DNC Incident Was a Phishing Exercise

False alarm sent Democratic National Committee into high alert this week amid concerns of a new cyberattack.

Dark Reading Staff, Dark Reading

August 23, 2018

1 Min Read
Dark Reading logo in a gray background | Dark Reading

What appeared to be another cyberattack aimed at the Democratic National Committee (DNC) this week turned out to be a simulated phishing exercise, according to Newsweek.

Lookout Security had alerted the DNC to a phony login page spoofing Votebuilder, a service used by party officials and campaigns, that had been discovered attempting to grab usernames and passwords to the database. DNC officials then reportedly contacted the FBI.

But DNC CISO Bob Lord has now confirmed that the alert spotted by Lookout was actually a phishing test, not a real attack attempt. "We, along with the partners who reported the site, now believe it was built by a third party as part of a simulated phishing test on VoteBuilder," Lord said in a statement. The test, which mimicked … attributes of actual attacks on the Democratic party's voter fil­e, was not authorized by the DNC, VoteBuilder nor any of our vendors. The party took the necessary precautions to ensure that sensitive data critical to candidates and state parties across the country was not compromised."

According to Newsweek, there is at least one report that the Michigan Democratic Party was the organization behind the simulation.

Read more here. 

About the Author

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights