Virtual Event Today: Ransomware Resilience & Recovery Summit - Login to Live Event
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cyberwarfare

Cyber-Attacks Expected Following Belgium Bombings

Cyber-Attacks Expected After Islamic Terrorist Attacks in Belgium

Cyber-Attacks Expected After Islamic Terrorist Attacks in Belgium

Recent terror attacks in Brussels conducted by terrorists linked to the Islamic State are expected to spawn multiple cyber-attacks against high-profile websites and targets such as government and media in Belgium, researchers say.

According to a Special Intelligence Report from cyber risk management firm Cytegic, there is a heightened threat level in Belgium and Western Europe on the cyber front. The report explains that this is the continuation of a trend of cyber-attacks observed following major terrorist events in Western Europe, such as the November 2015 Paris terrorist attacks.

Following the Islamic terrorist attacks, cyber activity levels were observed increasing in the attacked country, and according to Cytegic, while these levels lasted for a few weeks, they peaked the week after the attacks. Moreover, the researchers explain that denial-of-service, defacements, email social engineering and malware injections represent the most used attack methods in these circumstances.

Following terrorist attacks, the most active cyber groups include political activists, such as Anonymous and its affiliates, along with political cyber-warriors, which are nation-states or nation-backed attackers, and cyber-terrorists, which usually include hackers that are affiliating themselves with the Islamic State (also known as IS or ISIS).

Based on previous observations, Cytegic’s report (PDF) suggests that the cyber-attacks expected to occur in the days ahead will likely target mainly the government, media, banking and finance, critical infrastructure, military and defense industries.

The report also reveals that political activists have already started to organize for a new anti-ISIS campaign, which should be a continuation of the #OpISIS campaign launched following the Paris attacks. At that time, the forces that clashed in a cyber-war involved the French government, Anonymous and its affiliates on one side, and pro-ISIS hacktivists and sensationalists on the other.

Attacks on ISIS supporting websites and social-media accounts are expected to occur and intensify in the next few days, including denial-of-service attacks, defacements, website redirections and taking down Twitter accounts. Previously, attackers also tried to hack ISIS related websites and users to grab data related mostly to recruiting.

Advertisement. Scroll to continue reading.

Cyber-terrorists, on the other hand, are expected to target critical infrastructure to cause chaos and physical and financial damage, as well as to continue focusing on placing so called “doomsday buttons” in critical infrastructure targets, Cytegic says.

In the coming weeks, high-profile organizations in Belgium and Western Europe, mainly from the government, media, banking and defense sectors could be targeted by cyber-attacks, the security company notes. Thus, they should prepare for DDoS, social-engineering and malware threats on their websites, networks and employees.

The Paris terrorist attacks in November were not only followed by these types of cyber-attacks, but also fueled debate on encryption, as it was discovered that terrorists were using encrypted communication services. CIA Director John Brennan said at the time that attackers are using technologies that make it difficult for law enforcement to have the insight they need.

Related: Paris Attacks: What kind of Encryption Does the PlayStation 4 Use, Anyway?

Related: UK to Double Funding to Fight Cyber Attacks

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Cyberwarfare

Russian espionage group Nomadic Octopus infiltrated a Tajikistani telecoms provider to spy on 18 entities, including government officials and public service infrastructures.

Cyberwarfare

Several hacker groups have joined in on the Israel-Hamas war that started over the weekend after the militant group launched a major attack.

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cyberwarfare

The war in Ukraine is the first major conflagration between two technologically advanced powers in the age of cyber. It prompts us to question...