Microsoft: Three Hacking Attempts Made on Midterm ElectionsMicrosoft: Three Hacking Attempts Made on Midterm Elections
Microsoft detected data indicating three congressional candidates were being hit with cyberattacks - the first to target midterm elections.
July 21, 2018
The first hacking attempts have been made on the 2018 midterm elections, reports Microsoft, which detected phishing attacks against three congressional candidates and helped block them.
Microsoft's Tom Burt, vice president for security and trust, discussed the attacks at this year's Aspen Security Forum. Earlier this year, experts found a fake Microsoft domain had been registered as a landing page for phishing campaigns against candidates. He did not name the candidates and confirmed the attacks did not succeed against any of them.
"They were all people who, because of their positions, might have been interesting targets from an espionage standpoint as well as an election disruption standpoint," Burt explained in a panel discussion on election security, as reported by NBC News.
Security researchers, at Microsoft and across the industry, agree the cyber activity preceding this year's midterm elections is not the same level of activity detected ahead of the 2016 presidential election. Attackers are not targeting academia or think tanks, Burt said.
Read more details here.
Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.
About the Author(s)
You May Also Like
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What's In Your Cloud?Nov 30, 2023
Everything You Need to Know About DNS AttacksNov 30, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Everything You Need to Know About DNS Attacks
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks