professional content writer since 2019. He began exploring cryptocurrency in 2021 and has since made blockchain and digital assets his primary focus. For nearly four years, Michael has contributed research and editorial content at Aiur Labs and BlockNews, producing clear and accessible coverage of market trends, trading strategies, and project developments. He is transparent about his personal holdings in Bitcoin, TRON, and select meme tokens, combining writing expertise with hands-on market experience to deliver trustworthy insights to readers.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.