Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint Security //


// // //
09:05 AM
Jeffrey Burt
Jeffrey Burt
Jeffrey Burt

Congressional Campaign Websites Vulnerable to Attack, Say Researchers

Researchers presented a study at DEF CON that showed that a third of congressional candidates' websites are vulnerable to attack, adding to threats already seen by some politicians.

The security of the US election system and of candidates' campaigns has been front and center in a national discussion that began with the Russian interference in the 2016 presidential campaign, and continues as the country gets closer to fast-approaching 2018 midterms in November. Such security was a focus in the recent Black Hat and DEF CON events in Las Vegas, which featured demonstrations and research reports looking at everything from voting systems to individual campaigns.

One such study, conducted by a group of four independent researchers led by Joshua Franklin, an ex-NIST security expert, found that three out of 10 websites run by House of Representative candidates -- both Democrat and Republican -- have significant security flaws that make them vulnerable to attack.

The researchers used a range of automated scans and test programs to sniff out the vulnerabilities, which include issues with digital certificates, according to a report by Reuters. The team also found web pages whose addresses closely resemble those of candidates and which can be used by attackers in phishing campaigns to trick users.

Most of the vulnerabilities were found on websites for candidates with smaller campaigns, and highlight a weakness in the election process. While states receive money from the Congress to shore up the security of their voting systems and processes, campaigns themselves do not. They have to rely on political parties for funding, and may not always be able to afford top cybersecurity expertise on tight budgets.

It's an issue that the political system needs to address, according to Joseph Carson, chief security scientist at privileged account management (PAM) solutions vendor Thycotic.

"There are many areas in which the elections are vulnerable to hacking," Carson told Security Now in an email, noting the demonstrations of how easily voting systems can be compromised. "The bigger issue is that each election campaign is expected to protect and secure their own systems. This means that inexperienced, temporary staff [is] brought in to protect sensitive data that includes voter information and campaign strategies. This allows for attackers to easily target election campaigns, sometimes gaining access to email accounts or the entire voter database."

The threat of cyberattacks against many aspects of the midterms elections is not a surprise. The U.S. intelligence community has said there is no doubt that Russian hackers interfered with the 2016 presidential elections. The heads of federal law enforcement agencies -- including the FBI, the CIA and the Department of Homeland Security -- have said in recent months that it's clear that Russia and other bad actors intend to do the same in the upcoming elections.

Dan Coats, director of national intelligence, said during a congressional hearing in July that the "warning lights are blinking red again" and that the "digital infrastructure that serves this country is literally under attack." (See DOJ Will Now Alert US Public to Foreign Interference, Attacks.)

His statement comes even after investigators with the special counsel investigation under ex-FBI Director Robert Mueller last month indicted 12 Russian nationals for hacking into the networks of the Democratic National Committee and Democratic presidential candidate Hillary Clinton in 2016. (See 12 Russian Nationals Indicted in 2016 Hacking of DNC, Clinton Campaign.)

There already have been instances of campaigns seeing attempted hacks. Microsoft officials said the company was able to identify three congressional campaigns that were under attack and to block the hacking attempts. One of those candidates was Sen. Claire McCaskill, D-MO, who is running for re-election. Rolling Stone reported that the FBI is investigating a number of cyberattacks against a Democratic candidate running against Rep. Dana Rohrabacher, R-CA, a vocal supporter of Russia and its president, Vladimir Putin. Democratic candidates in a congressional race in Minnesota also reported Russian interest in their campaigns.

A key challenge in protecting the election system against cyberattacks is the wide range of areas that are vulnerable. There are not only federal contests looming, but also state and local races, voting machines and databases. There's also social media and other forms of communications. All of these are avenues for threat actors to follow to undermine the integrity of US elections. The need for expertise at all levels is great, according to cybersecurity experts.

"To protect the election process against hacks, security professionals are direly needed," Sanjay Kaira, cofounder and chief product officer at cloud security solutions provider Lacework, told Security Now in an email. "The rigorous controls, monitoring and best practices applied to highly targeted industries such as financial services or energy should be applied to the electoral process, and will help us move forward with an effective game plan that is devoid of biased influences that might come from political debate. Security professionals who are steeped in this mindset can give us the best opportunity to be successful at that, especially as the process gets modernized on new cloud technologies."

Rishi Bhargava, cofounder of cybersecurity firm Demisto, agreed, telling Security Now that the "rate of advancement in, and compromise of, the technical infrastructure surrounding elections has grown faster than the rate of awareness and knowledge that government officials need to stop these attacks."

David Ginsburg, vice president of marketing at cybersecurity vendor Cavirin, said voting machines get a lot of attention, but there are other risks that need to be addressed.

"We saw, and continue to see, manipulation of social networks, news sites, and even the integrity of data stored in the cloud," Ginsburg told Security Now. "This last threat, where the very accuracy of critical records comes into question, is sometimes overlooked. I'd put out a challenge, in the same way that we prepared for Y2K and then GDPR, for organizations that have anything to do with the election process or data, to put in place the necessary processes and technology. An E-80, if you may."

Related posts:

— Jeffrey Burt is a long-time tech journalist whose work has appeared in such publications as eWEEK, The Next Platform and Channelnomics.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The Promise and Reality of Cloud Security
Cloud security has been part of the cybersecurity conversation for years but has been on the sidelines for most enterprises. The shift to remote work during the COVID-19 pandemic and digital transformation projects have moved cloud infrastructure front-and-center as enterprises address the associated security risks. This report - a compilation of cutting-edge Black Hat research, in-depth Omdia analysis, and comprehensive Dark Reading reporting - explores how cloud security is rapidly evolving.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-01-30
Versions of the package servst before 2.0.3 are vulnerable to Directory Traversal due to improper sanitization of the filePath variable.
PUBLISHED: 2023-01-30
Versions of the package eta before 2.0.0 are vulnerable to Remote Code Execution (RCE) by overwriting template engine configuration variables with view options received from The Express render API. **Note:** This is exploitable only for users who are rendering templates with user-defined data.
PUBLISHED: 2023-01-30
isInList in the safeurl-python package before 1.2 for Python has an insufficiently restrictive regular expression for external domains, leading to SSRF.
PUBLISHED: 2023-01-30
Paranoidhttp before 0.3.0 allows SSRF because [::] is equivalent to the address, but does not match the filter for private addresses.
PUBLISHED: 2023-01-30
GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace c...