HACKING ELECTION IS EASY, STUDY PROVES

 ​

I t’s no longer a question whether hackers willinfluence the 2016 elections in the United States

— only how much they’ll be able to sway them.

Leaked emails already have cost a Democratic

Party chairperson her job, and the FBI last month issued a flash warning that foreign

cyberadversaries had breached two state election

databases.

Those two states — most likely Arizona and

Illinois — aren’t alone in having their voter

information compromised. Voter registration

databases from all 50 states are being hawked on

Deep Web marketplaces, an investigation by the

Institute for Critical Infrastructure Technology has

found.

Those databases could be used for all kinds of

mischief, noted ICIT Senior Fellow James Scott,

who collaborated with ICIT researcher Drew

Spaniel on a study of voting system

vulnerabilities.

For example, an attacker could sour a

candidate’s supporters by sending bogus

robocalls, supposedly originating from the

candidate, at 3 a.m.

“An attacker could alter registration records on

Election Day to delay and disrupt the election

process and to spread disenfranchisement in the

U.S. democratic process,” Scott told

TechNewsWorld.

Dilapidated Black Boxes

Theft of voter registration records may be just

the tip of the iceberg. U.S. voting systems are

woefully vulnerable to hacker attacks, the ICIT

maintained in the study released last week.

“Western democracy is held hostage to vulnerable

code in black boxes on dilapidated bare bones

PCs with virtually zero endpoint security,

otherwise known as e-voting machines,” Scott

and Spaniel wrote.

“Moreover, the systems are maintained and

managed either by manufacturer personnel who

obfuscate the insecurity of the systems or by

local and state voting officials who are the very

prototype of victims that repeatedly fall for spear

phishing, ransomware and malware attacks and

other easily avoidable cyber-attacks,” they

continued.

“The problem in the sector is not merely a matter

of lacking basic cyber hygiene, rather it is the

sheer absence of the technical aptitude required

to understand the cyber, physical and technical

landscape available for exploit by the multitude of

adversaries possessing a keen interest in

manipulating the election process,” Scott and

Spaniel added.

Safety in Fragmentation?

As vulnerable as U.S. voting systems are, it

would be difficult for hackers to influence the

outcome of an election, maintained Tellagraff

CEO Mark Graff, a former CISO of Nasdaq and

Lawrence Livermore Labs.

“It’s one thing to steal voter registration

information from websites on the Internet, but it’s

quite something else to modify that information

on the sites,” he told TechNewsWorld.

There’s a difference between generating noise

intended to undermine the credibility of the

election and actually influencing the outcome,

Graff pointed out.

“I don’t believe there is a credible case right now

that they are trying to directly influence the

outcome of the election,” he said.

“While our systems do have vulnerabilities, the

fact that we have a federal system and all 50

states have their own systems is a strength,”

Graff observed. “It might be possible to change

some votes, but to change the outcome of an

election and do so in a way that could not be

detected is not practical at this point.”

Media Illusion

The fragmentation defense is an illusion

propagated by the media, claimed ICIT’s Scott.

“The fragmented system does absolutely nothing

to mitigate the risk of cybercompromise of

election systems,” he argued. “If anything, the

disjointed, distributed system makes it easier.”

The cybersecurity requirements of voting systems

are not standardized or regulated, Scott

explained. As a result, some states protect their

systems, while other states only think that they

protect their systems.

“Attackers only need to compromise one or a few

counties in one or a few states to have a major

impact on the national election,” he said. “It does

not matter if some of the states adequately

protect their systems, because the states that do

not undermine the entire process.”

Brass Bull’s-eye

When it comes to ransomware, company brass

have a bull’s-eye on their backs.

Upper management and C-level executives were

popular targets of ransomware attacks, according

to a recent Malwarebytes survey of 540 CIOs,

CISOs and IT directors representing companies

with an average of 5,400 employees across the

U.S., Canada, UK and Germany.

Eighty percent of attacks affected mid-level

managers or higher, the survey participants

reported. A quarter of the attacks (25 percent)

affected senior executives and the C-suite.

