Analytics
9/6/2016
03:40 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

More Signs Point To Russian Cyberspy Connection In State Election Board Hacks

Researchers discover possible nation-sate link between attacks on Arizona and Illinois and recent attacks on Turkey and Ukraine governments.

As US intelligence and government leaders double down with investigations and concerns over what looks a lot like a Russian cyberattack-heavy effort to influence the US election and future policies, a new clue pointing to Russia has emerged in the recent breaches of the Arizona and Illinois voter information boards.

ThreatConnect found that an IP address (5.149.249[.]172) used in the recent state boards of election attacks was also used in spearphishing campaigns from March to August of this year against government officials in Turkey, Ukraine, and members of the German Freedom Party. The IP address was identified in an FBI Flash Bulletin advisory as an indicator of compromise in the attacks that compromised voter registration information in Arizona and Illinois.

“We’re not sure who attacked the state board of elections, but when we started investigating the indicators [provided by the] FBI, there was some highly circumstantial evidence,” says Toni Gidwani, director of research operations at ThreatConnect. Once the research team spotted the IP address’s ties to the Ukrainian government attacks and others, it looked more like a “state-based effort,” she says.

ThreatConnect points out that this IP address range is associated with plenty of malicious activity, namely in the cyber espionage-type versus traditional cybercrime. Even so, Gidwani says “we are unable to assess which actor or group might be behind the attacks based on the current evidence.”

Gidwani says her team hasn’t dismissed the possibility of an overlap between nation-state cyber espionage and cybercrime gangs in this case. “We need more evidence,” she says.

Peter Tran, general manager and senior director at RSA, the security division of EMC, says the value of voter information depends on the data: much of it is public domain information, such as name, party and email address, for example. “Campaigns and foundations have been aggregating this information for years and years,” Tran says, adding that correlating that information with other data could be quite lucrative for criminals and nation-state actors.

There’s also the possibility that Russian state actors are looking to alter voter registration status in an attempt to disrupt voting by preventing citizens from voting or sabotaging their voter identity information. But so far, no researchers have proof to share that this is the endgame.

Meanwhile, ThreatConnect’s Gidwani says she can’t fully rule out a false flag scenario. Even so, she says, there are signs that it’s not: “I don’t think so based on the fact that they took the spearphishing kit down shortly after we discovered it. They didn’t intend for us to find that … and the whole victim list they targeted,” she says. “I would also question who would gain from a false flag option.”

Another mystery: just what information the attackers were after in the state boards of elections, and whether other there are other board victims. “Was it just Arizona and Illinois?" she asks. "Or is it 20 or 50 states?”

It could also merely have been a way to probe how vulnerable the US election infrastructure is, she says. “This piece of our research left us with a lot more questions than answers.”

“Whether it is to ultimately collect intelligence, influence public opinion, or sow discord, doubt, or contempt with respect to political ideologies — the individuals behind this activity, whoever they may be, are looking to manipulate multiple countries’ democratic processes,” ThreatConnect wrote in its report

Related Content:

 

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Game Change: Meet the Mach37 Fall Startups
Ericka Chickowski, Contributing Writer, Dark Reading,  10/18/2017
Why Security Leaders Can't Afford to Be Just 'Left-Brained'
Bill Bradley, SVP, Cyber Engineering and Technical Services, CenturyLink,  10/17/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] Assessing Cybersecurity Risk
[Strategic Security Report] Assessing Cybersecurity Risk
As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report delivers insight on how today's enterprises evaluate the risks they face. This report also offers a look at security professionals' concerns about a wide variety of threats, including cloud security, mobile security, and the Internet of Things.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.