FBI Believes Russia Hacked Florida Elections

The FBI believes that Russian hackers were able to breach “at least one” Florida county government through a spearphishing campaign targeting local election officials, according to special counsel Robert Mueller’s report.  

Mueller’s team “did not independent verify that belief,” the report said, because DHS and the FBI were already investigating the attempted intrusions into election offices and voting technology companies.

Last August, then-Florida Senator Bill Nelson faced criticisms for saying cryptically that the Russians had accessed his state’s voter data. The Russian hackers sent spearphishing emails to more than 120 email accounts operated by Florida county election officials, according to the redacted report.

The Report says that that GRU (Russia’s Intelligence Agency) sent spearphishing emails to over 120 email accounts used by Florida’s officials whom were responsible for the 2016 US election admin.

The report offers specific figures for several previously revealed elements of the hacking campaign. For example, the Russian hackers compromised 29 different computers at the Democratic Congressional Campaign Committee and stole more than 70 gigabytes of files from the group’s shared file server.

The hackers also hacked more than 30 Democratic National Committee computers in less than two months, including the committee’s mail server and file server. And they stole approximately 300 gigabytes from a DNC cloud-based service.

While Mueller’s indictment of 12 Russian hackers previously revealed that they accessed the DNC by pivoting from the DCCC, the report reveals that they did so through a virtual private network, or VPN, connection, set up so that DCCC employees could access DNC resources.

Politico

You Might Also Read: 

Three In Five Politicians’ Websites Don’t Use Cyber Security:

Schoolboy Hacked Mock Florida Election Site In 10 Minutes:

 

« AOC Gives Up On Facebook
Hackers Delight: Poor Password Security »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

RedTeam Security

RedTeam Security

RedTeam Security is a provider of Penetration Testing, Social Engineering, Red Teaming and Red Team Training services.

Forensic Control

Forensic Control

Forensic Control specialise in providing simple & straightforward Cyber Security to organisations, helping them assess, prevent and respond to cyber threats.

Allegro Software

Allegro Software

Allegro provide secure software for the Internet of Things.

National Cybersecurity and Communications Integration Center (NCCIC) - USA

National Cybersecurity and Communications Integration Center (NCCIC) - USA

NCCIC is a cyber situational awareness, incident response, and management center for the US Government, intelligence community, and law enforcement.

ESTsecurity

ESTsecurity

ESTsecurity is a leading company in cyber security providing intelligent security solutions to make world more secure.

Hut Six Security

Hut Six Security

Train, test and track your Information Security culture through information security awareness training and customised phishing simulation campaigns.

Krypsis

Krypsis

Krypsys is an information security company with a focus on helping you defend your information and data against emerging security threats.

Dashlane

Dashlane

Dashlane puts all your passwords, payments, and personal info in one place that only you control. So you can use them instantly. Securely. Exactly when you need them.

DoControl

DoControl

DoControl gives organizations the automated, self-service tools they need for SaaS applications data access monitoring, orchestration, and remediation.

Conseal Security

Conseal Security

Mobile app security testing done well. Conseal Security are specialists in mobile app penetration testing. Our expert-led security analysis quickly finds security vulnerabilities in your apps.

Intel 471

Intel 471

Intel 471 provides adversary and malware intelligence for leading intelligence, security and fraud teams.

Port443

Port443

Port443 specialises in providing Security Orchestration, Automation and Remediation (SOAR) "as a service".

Potech

Potech

Potech provides masterful services in Information & Technology and Cybersecurity to multiple markets across the world.

DeepSurface Security

DeepSurface Security

DeepSurface is the first risk-based vulnerability management platform that allows cybersecurity teams to automate the process of analyzing and prioritizing vulnerabilities.