Cyber-Attacks On UK Political Parties

A British political party will be the victim of a hack similar to those suffered by the Clinton and Macron presidential campaigns, a leading security researcher has warned. 

James Norton, a former official at the US Department of Homeland Security and head of the security consultancy Play-Action Strategies, said: “It wouldn’t surprise me if there’s already been some emails stolen … it would surprise me if it didn’t happen.”

It was a matter of when, not if, a hack would take place, he said. “Campaigns are a treasure trove, especially newer campaigns where you’re trying to understand the dynamics … I would think they would be targets, if they’re not already, in terms of trying to understand what their politics would be. Even Theresa May is largely an unknown.”

The EU’s head of information security has previously advised that the risk of hacking attacks greatly increases following the dissolution of parliament. Dr Udo Helmbrecht cautioned candidates that any one of the thousands of political campaigns active over the election period could serve as a bulkhead from which to penetrate deeper into party machinery.

“If you look from a politician’s perspective or from a party’s perspective, you have different areas of concern,” Helmbrecht told the Guardian. “In Germany, the Bundestag was hacked. This was not a weakness in the classic infrastructure – it was naive treatment by parliamentarians.”

Dick O’Brien, a threat researcher at the security company Symantec, agreed that a hack like that on Macron “may well happen again”. Even a snap election left plenty of time for an interested party to take action, he added. 

“The nature of elections means that politicians are ripe for attack. Governments are well secured, political parties not so much. And then a campaign expands from a core party into a much more ad hoc organisations. That’s where you see people using resources, cloud services, with email, that they really wouldn’t use in a more permanent organisation. That really opens up the surface for an attack.”

Unlike a French or US presidential campaign, British elections are much more fragmented, with more local power and smaller national oversight. From a security standpoint, that fragmentation can be a blessing and a curse: it offers compartmentalisation, ensuring that low-level breaches do not leak data for the entire campaign, but also leads to a marked increase in the number of potential targets for an external attacker.

None of the national campaigns would comment on security matters, but all are believed to take advice from GCHQ on protecting their networks. Sitting MPs are helped by the Parliamentary Digital Service until parliament dissolves. But for parliamentary candidates who weren’t MPs before the election was called, the amount of support differs wildly.

Ryan Kalember, head of cybersecurity strategy at Proofpoint, backed Norton’s warning. “Campaigns in elections around the world must ensure that they have implemented proper defences around phishing, including email security and multi-factor authentication, ideally via hardware keys,” he said.

“Our research has shown that attackers are relentlessly working to exploit the email communication channel regardless of their level of sophistication, motivation, or country. Email is their top target because it provides the easiest opening into an organisation, one of the easiest routes for exporting confidential information and for political purposes, email content itself offers an inside look at strategies, motivations and personalities.”

The fragmentation of constituency campaigns does offer security benefits as well, however. Campaigns’ access to data is limited to that relevant to their local area. Similarly, the vast array of different services used by various campaigns makes it harder to use a one-size-fits-all attack. A fake Gmail login page, for instance, will be less able to trick a campaign run from a Hotmail email address. 

Political parties are using social media platforms more than ever - and much of their output is finely targeted and difficult to track.The Conservatives seem to be flooding Facebook users in marginal constituencies with anti-Jeremy Corbyn attack adverts, designed to draw away the Labour faithful. Labour are also using Facebook advertising, but their messages are less focused on leaders and their personalities. 

Guardian:      BBC:

You Might Aslo Read:

Algorithms: An Unseen Influence On The UK Election:

Germany May Go Offensive After Russian Cyber Attacks:

Russian Hackers Sow Disinformation Via Leaks:

Hackers Came, But the French Were Prepared:

 

 

« N. Korea Fires Another Ballistic Missile
China Postpones Implementing New Cybersecurity Law »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Reblaze Technologies

Reblaze Technologies

Reblaze provides the world’s best security technologies in a cloud-based website security platform.

SentryBay

SentryBay

SentryBay is a real-time data security company developing technology for PC, mobile, the cloud and IoT.

Kapalya

Kapalya

Kapalya empowers businesses and their employees to securely store sensitive files at-rest and in-transit across multiple platforms through a user-friendly desktop and mobile application.

Root9B (R9B)

Root9B (R9B)

R9B offers advanced cybersecurity products, services, and training to enhance the way organizations protect their networks.

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation (EIF) of Armenia is one of the largest technology business incubators and IT development agencies in the region.

Aries Security

Aries Security

Aries Security provides a premiere cyber training range and skills assessment suite and develops content for all levels of ability.

BCN Group

BCN Group

BCN Group is an agile IT solutions provider. We are experts in delivering and managing business-critical technology solutions.

Keysight Technologies

Keysight Technologies

Keysight is dedicated to providing tomorrow’s test technologies today, enabling our customers to connect and secure the world with their innovations.

Prism Infosec

Prism Infosec

Prism Infosec is an award-winning independent cyber security consultancy, CREST STAR, NCSC CHECK member, CAA ASSURE audit provider and PCI Qualified Security Assessor.

Flexxon

Flexxon

Flexxon is the industry leader to develop NAND flash storage devices. Our key focus is to innovate memory devices ensuring data security and reliability.

CodeLock

CodeLock

Codelock is a patent-pending solution that continuously provides software security at the code level, while providing advanced management insights with performance metrics and data analytics.

XpertDPO

XpertDPO

XpertDPO provides data security, governance, risk and compliance, GDPR and ISO consultancy to public and private sector organisations.

Blockfence

Blockfence

Blockfence are a seasoned crew versed in enterprise-grade cybersecurity and crypto, on a mission to collaboratively shape the future of Web3 security.

Benchmark IT Services (BITS)

Benchmark IT Services (BITS)

BITS is a leading cyber security company in Australia. Our certified professionals work with you to keep your data assets safe and secure.

Doherty Associates

Doherty Associates

Drawing on our deep industry knowledge and business insight, Doherty deliver intelligent IT solutions and services that help people work more securely, more productively and more creatively.

Swick Technologies (SWICKtech)

Swick Technologies (SWICKtech)

SWICKtech offer IT managed services to increase IT security, stability, and performance for your organization.