Russia's US Election Hacks More Persistent Than First Thought

Voting systems across the US were far more susceptible to Russian hacking efforts during last year's presidential election than was previously known, according to evidence uncovered during the federal government's investigation and a leaked classified intelligence report.

A wave of attacks in the summer and fall of 2016 targeted and accessed a campaign finance database and software that poll workers were supposed to use on Election Day, Bloomberg reports, citing people with knowledge of the government's investigation into the hacking.

The FBI previously confirmed that hackers breached voter registration databases in Illinois and Arizona, but the investigation has since determined that voting systems in 39 states were compromised, according to Bloomberg. 
The Obama administration complained about the hacking to Russian officials via rarely used diplomatic channels, including a "red phone," before ultimately sanctioning Russia in December for its involvement in the hacks.

A classified report from the National Security Agency that The Intercept published recently provides some insight into the investigation. "Russian intelligence obtained and maintained access to elements of multiple US state or local electoral boards," the NSA wrote, although "the types of systems we observed Russian actors targeting or compromising are not involved in vote tallying."

Russian president Vladimir Putin has repeatedly denied the hacking accusations, although he recently appeared to suggest that Democratic presidential candidate Hillary Clinton may have prompted private Russian hackers to attempt to compromise the US election of their own accord.

"If they are patriotically minded, they start making their contributions, which are right, from their point of view, to the fight against those who say bad things about Russia," Putin said of the hackers during a recent TV interview.

Entrepreneur

You Might Also Read:

Deterrence & Cyber Attacks On The US Electoral System:

Russia Will Try To Hack German Elections:

Hacking The Vote: Russia Wins, America Loses:

 

« Google Launches GDPR Compliance Site
GDPR - 10 Things You Must Know – »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Hotlava Systems

Hotlava Systems

HotLava network adapters enable today's powerful servers and workstations to deliver more productivity by reducing congestion at the network interface.

Cysec Resource Co (CRC)

Cysec Resource Co (CRC)

We offer expertise in information and cyber security, sourcing individuals and teams who provide information security expertise to the public and private sector.

LEXFO

LEXFO

LEXFO specializes in the security of information systems, assisting clients in protecting information assets using an offensive and innovative approach.

Netwrix

Netwrix

Netwrix empowers information security and governance professionals to identify and protect sensitive data to reduce the risk of a breach.

Gemserv

Gemserv

Gemserv is a specialist market design, governance and assurance services consultancy.

sayTEC

sayTEC

sayTEC's mission is to develop and deliver next-generation products and services in encrypted data and voice transmission.

State e-Government Agency (SEGA) - Bulgaria

State e-Government Agency (SEGA) - Bulgaria

The State e-Government Agency (SEGA) is responsible for matters relating to electronic governance in Bulgaria.

Cymptom

Cymptom

At Cymptom our purpose is to enable security managers to see at a glance all urgently risky gaps  in their organizations’ security posture at any given moment.

Global Cybersecurity Association (GCA)

Global Cybersecurity Association (GCA)

GCA’s Symposium and conferences featuring global thought leaders and CISOs provide a global best practice perspective on cybersecurity.

ACI Learning

ACI Learning

ACI Learning - Training tomorrow’s industry leaders with formats for all types of learners in Audit, Cybersecurity, and IT.

Aembit

Aembit

Aembit is the Identity Platform that lets DevOps and Security manage, enforce, and audit access between federated workloads

JanBask Training

JanBask Training

JanBask Training is a dynamic, highly professional, global online training provider committed to propelling the next generation of technology learners with a whole new way of training experience.

Cysurance

Cysurance

Cysurance is a next-generation risk mitigation company that insures, warranties and certifies security solutions.

Oz Forensics

Oz Forensics

Oz Forensics is a global leader in preventing biometric and deepfake fraud. It is a developer of facial Liveness detection for Antifraud Biometric Software with high expertise in the Fintech market.

Lasso Security

Lasso Security

Lasso Security is a pioneer cybersecurity company ensuring comprehensive protection for businesses leveraging generative AI and other large language model technologies.

Manifest

Manifest

Manifest is a cybersecurity company dedicated to helping enterprises secure their software supply chains.