Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint Security //

Antimalware

8/17/2018
09:05 AM
Jeffrey Burt
Jeffrey Burt
Jeffrey Burt
50%
50%

Congressional Campaign Websites Vulnerable to Attack, Say Researchers

Researchers presented a study at DEF CON that showed that a third of congressional candidates' websites are vulnerable to attack, adding to threats already seen by some politicians.

The security of the US election system and of candidates' campaigns has been front and center in a national discussion that began with the Russian interference in the 2016 presidential campaign, and continues as the country gets closer to fast-approaching 2018 midterms in November. Such security was a focus in the recent Black Hat and DEF CON events in Las Vegas, which featured demonstrations and research reports looking at everything from voting systems to individual campaigns.

One such study, conducted by a group of four independent researchers led by Joshua Franklin, an ex-NIST security expert, found that three out of 10 websites run by House of Representative candidates -- both Democrat and Republican -- have significant security flaws that make them vulnerable to attack.

The researchers used a range of automated scans and test programs to sniff out the vulnerabilities, which include issues with digital certificates, according to a report by Reuters. The team also found web pages whose addresses closely resemble those of candidates and which can be used by attackers in phishing campaigns to trick users.

Most of the vulnerabilities were found on websites for candidates with smaller campaigns, and highlight a weakness in the election process. While states receive money from the Congress to shore up the security of their voting systems and processes, campaigns themselves do not. They have to rely on political parties for funding, and may not always be able to afford top cybersecurity expertise on tight budgets.

It's an issue that the political system needs to address, according to Joseph Carson, chief security scientist at privileged account management (PAM) solutions vendor Thycotic.

"There are many areas in which the elections are vulnerable to hacking," Carson told Security Now in an email, noting the demonstrations of how easily voting systems can be compromised. "The bigger issue is that each election campaign is expected to protect and secure their own systems. This means that inexperienced, temporary staff [is] brought in to protect sensitive data that includes voter information and campaign strategies. This allows for attackers to easily target election campaigns, sometimes gaining access to email accounts or the entire voter database."

The threat of cyberattacks against many aspects of the midterms elections is not a surprise. The U.S. intelligence community has said there is no doubt that Russian hackers interfered with the 2016 presidential elections. The heads of federal law enforcement agencies -- including the FBI, the CIA and the Department of Homeland Security -- have said in recent months that it's clear that Russia and other bad actors intend to do the same in the upcoming elections.

Dan Coats, director of national intelligence, said during a congressional hearing in July that the "warning lights are blinking red again" and that the "digital infrastructure that serves this country is literally under attack." (See DOJ Will Now Alert US Public to Foreign Interference, Attacks.)

His statement comes even after investigators with the special counsel investigation under ex-FBI Director Robert Mueller last month indicted 12 Russian nationals for hacking into the networks of the Democratic National Committee and Democratic presidential candidate Hillary Clinton in 2016. (See 12 Russian Nationals Indicted in 2016 Hacking of DNC, Clinton Campaign.)

There already have been instances of campaigns seeing attempted hacks. Microsoft officials said the company was able to identify three congressional campaigns that were under attack and to block the hacking attempts. One of those candidates was Sen. Claire McCaskill, D-MO, who is running for re-election. Rolling Stone reported that the FBI is investigating a number of cyberattacks against a Democratic candidate running against Rep. Dana Rohrabacher, R-CA, a vocal supporter of Russia and its president, Vladimir Putin. Democratic candidates in a congressional race in Minnesota also reported Russian interest in their campaigns.

A key challenge in protecting the election system against cyberattacks is the wide range of areas that are vulnerable. There are not only federal contests looming, but also state and local races, voting machines and databases. There's also social media and other forms of communications. All of these are avenues for threat actors to follow to undermine the integrity of US elections. The need for expertise at all levels is great, according to cybersecurity experts.

"To protect the election process against hacks, security professionals are direly needed," Sanjay Kaira, cofounder and chief product officer at cloud security solutions provider Lacework, told Security Now in an email. "The rigorous controls, monitoring and best practices applied to highly targeted industries such as financial services or energy should be applied to the electoral process, and will help us move forward with an effective game plan that is devoid of biased influences that might come from political debate. Security professionals who are steeped in this mindset can give us the best opportunity to be successful at that, especially as the process gets modernized on new cloud technologies."

Rishi Bhargava, cofounder of cybersecurity firm Demisto, agreed, telling Security Now that the "rate of advancement in, and compromise of, the technical infrastructure surrounding elections has grown faster than the rate of awareness and knowledge that government officials need to stop these attacks."

David Ginsburg, vice president of marketing at cybersecurity vendor Cavirin, said voting machines get a lot of attention, but there are other risks that need to be addressed.

"We saw, and continue to see, manipulation of social networks, news sites, and even the integrity of data stored in the cloud," Ginsburg told Security Now. "This last threat, where the very accuracy of critical records comes into question, is sometimes overlooked. I'd put out a challenge, in the same way that we prepared for Y2K and then GDPR, for organizations that have anything to do with the election process or data, to put in place the necessary processes and technology. An E-80, if you may."

Related posts:

— Jeffrey Burt is a long-time tech journalist whose work has appeared in such publications as eWEEK, The Next Platform and Channelnomics.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Browsers to Enforce Shorter Certificate Life Spans: What Businesses Should Know
Kelly Sheridan, Staff Editor, Dark Reading,  7/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15106
PUBLISHED: 2020-08-05
In etcd before versions 3.3.23 and 3.4.10, a large slice causes panic in decodeRecord method. The size of a record is stored in the length field of a WAL file and no additional validation is done on this data. Therefore, it is possible to forge an extremely large frame size that can unintentionally ...
CVE-2020-16192
PUBLISHED: 2020-08-05
LimeSurvey 4.3.2 allows reflected XSS because application/controllers/LSBaseController.php lacks code to validate parameters.
CVE-2020-17364
PUBLISHED: 2020-08-05
USVN (aka User-friendly SVN) before 1.0.9 allows XSS via SVN logs.
CVE-2020-4481
PUBLISHED: 2020-08-05
IBM UrbanCode Deploy (UCD) 6.2.7.3, 6.2.7.4, 7.0.3.0, and 7.0.4.0 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 181848.
CVE-2020-5608
PUBLISHED: 2020-08-05
CAMS for HIS CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic) R4.01.00 to R6.07.00, B/M9000CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01 allows a remote unauthenticated attacker to bypass authentication and send altered c...