Ransomware in the wild increases by 46 percent

or more every six months, noted Malwarebytes

Senior Security Researcher Nathan Scott told

TechNewsWorld. “That’s because ransomware

makes so much more money than any other

malware that we have ever seen.”

Breach Diary

Sept. 19. Active Network of Texas offers two

years of free identity repair services in letter to

1 million Oregon and 1.5 million Washington

Department of Fish and Wildlife customers

potentially affected by data breach of hunting

and fishing license sales system maintained by

Active in those states.

Sept. 19. Payment systems at four Genghis

Grill locations were compromised by malware

between Feb. 9 and Sept. 7, placing at risk

some 55,000 transactions by customers during

that period, Dallas Morning News reports.

Sept. 20. St. Francis Health Systems in

Tulsa, Oklahoma, confirms data breach in

which 6,000 names and addresses were stolen

from a server.

Sept. 20. A federal appeals court in

Cincinnati has overturned a lower court ruling

and is allowing class action lawsuit to proceed

against Nationwide Mutual Insurance over 2012

data breach in which information of 1.1 million

policy and non-policy holders was exposed to

unauthorized parties, SC Magazine reports.

Sept. 20. Paul O’Brien, founder of

smartphone news and reviews site MoDaCo,

confirms data breach that has exposed 880,000

subscriber identities.

Sept. 21. Payment gateway Regpack is

notifying its vendors that a data breach has

placed at risk personal information in some

324,380 accounts, SC Magazine reports.

Sept. 21. U.S. Rep. Ralph Abraham, R-La.,

has filed a bill allowing the director of

management and the budget to recommend the

removal of any agency head whose agency

suffers a data breach because it failed to

comply sufficiently with information security

requirements or standards, NextGov reports.

Sept. 21. University of Ottawa announces it

is launching an investigation into the

disappearance of a hard drive containing the

personal information of 900 former and current

students.

Sept. 22. Yahoo confirms 500 million user

accounts have been compromised in data

breach.

Sept. 22. Hacker group DCleaks makes public

emails from a White House contractor

containing sensitive information about

schedules and procedures, as well as about

Secret Service, military and White House

personnel. DC Leaks is the same group that

recently exposed emails of former Secretary

Colin Powell.

Sept. 22. H&L Australia, which provides

point-of-sales systems for more than 300

restaurant and liquor stores, confirms data

breach of its customer relationship

management system, resulting in theft of 14.1

GB of customer information.

Sept. 23. Ronald Schwartz, a New York

resident, files class action lawsuit against

Yahoo for gross negligence that led to data

breach resulting in compromise of 500 million

user accounts.

Sept. 23. Trump Hotel Collection company

agrees to pay $50,000 to settle case with New

York State Attorney General’s office over data

breach that exposed more than 70,000 credit

card numbers and other sensitive data.

Upcoming Security Events

Oct. 4. Cyber Crime — Why Are You a Target?

10 a.m. ET. Webinar by Richard Cassidy, UK

Cyber Security Evangelist. Free with

registration.

Oct. 5. Cambridge Cyber Summit. Kresge

Auditorium, 48 Massachusetts Ave.,

Massachusetts Institutue of Technology,

Cambridge, Massachusetts. Registration: $250.

Oct. 5-6. SecureWorld Denver. Colorado

Convention Center, 700 14th St., Denver.

Registration: conference pass, $325;

SecureWorld Plus, $725; exhibits and open

sessions, $30.

Oct. 6. Smartphone Encryption Is Getting

Stronger. Is It Enough To Keep You Safe? Noon

ET. Webinar by ManTech. Free with registration.

Oct. 5-7. APWG.EU eCrime Symposium 2016.

Slovenská sporitelna, Tomásikova 48, 831 04

Nové Mesto, Bratislava, Slovakia. Registration:

APWG members, 129 euros; student or faculty,

129 euros; law enforcement and government,

129 euros; all others, 149 euros.

Oct. 7-8. B-Sides Delaware. Wilmington

University, New Castle Campus, 320 North

Dupont Highway, New Castle, Delaware. Free.

Oct. 8. B-Sides Denver. SecureSet, 3801

Franklin St., Denver. Free, but tickets limited.

