Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


2008 Election Candidates Vulnerable, Researcher Says

Campaign sites could fall victim to contribution theft, identity fraud, misinformation, or denial of service

On the eve of Super Tuesday, one security researcher is asking a simple question: Just how safe are the candidates' online campaign and contribution sites?

The answers suggest there is cause for concern.

Presidential campaign computer systems and Websites, many of them built quickly by IT volunteers in temporary facilities, may be easy targets for vandalism and theft, according to Oliver Friedrichs, director of emerging technologies at Symantec's Security Response unit.

Friedrichs will publish his findings in an upcoming Symantec security book and will discuss them in a presentation at the Black Hat DC briefings in Washington later this month.

In an interview, Friedrichs said he began the research because he saw that the 2008 presidential candidates were relying much more heavily on Internet contributions and information distribution than they had in the 2004 campaign. "If this can't be done securely, voters may lose confidence in their ability to get information or make contributions online," he said.

Both Ron Paul and John Edwards had days when they collected more than $3 million in donations on the Web, most of them in small increments of less than the $2,300 individual campaign donation limit.

In his research, Friedrichs found that many of the candidates had not done an adequate job of researching and registering potential domain names that supporters or contributors might encounter by mistake. These domains might easily be registered by detractors or identity thieves, a practice known widely as "typosquatting."

"We looked at sites like 'muttromney.com' and 'hillaryclingon.com,' and we found that only a couple of the 19 candidates who began the race had protected themselves," Friedrichs said. "Some of the typo sites were owned by advertisers, or even detractors of the candidate."

A phisher could easily set up a credible-looking site on one of these typo domains and solicit contributions from visitors, essentially stealing or rerouting the money from the candidate, Friedrichs explained. "Detractors of the candidate could set up the sites to spread misinformation, spyware, or even malware," he said.

Such attacks would not be unprecedented, Friedrichs warned. In the 2004 campaign, phishers found a way to reroute some of John Kerry's traffic to a different Website, he warned.

Other attacks might also be possible, Friedrichs stated. Researchers earlier this year discovered a cross-site scripting vulnerability in Mitt Romney's Website that might have allowed an attacker to alter the content on the site, he said. "Something like that could allow a detractor to make a subtle change in the candidate's stance on, say, abortion," Friedrichs said. "We haven't seen it done yet, but it certainly is possible."

Of course, some sites may also be open to more traditional political attacks, such as defacement or denial of service, Friedrichs observed. Joe Lieberman's campaign experienced such an attack in 2006, he noted. "It essentially paralyzed the campaign systems and froze email as well -- the campaign workers had to use their personal accounts to keep things going."

The problem, in part, is that most candidates don't have many IT resources, Friedrichs observed. In the early stages of a campaign, many candidates rely on volunteers or third-party services that might not know their systems. But as candidates collect more and more of their contributions online, these hastily laid IT infrastructures may become increasingly attractive targets for thieves or attackers, he says.

So far, Friedrichs hasn't found any evidence to suggest that candidates or their campaign staffs are intentionally trying to sabotage their opponents' sites or redirect their contributions. "I think what we've seen so far has been perpetrated by extremists or actual thieves," he said.

Friedrichs has not done any research yet into the much-ballyhooed topic of voting machine fraud, either through local or remote hacks. Earlier this year, a report suggested that voting machine hacks may have helped Hillary Clinton win the New Hampshire primary, in which Barack Obama was heavily favored. (See Did Hackers Win It for Hillary?)

"There's been so much research on the voting machine issue that I wasn't sure we could add anything to that," he said. "But the whole question of vulnerabilities in campaign systems really hasn't gotten much attention."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Symantec Corp. (Nasdaq: SYMC)

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: George has not accepted that the technology age has come to an end.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-03-05
The Blog module in Kentico CMS 5.5 R2 build 5.5.3996 allows SQL injection via the tagname parameter.
PUBLISHED: 2021-03-05
Deutsche Post Mailoptimizer 4.3 before 2020-11-09 allows Directory Traversal via a crafted ZIP archive to the Upload feature or the MO Connect component. This can lead to remote code execution.
PUBLISHED: 2021-03-05
ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.
PUBLISHED: 2021-03-05
The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0.
PUBLISHED: 2021-03-05
A flaw was found in newlib in versions prior to 4.0.0. Improper overflow validation in the memory allocation functions mEMALIGn, pvALLOc, nano_memalign, nano_valloc, nano_pvalloc could case an integer overflow, leading to an allocation of a small buffer and then to a heap-based buffer overflow.