Russia's US Election Hacks More Persistent Than First Thought

Voting systems across the US were far more susceptible to Russian hacking efforts during last year's presidential election than was previously known, according to evidence uncovered during the federal government's investigation and a leaked classified intelligence report.

A wave of attacks in the summer and fall of 2016 targeted and accessed a campaign finance database and software that poll workers were supposed to use on Election Day, Bloomberg reports, citing people with knowledge of the government's investigation into the hacking.

The FBI previously confirmed that hackers breached voter registration databases in Illinois and Arizona, but the investigation has since determined that voting systems in 39 states were compromised, according to Bloomberg. 
The Obama administration complained about the hacking to Russian officials via rarely used diplomatic channels, including a "red phone," before ultimately sanctioning Russia in December for its involvement in the hacks.

A classified report from the National Security Agency that The Intercept published recently provides some insight into the investigation. "Russian intelligence obtained and maintained access to elements of multiple US state or local electoral boards," the NSA wrote, although "the types of systems we observed Russian actors targeting or compromising are not involved in vote tallying."

Russian president Vladimir Putin has repeatedly denied the hacking accusations, although he recently appeared to suggest that Democratic presidential candidate Hillary Clinton may have prompted private Russian hackers to attempt to compromise the US election of their own accord.

"If they are patriotically minded, they start making their contributions, which are right, from their point of view, to the fight against those who say bad things about Russia," Putin said of the hackers during a recent TV interview.

Entrepreneur

You Might Also Read:

Deterrence & Cyber Attacks On The US Electoral System:

Russia Will Try To Hack German Elections:

Hacking The Vote: Russia Wins, America Loses:

 

« Google Launches GDPR Compliance Site
GDPR - 10 Things You Must Know – »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MyCERT

MyCERT

MyCERT is the National Computer Emergency Response Team of Malaysia.

International Computer Science Institute (ICSI)

International Computer Science Institute (ICSI)

ICSI is a leading independent, nonprofit center for research in computer science. Research areas include network security and privacy.

Lynx Technology Partners

Lynx Technology Partners

Lynx Technology Partners is a full service, full life-cycle risk-based security consulting firm.

Exein

Exein

Exein are on a mission to build the world’s first ecosystem for firmware security so that all different types of firmware are secure around the world.

CSIRT-NQN

CSIRT-NQN

CSIRT-NQN is the Computer Incident Response Team for the Argentine province of Neuquen.

Verifi

Verifi

Verifi is an award-winning provider of end-to-end payment protection and risk management solutions.

Hunters.AI

Hunters.AI

Hunters is the world's first autonomous hunting solution that leverages top-tier cyber expertise and AI to uncover hidden cyber threats.

Sectigo

Sectigo

Sectigo is a leading cybersecurity provider of digital identity solutions, including TLS / SSL certificates, DevOps, IoT, and enterprise-grade PKI management, as well as multi-layered web security.

Cybersecurity Professionals

Cybersecurity Professionals

Search vacancies from top cyber security jobs worldwide on CyberSecurity Professionals. View IT security jobs or upload your CV to be seen by recruiters from industry leading firms.

StepStone

StepStone

StepStone is one of the leading online job platforms in Germany, and other countries, covering all industry sectors including IT and cybersecurity.

Aiden Technologies

Aiden Technologies

Aiden simplifies your IT process, giving you peace of mind and security by ensuring your computers get exactly the software they need and nothing else.

Security BSides Cayman Islands

Security BSides Cayman Islands

Security BSides is a non-profit, community-driven event built for and by information security community members. Our aim is to help build an Information Security community in the Cayman Islands.

Intuitive Research & Technology Corp

Intuitive Research & Technology Corp

Intuitive Research and Technology is an aerospace engineering and analysis firm providing services to the Department of Defense, government agencies, and commercial companies.

dWallet Labs

dWallet Labs

dWallet Labs is a cybersecurity company specializing in blockchain technology. We believe that the future of Web3 relies on cutting edge cryptography and unabated security.

SkillsDA

SkillsDA

SkillsDA is pureplay company in cyber security involved in capacity building towards National Security.

Benchmark Executive Search

Benchmark Executive Search

Benchmark specializes in finding elite talent for startup, emerging-growth and mid-cap companies offering game-changing technologies or innovative services to the federal and commercial markets.