Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint Security //

Antimalware

8/17/2018
09:05 AM
Jeffrey Burt
Jeffrey Burt
Jeffrey Burt
50%
50%

Congressional Campaign Websites Vulnerable to Attack, Say Researchers

Researchers presented a study at DEF CON that showed that a third of congressional candidates' websites are vulnerable to attack, adding to threats already seen by some politicians.

The security of the US election system and of candidates' campaigns has been front and center in a national discussion that began with the Russian interference in the 2016 presidential campaign, and continues as the country gets closer to fast-approaching 2018 midterms in November. Such security was a focus in the recent Black Hat and DEF CON events in Las Vegas, which featured demonstrations and research reports looking at everything from voting systems to individual campaigns.

One such study, conducted by a group of four independent researchers led by Joshua Franklin, an ex-NIST security expert, found that three out of 10 websites run by House of Representative candidates -- both Democrat and Republican -- have significant security flaws that make them vulnerable to attack.

The researchers used a range of automated scans and test programs to sniff out the vulnerabilities, which include issues with digital certificates, according to a report by Reuters. The team also found web pages whose addresses closely resemble those of candidates and which can be used by attackers in phishing campaigns to trick users.

Most of the vulnerabilities were found on websites for candidates with smaller campaigns, and highlight a weakness in the election process. While states receive money from the Congress to shore up the security of their voting systems and processes, campaigns themselves do not. They have to rely on political parties for funding, and may not always be able to afford top cybersecurity expertise on tight budgets.

It's an issue that the political system needs to address, according to Joseph Carson, chief security scientist at privileged account management (PAM) solutions vendor Thycotic.

"There are many areas in which the elections are vulnerable to hacking," Carson told Security Now in an email, noting the demonstrations of how easily voting systems can be compromised. "The bigger issue is that each election campaign is expected to protect and secure their own systems. This means that inexperienced, temporary staff [is] brought in to protect sensitive data that includes voter information and campaign strategies. This allows for attackers to easily target election campaigns, sometimes gaining access to email accounts or the entire voter database."

The threat of cyberattacks against many aspects of the midterms elections is not a surprise. The U.S. intelligence community has said there is no doubt that Russian hackers interfered with the 2016 presidential elections. The heads of federal law enforcement agencies -- including the FBI, the CIA and the Department of Homeland Security -- have said in recent months that it's clear that Russia and other bad actors intend to do the same in the upcoming elections.

Dan Coats, director of national intelligence, said during a congressional hearing in July that the "warning lights are blinking red again" and that the "digital infrastructure that serves this country is literally under attack." (See DOJ Will Now Alert US Public to Foreign Interference, Attacks.)

His statement comes even after investigators with the special counsel investigation under ex-FBI Director Robert Mueller last month indicted 12 Russian nationals for hacking into the networks of the Democratic National Committee and Democratic presidential candidate Hillary Clinton in 2016. (See 12 Russian Nationals Indicted in 2016 Hacking of DNC, Clinton Campaign.)

There already have been instances of campaigns seeing attempted hacks. Microsoft officials said the company was able to identify three congressional campaigns that were under attack and to block the hacking attempts. One of those candidates was Sen. Claire McCaskill, D-MO, who is running for re-election. Rolling Stone reported that the FBI is investigating a number of cyberattacks against a Democratic candidate running against Rep. Dana Rohrabacher, R-CA, a vocal supporter of Russia and its president, Vladimir Putin. Democratic candidates in a congressional race in Minnesota also reported Russian interest in their campaigns.

A key challenge in protecting the election system against cyberattacks is the wide range of areas that are vulnerable. There are not only federal contests looming, but also state and local races, voting machines and databases. There's also social media and other forms of communications. All of these are avenues for threat actors to follow to undermine the integrity of US elections. The need for expertise at all levels is great, according to cybersecurity experts.

"To protect the election process against hacks, security professionals are direly needed," Sanjay Kaira, cofounder and chief product officer at cloud security solutions provider Lacework, told Security Now in an email. "The rigorous controls, monitoring and best practices applied to highly targeted industries such as financial services or energy should be applied to the electoral process, and will help us move forward with an effective game plan that is devoid of biased influences that might come from political debate. Security professionals who are steeped in this mindset can give us the best opportunity to be successful at that, especially as the process gets modernized on new cloud technologies."

Rishi Bhargava, cofounder of cybersecurity firm Demisto, agreed, telling Security Now that the "rate of advancement in, and compromise of, the technical infrastructure surrounding elections has grown faster than the rate of awareness and knowledge that government officials need to stop these attacks."

David Ginsburg, vice president of marketing at cybersecurity vendor Cavirin, said voting machines get a lot of attention, but there are other risks that need to be addressed.

"We saw, and continue to see, manipulation of social networks, news sites, and even the integrity of data stored in the cloud," Ginsburg told Security Now. "This last threat, where the very accuracy of critical records comes into question, is sometimes overlooked. I'd put out a challenge, in the same way that we prepared for Y2K and then GDPR, for organizations that have anything to do with the election process or data, to put in place the necessary processes and technology. An E-80, if you may."

Related posts:

— Jeffrey Burt is a long-time tech journalist whose work has appeared in such publications as eWEEK, The Next Platform and Channelnomics.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3903
PUBLISHED: 2021-10-27
vim is vulnerable to Heap-based Buffer Overflow
CVE-2021-41191
PUBLISHED: 2021-10-27
Roblox-Purchasing-Hub is an open source Roblox product purchasing hub. A security risk in versions 1.0.1 and prior allowed people who have someone's API URL to get product files without an API key. This issue is fixed in version 1.0.2. As a workaround, add `@require_apikey` in `BOT/lib/cogs/website....
CVE-2021-1115
PUBLISHED: 2021-10-27
NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for private IOCTLs, where an attacker with local unprivileged system access may cause a NULL pointer dereference, which may lead to denial of service in a component beyond the vulnerable co...
CVE-2021-1116
PUBLISHED: 2021-10-27
NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys), where a NULL pointer dereference in the kernel, created within user mode code, may lead to a denial of service in the form of a system crash.
CVE-2021-1117
PUBLISHED: 2021-10-27
Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where an attacker through specific configuration and with local unprivileged system access may cause improper input validation, which may lead to denial of service.