Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

3/29/2018
09:00 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

US Election Swing States Score Low Marks in Cybersecurity

C and D grades for Florida, Michigan, New Hampshire, Nevada, and Ohio, SecurityScorecard assessment shows.

Florida, Michigan, New Hampshire, Nevada, and Ohio each earned either C or D averages in their cybersecurity posture, according to new data from a security ratings firm.

SecurityScorecard in its annual report on US, state, and local government-sector security studied the states' state of security in endpoint, IP reputation, network, and patching, and found them seriously lacking. Florida and Ohio earned a C grade overall; New Hampshire, Nevada, and an undisclosed city in Michigan each scored a D average; and one unnamed county in Florida scored a C, while one in Ohio earned a D.

The grading system is based on SecurityScorecard's benchmarking platform, which aggregates data from millions of sensors across the Internet that gather and analyze public-facing security postures of IP addresses and identifiable software versions and services, and then maps them to organizations, including browser versions and patching cadence. "We're looking at what a hacker would look it" online, says Alex Heid, chief research officer at SecurityScorecard. The firm analyzed the security posture of 655 government agencies, each of which had more than 100 public-facing IP addresses.

Among the systems spotted in the analysis were state and local voter registration systems, many of which run older legacy software that contains common Web vulnerabilities such as SQL injection and remote code execution bugs, Heid says. But even if a malicious hacker were to detect and hack into one of those systems, it wouldn't necessarily affect the voting process, he says, even if he or she changed some names and information, because those systems typically have backups and lots of redundancy.

"The bigger risk is an innocuous Web app compromise on a server that is then used to pivot to the rest of the network behind the firewall," Heid notes. "If the voter registration server is on the same server as the county court system payments," for example, that would be exposed, he says.

The states' grades are based on a snapshot in time for the government agencies' security postures and doesn't necessarily mean those states are poorly secured or that any states with A's are secure. "It's fluid and indicates how they are doing at that time," he says. "Everyone has vulnerabilities and exploitable conditions. It's measured based on how quickly they respond to those conditions."

The fact that New Hampshire barely passed with a D doesn't mean elections held there are more hackable, for example, so the grades don't mean much in terms of the security of the 2018 elections, he says.

Dam Webcam
Among the exposed systems SecurityScorecard's study found was a city power plant server sitting on the public Internet that was accessible via a Web browser. "You see the dam's Web cam, and there's a big red button that says 'open dam,'" he says. The company contacted the site so it could remedy the exposure, he says.

Overall, government agencies score lower than most other sectors in endpoint security, network security, and patching cadence, according to the findings.

"Government has a lower grade, similar to university systems. It's not that they are bad at security," but more that governmental organizations typically have older systems in place and require more layers of approvals or patching and other updates, he says.

Related Content:

Interop ITX 2018

Join Dark Reading LIVE for two cybersecurity summits at Interop ITX. Learn from the industry's most knowledgeable IT security experts. Check out the Interop ITX 2018 agenda here.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Lessons from COVID-19 Cyberattacks: Where Do We Go Next?
Derek Manky, Chief of Security Insights and Global Threat Alliances, FortiGuard Labs,  7/2/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-3931
PUBLISHED: 2020-07-08
Buffer overflow exists in Geovision Door Access Control device family, an unauthenticated remote attacker can execute arbitrary command.
CVE-2020-15600
PUBLISHED: 2020-07-07
An issue was discovered in CMSUno before 1.6.1. uno.php allows CSRF to change the admin password.
CVE-2020-15599
PUBLISHED: 2020-07-07
Victor CMS through 2019-02-28 allows XSS via the register.php user_firstname or user_lastname field.
CVE-2020-8916
PUBLISHED: 2020-07-07
A memory leak in Openthread's wpantund versions up to commit 0e5d1601febb869f583e944785e5685c6c747be7, when used in an environment where wpanctl is directly interfacing with the control driver (eg: debug environments) can allow an attacker to crash the service (DoS). We recommend updating, or to res...
CVE-2020-12821
PUBLISHED: 2020-07-07
Gossipsub 1.0 does not properly resist invalid message spam, such as an eclipse attack or a sybil attack.