Oct. 11. Your Credentials Are Compromised,

So Now What? 1 p.m. ET. Webinar by Centrify.

Free with registration.

Oct. 11-14. OWASP AppSec USA.

Renaissance Marriott, 999 9th St. NW,

Washington, D.C. Registration: Non-member,

$925; single day, $500; student, $80. Oct.

14-16. B-Sides Warsaw. Panstwomiasto,

Andersa 29, Warsaw, Poland. Free.

Oct. 12. Can You Really Automate Yourself

Secure? Facts vs. Fantasies. Noon ET. Webinar

sponsored by Cigital. Free with registration.

Oct. 12. Why Are We Still Failing to Stop

Cyber Attacks? 1 p.m. ET. Webinar by Cyphort.

Free with registration.

Oct. 13. ISSA SoCal Security Symposium.

Hilton Long Beach & Executive Meeting Center,

701 West Ocean Blvd., Long Beach, California.

Registration: members, $115; nonmembers,

$140; students, $75; day of event, $190.

Oct. 14-16. B-Sides Warsaw. Panstwomiasto,

Andersa 29, Warsaw, Poland. Free.

Oct. 17-19. CSX North America. The

Cosmopolitan, 3708 Las Vegas Blvd. South, Las

Vegas. Registration: before Aug. 11, ISACA

member, $1,550; nonmember, $1,750. Before

Oct. 13, member, $1,750; nonmember, $1,950.

Onsite, member, $1,950; nonmember, $2,150.

Oct. 18. IT Security and Privacy Governance

in the Cloud. 1 p.m. ET. Webinar moderated by

Rebecca Herold, The Privacy Profesor. Free

with registration.

Oct. 18-19. Edge2016 Security Conference.

Crowne Plaza, 401 W. Summit Hill Drive,

Knoxville, Tennessee. Registration: before Aug.

15, $250; after Aug. 15, $300; educators and

students, $99.

Oct. 18-19. SecureWorld St. Louis. America’s

Center Convention Complex, 701 Convention

Plaza, St. Louis. Registration: conference pass,

$325; SecureWorld Plus, $725; exhibits and

open sessions, $30.

Oct. 18-19. Security of Things, A Smart Card

Alliance Event. Hilton Rosemont Chicago

O’Hare Hotel, 5550 N. River Rd., Rosemont,

Illinois. Registration: members $775 before Oct.

8, $885; nonmembers, $895 before Oct. 8,

$1,045.

Oct. 20. Los Angeles Cyber Security Summit.

Loews Santa Monica Beach Hotel, 1700 Ocean

Ave., Santa Monica, California. Registration:

$250.

Oct. 20. B-Sides Raleigh. Marbles Kid

Museum, 201 E. Hargett St., Raleigh, North

Carolina. Registration: $20.

Oct. 22. B-Sides Jacksonville. Sheraton Hotel,

10605 Deerwood Park Blvd., Jacksonville,

Florida. Registration: $10.

Oct. 27. SecureWorld Bay Area. San Jose

Marriott, 301 S. Market St., San Jose,

California. Registration: conference pass, $195;

SecureWorld Plus, $625; exhibits and open

sessions, $30.

Nov. 1-4. Black Hat Europe. Business Design

Centre, 52 Upper Street, London, UK.

Registration: before Sept. 3, Pounds 1,199 with

VAT; before Oct. 29, Pounds 1,559 with VAT;

after Oct. 28, Pounds 1,799 with VAT.

Nov. 9-10. SecureWorld Seattle. Meydenbauer

Center, 11100 NE 6th St., Bellevue, Washington.

Registration: conference pass, $325;

SecureWorld Plus, $725; exhibits and open

sessions, $30.

Nov. 28-30. FireEye Cyber Defense Summit

2016. Washington Hilton, 1919 Connecticut

Ave. NW, Washington, D.C. Registration:

through Sept. 30, general admission, $495;

government and academic, $295; Oct. 1- Nov.

  • 21, $995/$595; Nov. 22-30, $1,500/$1,500.

Leave a Reply