I have no idea, but it does look like at least a few of the top LTC pools are currently offline
A 51% attack would likely be performed so as to double spend against an exchange,
e.g., attain a significant amount of hashing power for solo mining but don't release solved blocks, start DDoS against pools, spend LTC to exchanges and spend same LTC to a locally controlled address broadcast only to self-mined blocks. When the LTCs reach an exchange, sell them and withdraw bitcoins. Then release the secret blockchain which is now longer than DDoS'd side has reached, which will then invalidate the LTC payments to the exchanges but that doesn't impact the BTC withdrawal.
This only makes sense though if there will still be value to the LTCs the attacker received after the double spend. An attack like this might render those LTCs essentially worthless.
Either way, any exchange that converts between crypto currencies and then honors withdrawal requests when pools in either currency are being DDoS'd would be essentially inviting such an attack to be attempted (and thus putting customer's funds at risk).