The investigation into the Brussels terror attacks continues, as authorities work to track down the terrorists responsible for killing 31 people. Friday officials confirmed that at least two Americans are among the dead.
"The United States is praying and grieving with you for the loved ones of those cruelly taken from us, including Americans, and for the many who were injured in these despicable attacks," Secretary of State John Kerry said.
Unfortunately terror attacks are becoming more and more common, and the pressure is on to find a way to stop terrorists before they strike. One of the keys to stopping ISIS is to shut down its online presence. Israeli cybersecurity company Cytegic may have found a vital pattern in the cyber war against terror.
"We have been able to identify a pattern of behavior of cyber attackers and attack methods surrounding major terrorist events in Western Europe, the latest such pattern was identified after the November 2015 Paris terrorist attacks," the report reads.
Cyber-attack behavior after terror attack
- The heightened cyber activity level in the attacked country starts directly after the terrorist attack and peaks during the week after, subsiding only two to three weeks later ?
- The most active cyber attackers are political activists (such as Anonymous and its affiliates), political cyber-warriors (nation-states or nation-backed attackers) and cyber-terrorists (usually hackers affiliating themselves with ISIS)
- The most used attack methods are denial-of-service, defacements, email social engineering and malware injections
- The most targeted industries in the attacked country are government, media, banking and finance, critical infrastructure, military and defense
This research is important because it allows investigators to warn high-risk industries such as government, media, financial, military, and defense.