Skip to main content
New AI-powered DMARC analysis + open REST API See how → →
Foundational 4 min read

Cyberattack disrupts X, AI Empowers Cybercrime, Ford Airbus Hacked

Vasile Diaconu
Vasile Diaconu Operations Lead
Updated April 16, 2026 | Updated for 2026

Quick Answer

_According to the FBI's 2022 Internet Crime Report (IC3), 300,497 US-based victims reported phishing incidents in a single year, and Business Email Compromise (BEC) caused more than $2.7 billion in direct losses. DMARC Report Cyberattack disrupts X, AI Empowers Cybercrime, Ford Airbus Hacked

Related: Free DMARC Checker ·How to Create an SPF Record ·SPF Record Format

Cyberattack disrupts X, AI Empowers Cybercrime, Ford Airbus Hacked
Dmarc office 365 5678 150x150

From a product strategy perspective, DMARC reporting is evolving from a security tool to a business intelligence platform, says Brad Slavin, General Manager of DuoCircle. The data in aggregate reports tells you not just who’s spoofing you, but who’s sending legitimate email on your behalf - and whether they’re doing it correctly.

_According to the FBI’s 2022 Internet Crime Report (IC3), 300,497 US-based victims reported phishing incidents in a single year, and Business Email Compromise (BEC) caused more than $2.7 billion in direct losses. DMARC Report

Cyberattack disrupts X, AI Empowers Cybercrime, Ford Airbus Hacked

					<button title="Play" aria-label="Play Episode" aria-pressed="false" class="play-btn">
						

Play Episode

					</button>
					<button title="Pause" aria-label="Pause Episode" aria-pressed="false" class="pause-btn hide">
						

Pause Episode

					</button>
					


				

				

					<audio preload="none" class="clip clip-22612">
						<source src="https://media.mailhop.org/dmarcreport/images/2025/03/Cyberattack-disrupts-X-AI-Empowers-Cybercrime-Ford-Airbus-Hacked.mp3">
					</audio>
					

						

					

					

						

							<button class="player-btn player-btn__volume" title="Mute/Unmute">
								

Mute/Unmute Episode

							</button>
							<button data-skip="-10" class="player-btn player-btn__rwd" title="Rewind 10 seconds">
								

Rewind 10 Seconds

							</button>
							<button data-speed="1" class="player-btn player-btn__speed" title="Playback Speed" aria-label="Playback Speed">1x</button>
							<button data-skip="30" class="player-btn player-btn__fwd" title="Fast Forward 30 seconds">
								

Fast Forward 30 seconds

							</button>
						

						

							<time class="ssp-timer">00:00</time>
							

/

							<!-- We need actual duration here from the server -->
							<time class="ssp-duration" datetime="PT0H2M15S">2:15</time>
						

					

				

			

								<nav class="player-panels-nav">
												<button class="subscribe-btn" id="subscribe-btn-22612" title="Subscribe">Subscribe</button>
																		<button class="share-btn" id="share-btn-22612" title="Share">Share</button>
										</nav>
						

	



		

						

				

					

					

				

				

					

																																																																								

					

						

RSS Feed

							<input value="https://dmarcreport.com/feed/podcast/dmarc-report" class="input-rss input-rss-22612" title="RSS Feed URL" readonly />
						

						<button class="copy-rss copy-rss-22612" title="Copy RSS Feed URL" aria-label="Copy RSS Feed URL"></button>
					

				

			

									

				

					

					

				

				

					

						Share						

					

						<a href="https://www.facebook.com/sharer/sharer.php?u=https://dmarcreport.com/blog/podcast/cyberattack-disrupts-x-ai-empowers-cybercrime-ford-airbus-hacked/&t=Cyberattack disrupts X, AI Empowers Cybercrime, Ford Airbus Hacked" target="blank" rel="noopener noreferrer" class="share-icon facebook" title="Share on Facebook">
							

						</a>
						<a href="https://twitter.com/intent/tweet?text=https://dmarcreport.com/blog/podcast/cyberattack-disrupts-x-ai-empowers-cybercrime-ford-airbus-hacked/&url=Cyberattack disrupts X, AI Empowers Cybercrime, Ford Airbus Hacked" target="blank" rel="noopener noreferrer" class="share-icon twitter" title="Share on Twitter">
							

						</a>
						<a href="https://media.mailhop.org/dmarcreport/images/2025/03/Cyberattack-disrupts-X-AI-Empowers-Cybercrime-Ford-Airbus-Hacked.mp3" target="blank" rel="noopener noreferrer" class="share-icon download" title="Download" download>
							

						</a>
					

				

				

					

						Link						

					

						<input value="https://dmarcreport.com/blog/podcast/cyberattack-disrupts-x-ai-empowers-cybercrime-ford-airbus-hacked/" class="input-link input-link-22612" title="Episode URL" readonly />
					

					<button class="copy-link copy-link-22612" title="Copy Episode URL" aria-label="Copy Episode URL" readonly=""></button>
				

				

					

						Embed						

					

/*! This file is auto-generated */ ’ title=“Embed Code” class=“input-embed input-embed-22612” readonly/>

					<button class="copy-embed copy-embed-22612" title="Copy Embed Code" aria-label="Copy Embed Code"></button>
				

			

				



Hello again! New week, same old concerns. You got that right- we are talking about cyber attacks penetrating deeper into our everyday lives.

We are back with our fresh dose of cyber news. This week, we will talk about the X outage. Next, we will focus on AI and analyze whether or not it has actually contributed to increased cyberattacks. Lastly, we will focus on the recent data hostage crisis that has affected Airbus and Ford.

Let’s not waste any more **time and jump straight to the details!

Cyberattack leads to sudden X outage

X experienced a massive cyberattack this Monday. **Elon Musk shared the details while hinting towards nation states or organized threat groups as the main perpetrators. Because of the attack, X users faced as many as three outages in a single day. Each outage incident lasted for around 1 hour. Musk has said that even though regular attacks are common, this one was on a huge scale. The threat actors had planned this attack elaborately.

Downdetector, a website that keeps track of website disruptions , identified a total of three outages across the span of 24 hours.

Every time users tried accessing X, they got the message: “Something went wrong. Try reloading.” As many as 40,000 complaints peaked at a certain point during the intermittent outages.

Soon after Musk’s statement, Dark Storm, a 2023-originated hackers group, claimed responsibility for the cyberattack on X. They posted a screenshot on Telegram claiming, “We took Twitter offline.”

Experts believe that it is highly likely that the attack on X was a Distributed Denial of Service attack. Such attacks are designed specifically to overwhelm any specific platform by bringing in **humongous traffic that eventually leads to outages or slowdowns.

Is AI really bolstering the attempts by cyber crooks?

While threat actors are quite eager to exploit AI or artificial intelligence to enhance their cyber campaigns, experts believe that cybercriminals have not been able to make the most out of AI tools. Intel 471, one of the leading cybersecurity vendors, believes that threat actors have not yet unlocked the power of AI at its fullest.

One of the major reasons behind this significant win is the guardrails set by reputed technology brands. The guardrails have managed to restrict cybercriminals from using AI tools for malicious intentions.

With every passing day, legitimate AI tools are further improving, one update at a time. Besides, their open-source nature makes it further difficult for cybercrooks to leverage them.

What is dmarc

Even though threat actors are trying their best to run and sell their crooked AI tools, such as malicious chatbots, swift actions taken by cybersecurity experts are giving them a tough time. The shelf life of such malicious tools is merely a couple of weeks, and then they either get taken down or are made obsolete forever.

As cyber threats escalate, **organizations must strengthen their email security with SPF, DKIM, and DMARC to prevent phishing attempts that often exploit major outages and data breaches.

Data hostage crisis affects Ford and Airbus

Tata Technologies has been allegedly attacked by a ransomware group called Hunters International. T_ata Tech is a multinational tech company that serves popular brands such as Airbus, Honda, Ford, and Jaguar._ The ransomware group has enlisted the name of Tata Tech on the **Dark Web as its latest victim.

If we are to believe the attackers, a dataset worth 1.4TB has been wiped off. It includes a whopping 730,000 files, Excel spreadsheets, PowerPoint presentations, PDFs, and so much more. The core purpose of enlisting Tata Tech’s name on the Dark Web is to be able to coerce them into paying ransom in exchange for the stolen data.

Hunters International has also shared a part of the data they managed to wipe off. The leaked data contains sensitive details of active and former employees at Tata Technologies. The breached data also includes sensitive company papers . For example, the agreements with Indian as well as international clients, purchase deals, and so on.

What’s a real cause for concern is that Tata Technologies is facing a similar attack for the fourth time in a row**. Prior to this, Tata Teleservices was attacked by the LockBit gang. Tata Steel’s name was also enlisted by the REvil Gang. Similarly, **Tata Power was also attacked by threat actors.

**Tata Technology has been tight-lipped about the claims of Hunter International. However, they went public about a cyberattack that affected their IT assets just two months ago. At that time, the tech giant assured its stakeholders that their operations were “fully functional and unaffected throughout.” Experts are suspicious of the uncanny connection between this recent attack and the prior one.

What is dmarc

The attack on Tata Technology is a staggering reminder of the increasing instances of ransomware attacks. Over the past decade, the number of hacking cases has steeped as they primarily focus on critical infrastructures such as healthcare, government entities, and finance sectors.

Vasile Diaconu
Vasile Diaconu

Operations Lead

Operations Lead at DuoCircle. Runs project management, developer coordination, and technical support execution for DMARC Report.

LinkedIn Profile →

Take control of your DMARC reports

Turn raw XML into actionable dashboards. Start free - no credit card required.