Election Day Cybershenanigans Highlight Need to Shore Up Security


Hackers last week launched DDoS attacks against both presidential candidates' campaign websites. The attacks were routed through HTTP Layer 7 of the OSI protocol.

There were at least four 30-second attacks reported.

"The websites were not penetrated by a cyberintrusion," said John Costello, a senior analyst at Flashpoint.

"They were attacked using their publicly available Web addresses and associated IPs," he told the E-Commerce Times.

The attackers were unsophisticated hackers and not a nation-state, Flashpoint said.

The attacks were not linked to the cyberintrusions on Democratic Party systems or the email breach affecting John Podesta, chairman of Hillary Clinton's presidential campaign. The United States has accused Russia of perpetrating those attacks.

The Mirai botnet was responsible for the campaign website hacks, Flashpoint said. It is known to have been behind other recent DDoS attacks that took advantage of devices connected to the Internet of Things.

The botnet's source code has been released, fragmenting it into smaller, competing botnets, Costello noted, which "has significantly lowered the impact, efficacy, and damage of subsequent attacks. No single attacker has been able to gain control of enough devices to replicate the scale of attacks we saw against Dyn DNS, OVH, or Krebs on Security."

The attacks "demonstrated that script kiddies and other basic threats were able to target and potentially disrupt portions of candidates' websites without the respective campaigns noticing the attacks," said James Scott, senior fellow at the Institute for Critical Infrastructure Technology.

That occurred "because both the sites lacked appropriate mitigation precautions," he told the E-Commerce Times.

"A greater prioritization and focus on cybersecurity and cyberhygiene is needed to secure the electoral process and America's critical infrastructure," Scott remarked.

Taking down websites is penny-ante stuff, and "I'd make a distinction between attacks that disrupt the availability of websites and attacks that raise questions regarding the integrity of the U.S. election process," said Rick Holland, VP of strategy at Digital Shadows.

The real danger of attacks like those against the Democratic National Committee, which resulted in emails being stolen and leaked, is that they "raise suspicions in the electorate that will have much longer-term implications for day-to-day governance of the nation," he told the E-Commerce Times.

Such leaks "fuel the opposition, which could launch investigations and inquiries that make it difficult for Washington to function."

Federal, state and local government officials could ensure the security of elections by implementing such measures as security websites and complex credential requirements, ICIT's Scott suggested.

Federal agencies may offer assistance to candidates on request, but "it is the responsibility of candidates to excel the minimum required security controls," he said.

Candidates and party officials also could set mandatory security guidelines in line with federal agency recommendations and trusted cybersecurity standards and guidelines, Scott added.

Data "is a liability and needs to be handled as such," Digital Shadows' Holland warned. Government officials "need to implement data governance policies that address data retention."

"Powerful malware such as Mirai will continue to develop and evolve," Scott said. "Every day, these sophisticated [types of] malware become more accessible, and easier to acquire and utilize by less-sophisticated threat actors."

The federal government should designate the election systems themselves as critical infrastructure, Holland maintained. That would not be sufficient to eliminate the threat, but it would accelerate resiliency.

Richard Adhikari has written about high-tech for leading industry publications since the 1990s and wonders where it's all leading to. Will implanted RFID chips in humans be the Mark of the Beast? Will nanotech solve our coming food crisis? Does Sturgeon's Law still hold true? You can connect with Richard on Google+.

0 Comment

Leave a Reply

Captcha image


  • 5300c769af79e

    Reporting on Risk to the Board - A CISO's Approach

    Download In this article, we'll take a look at why the reporting on vulns closed--rather than taking a more strategic view of risk approach fails--and how it may be possible to swap out the "numbers game" with a more comprehensive view of risk.Ed explains conceptually how you can do that.
  • 5300c769af79e

    Here's Where to Watch Moto's Announcement Tomorrow

    We will be present in San Francisco for tomorrow’s Lenovo Tech World conference, which kicks off at 10am Pacific time.Sent to inboxes this morning, an email declares fans won’t want to miss Moto’s announcement, with the company claiming that tomorrow is a “big day for Moto.
  • 5300c769af79e

    IDG's New Pipeline Activator Aims to Get Sales Timing Right

    The company has more than 700,000 line of business and IT decision makers from the Forbes Global 2000 in its database.For example, a cloud solution provider can use Pipeline Activator to identify sales prospects and track their intent to purchase, so it can target sales and marketing activity more effectively at the best time to increase the chance of closing a sale.
  • 5300c769af79e

    Managing and Securing Enterprise Mobility

    Download It is becoming increasingly difficult to remember a time when companies and individual workers did not rely on mobile devices such as smartphones, tablets and laptops.Among these are managing the variety of devices and operating systems, and making apps and updates easily available to users.