Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:30 AM
Gary Golomb
Gary Golomb
Connect Directly
E-Mail vvv

Report: 2020 Presidential Campaigns Still Vulnerable to Web Attacks

Nine out of 12 Democratic candidates have yet to enable DNSSEC, a simple set of extensions that stops most targeted domain-based attacks.

While the Mueller report showed that Russian threat actors hacked the DNC and attempted to influence the 2016 election, very few of the presidential candidates for 2020 seem to have taken the basic steps needed to defend against attacks like the ones that affected the Clinton campaign.

Based on our research, we found that many of the candidates are struggling with one particular issue many businesses face — securing their web properties from being hijacked by malicious actors.

After reading a CNN article on how a majority of candidates were failing to use DMARC to ensure the fidelity of email messages, we conducted research to analyze the web security of the 12 Democratic candidates that participated in the most recent debate and the Trump re-election campaign to see what steps they were taking against malicious attacks.

What we found was dismaying: Nine out of the 12 Democratic candidates and the Trump re-election campaign have yet to enable DNSSEC — a simple set of extensions on top of DNS that stops most targeted domain-based attacks (you can read the full report here).

While the candidates are failing basic security for their web properties, unfortunately, we find this all too often with enterprises as well.

Candidates' Websites Put Staff and Supporters at Risk
Because of the failure to set up DNSSEC, attackers can easily exploit these candidates' website through DNS hijacking or DNS cache poisoning attacks, which can have serious consequences. Just like a business, unprotected web properties put customers, partners, and employees at significant risk.

This is a tactic that is widely employed by attackers. So much so that earlier this year, the DHS recently issued Emergency Directive 19-01 after DNS hijack attacks from Iran affected six federal agencies. These same types of attacks have been used to intercept email from all major providers, including Gmail, Yahoo, and Office365.

DNS cache poisoning allows an attacker to take legitimate traffic intended for one website, for example, https://peteforamerica.com/issues/, and redirect each of those visitors to malicious servers set up to spoof the site and steal information — usernames, passwords, credit cards, personal information, or potential plant fake information, and more.

Here are the three most common ways attackers can weaponize this weakness and use a business's — or presidential candidate's — website to target visitors:

Hyper-targeted phishing campaigns: Spoofing the DNS means that you'll never know if you're visiting a website that is malicious or belongs to the candidate you support. This can result in malware being implanted on an endpoint, or simply having all of the information — usernames, passwords, credit information, and more — stolen. In our scenario above, the domain name in the victim's browser will still be peteforamerica.com, not some typosquat, so you can't really blame the victim.

As attackers gather this data, they can then launch even more targeted phishing campaigns at staff and supporters. As we saw with the Clinton campaign in 2016, it takes one person to click a bad link to put everyone's cybersecurity at risk.

Stealing data from candidate donors and supporters: This is the most common outcome of DNS cache poisoning attacks: setting up a replica website that looks just like the candidate's to trick website visitors. Cyberattackers do this for multiple reasons — but often to steal your data and information. For instance, Kamala Harris highlights how easy it is for supporters to donate to her campaign right on the front page — and every page: https://kamalaharris.org/

Without DNSSEC enabled, hackers can easily take advantage of this to build a replica site, "steal" all traffic, and identify donors and capture financial information.  

Disseminating fake information or implanting spyware, malware, and keyloggers on supporters' devices: Another popular tactic of attackers is to use DNS cache poisoning attacks to create mirror websites that distort the position of the candidate or organization and/or implant all kinds of nasty things on the unsuspecting visitor's device (phone, laptop, iPad, etc.). This could also be used to gain a foothold in one of the candidate's networks.
Perhaps just as important, a collateral finding of this research assessed the security response capabilities of the candidates, or the lack thereof.
We reached out to the candidates and the parties multiple times about these vulnerabilities and the simple remedial steps they should take. Only Senator Warren's campaign employed DNSSEC from the start, and only Beto O'Rourke's campaign responded and changed the security setting after repeated disclosures.

Worse, none of the campaigns even had a dedicated address listed for reporting security issues and concerns.

This was surprising, because fixing this vulnerability is a rather simple process in the scheme of things. All it takes is a few minutes to set up and be configured with your domain host. For instance, Cloudflare makes this possible in a few simple clicks.

If we're going to take a leading role in global cybersecurity, we should start by learning the lessons of 2016. As this research shows, right now we're failing on both sides of the aisle and across both parties. Don't let your business follow suit.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "Glitching: The Hardware Attack That Can Disrupt Secure Software."

Gary Golomb has nearly two decades of experience in threat analysis and has led investigations and containment efforts in a number of notable cases. With this experience — and a track record of researching and teaching state-of-the art detection and response ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.