CISA Reports No Significant Attacks On US Elections

Following early warnings of the threat of interference from malicious foreign hackers in advance of this week's US House and Senate elections the US election processes continues to be a target of interest for malicious actors. 

Now, the Cybersecurity and Infrastructure Security Agency (CISA) has confirmed there were a number of cyber attacks on State and local election websites during the 2022 midterms. 

Reassuringly, however, those early warnings have been heeded by the local-level government agencies responsible for running the elections and no significant harm has been identified. 

“Election systems that house voter registration information or manage non-voting election processes continue to be a target of interest for malicious threat actors,” says CISA's report. However, there has been no specific or credible threat to disrupt election infrastructure or Election Day operations. “We’ve seen no activity that should cause anyone to question the security, integrity or resilience of our election infrastructure,” said a senior CISA official said. 

In Mississippi, the secretary of state’s website, which serves as a digital resource for election-related information and is not involved in vote tabulations, was temporarily inaccessible after experiencing “an abnormally large increase in traffic volume due to DDoS activity,” the office said in a statement. These were attempts to disrupt access to websites and servers by overwhelming them with manipulated online traffic, often through the use of bots or a network of hijacked computers. 

“We want to be extremely clear and reassure Mississippians our election system is secure and has not been compromised,” the Mississippi secretary of state’s office confirmed. 

CISA worked closely with state and local jurisdictions to help officials detect and stop cyber-attacks and threats made against election management and 14 states used cyber teams to help secure voting systems. This cyber security work has been successful for this election, as CISA has said it was only “checking a handful” of jurisdictions.

CISA:    NextGov:      DefenseOne:    Cyberwire:       The Record

You Might Also Read: 

The Personal Data Being Used To Get Your Vote:

 

« The Reality Check For Small & Medium Businesses
Why Are Businesses Still Falling Victim To Ransomware? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Secure Identity Alliance (SIA)

Secure Identity Alliance (SIA)

The Secure Identity Alliance is dedicated to supporting sustainable worldwide economic growth and prosperity through the development of trusted digital identities and the adoption of secure eServices.

DeviceLock

DeviceLock

DeviceLock is a leading provider of endpoint device/port control and data leak prevention software.

CyberSeek

CyberSeek

CyberSeek provides detailed, actionable data about supply and demand in the cybersecurity job market.

adaware

adaware

adaware is an award-winning security and privacy software provider, empowering users to connect with confidence.

DeviceAssure

DeviceAssure

DeviceAssure enables organizations to reliably identify counterfeit and non-standard devices with a real-time check on a device's authenticity.

Ecubel

Ecubel

Ecubel is the market leader in Belgium in buying and selling used IT harware guaranteed by a certified data erasure.

GitGuardian

GitGuardian

Enable developers, ops, security and compliance professionals to enforce security policies across public and private code, and other data sources as well

Infosec Partners

Infosec Partners

Whether you’re looking for complete managed security or an on-call expert advisor, we offer a range of managed security services to complement your internal team or primary outsource partner.

iHLS Startups Accelerator

iHLS Startups Accelerator

iHLS Accelerator is the first startup accelerator in the world in the security and homeland security field.

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

GCSCC's work is focused on developing a framework for understanding what works, what doesn’t work and why – across all areas of cybersecurity capacity.

Neovera

Neovera

Neovera is a trusted provider of managed services including cyber security and enterprise cloud solutions, committed to delivering results through the innovative use of scalable enterprise-grade tech.

Cygenta

Cygenta

Cygenta brings a new approach to cybersecurity. We understand that true security means having digital, human and physical security working in harmony.

Winslow Technology Group (WTG)

Winslow Technology Group (WTG)

Winslow Technology Group is a leading provider of IT Solutions, Managed Services, and Cybersecurity Services dedicated to providing exceptional business outcomes for our customers since 2003.

Precision Cybertechnologies & Digital Solutions (Precision-Cyber)

Precision Cybertechnologies & Digital Solutions (Precision-Cyber)

Precision-Cyber was founded on the philosophy of state-of-the-art cybersecurity and digital solutions. Our guiding principle is simply that we will provide and secure all your digital needs.

SOC-E

SOC-E

SOC-E is a leading technology provider for high-availability and deterministic networking, sub-microsecond synchronization and cybersecurity solutions for critical sectors.

Instil Software

Instil Software

Instil helps technology brands transform, innovate and disrupt their markets with category-defining software products that challenge us to think, feel and act in new ways.