2024 US Presidential Election Cyber Intrusion: Part 5 - Cybercrime Threats

Part 5 of a series that will analyze critical cyber security aspects during the countdown  to the 2024 US Presidential Election, beginning with Nation State Threat Actors, then Covert Influence OperationsHactivism and Cybercrime.


Do Organized Cybercrime Groups Have The Ability To Compromise the 2024 US Presidential Election?

Although it is unlikely that financially motivated cybercriminals would have a specific interest in the 2024 US presidential election itself, ransomware, and related extortion efforts, target victims for their potential to pay a ransom.

Ransomware

With a substantial quantity of sensitive data surrounding the election available for compromise, we have assessed that this will increase the likelihood for the election to be targeted by a cybercrime event. Ransomware efforts will provide cybercriminals with a low-cost, high-reward attack vector that could be leveraged to both gain access to the network of US election offices, as well as actively disrupting the election proceedings by encrypting data.

Phishing

Cybercriminals will likely capitalise on the run-up to November 5th by engaging in malicious social engineering attempts involving the delivery of US presidential election-themed phishing emails, SMS, and social media messages to prey on the US public’s uncertainty surrounding the election. They will try to entice them to interact with malicious links that will likely be disguised by URLs purporting to divert victims to seemingly legitimate election information and voter registration web pages.

Stealware

Cybercrime targeting of the election will also likely extend to involve the deployment of stealware variants.

This assessment has been made based on a recent trend of threat actors leveraging stealware with attempts to steal voter registration records and credentials from election systems with the actors also leaking these data sets.

These infostealer campaigns have obtained this data by intercepting login forms on Internet browsers or by accessing password storage on compromised devices. Stealware actors likely leak this data to undermine the trust in US election systems and create the perception that they are vulnerable and untrustworthy.

TO BE CONCLUDED

Craig Watt is a Threat Intelligence Consultant at Quorum Cyber specializing in strategic and geopolitical intelligence.

Image: Andrii Shyp

You Might Also Read:

2024 US Presidential Election: Nation State Cyber Threats:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« What Industrial Organisations Can Learn From Nation-State Cyber Attacks
Cyber Security Teams Feel The Pressure  »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

authen2cate

authen2cate

Authen2cate offers a simple way to provide application access with our Identity and Access Management (IAM) solutions for enterprise, small business, and individual customers alike.

Link11 GmbH

Link11 GmbH

Link11 provides DDoS protection solutions to protect websites and complete server infrastructures from DDoS attacks.

C3IA Solutions

C3IA Solutions

C3IA Solutions is an NCSC-certified Cyber Consultancy providing assured, tailored advice to keep your information secure and data protected.

Acumin Recruitment

Acumin Recruitment

Acumin is an internationally established Cyber Security recruitment specialist.

Oxygen Forensics

Oxygen Forensics

Oxygen Forensics offer the most advanced forensic data examination tools for mobile devices and cloud services.

INSUREtrust

INSUREtrust

INSUREtrust is a pioneer in the industry, inventing the concept of cyber insurance.

Device Authority

Device Authority

Device Authority specialises in security automation for the Internet of Things (IoT).

Police Digital Security Centre (PDSC)

Police Digital Security Centre (PDSC)

PDSC is a not-for-profit organisation, owned by the police, that works across the UK in partnership with industry, government, academia and law enforcement.

Secure-IC

Secure-IC

Secure-IC provide end-to-end, best-of-breed security expertise, solutions, and hardware & software technologies, for embedded systems and connected objects.

SightGain

SightGain

SightGain is the only integrated risk management solution focused on cybersecurity readiness using real-world attack simulations in your live environment.

Bloc Ventures

Bloc Ventures

Bloc Ventures is an investment company providing long-term, ‘patient’ equity capital to early stage unquoted deep technology companies.

Phished

Phished

Phished is an AI-driven platform that focuses on the human side of cybersecurity. By combining fully automated training software with personalised, realistic simulations of cyberattacks.

Singtel Innov8

Singtel Innov8

Singtel Innov8, the venture capital arm of the Singtel Group, invests in and partners with innovative technology start-ups globally.

Cloud Seguro

Cloud Seguro

Cloud Seguro are leaders in the development of cloud solutions, Ethical Hacking, Privacy and Information Security.

CorePLUS Technologies

CorePLUS Technologies

CorePlus solutions are designed to empower organizations with the tools they need to ensure the utmost protection for their assets, people, and information.

Siguria Kibernetike (Cyber Security)

Siguria Kibernetike (Cyber Security)

Siguria Kibernetike is a company based in Tirana that offers full service in the field of cyber and physical security.