Russia's US Election Hacks More Persistent Than First Thought

Voting systems across the US were far more susceptible to Russian hacking efforts during last year's presidential election than was previously known, according to evidence uncovered during the federal government's investigation and a leaked classified intelligence report.

A wave of attacks in the summer and fall of 2016 targeted and accessed a campaign finance database and software that poll workers were supposed to use on Election Day, Bloomberg reports, citing people with knowledge of the government's investigation into the hacking.

The FBI previously confirmed that hackers breached voter registration databases in Illinois and Arizona, but the investigation has since determined that voting systems in 39 states were compromised, according to Bloomberg. 
The Obama administration complained about the hacking to Russian officials via rarely used diplomatic channels, including a "red phone," before ultimately sanctioning Russia in December for its involvement in the hacks.

A classified report from the National Security Agency that The Intercept published recently provides some insight into the investigation. "Russian intelligence obtained and maintained access to elements of multiple US state or local electoral boards," the NSA wrote, although "the types of systems we observed Russian actors targeting or compromising are not involved in vote tallying."

Russian president Vladimir Putin has repeatedly denied the hacking accusations, although he recently appeared to suggest that Democratic presidential candidate Hillary Clinton may have prompted private Russian hackers to attempt to compromise the US election of their own accord.

"If they are patriotically minded, they start making their contributions, which are right, from their point of view, to the fight against those who say bad things about Russia," Putin said of the hackers during a recent TV interview.

Entrepreneur

You Might Also Read:

Deterrence & Cyber Attacks On The US Electoral System:

Russia Will Try To Hack German Elections:

Hacking The Vote: Russia Wins, America Loses:

 

« Google Launches GDPR Compliance Site
GDPR - 10 Things You Must Know – »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CircleCI

CircleCI

CircleCI’s platform allows developers to rapidly release code (for web and mobile apps) they trust by automating the build, test, and deploy process.

CertiKit

CertiKit

CertiKit produce toolkit products that accelerate the adoption of ISO/IEC standards, including ISO 27001, helping organizations all over the world to realize the benefits as soon as possible.

DataVantage

DataVantage

DataVantage data masking and data management software helps you prevent data breaches, pass compliance audits and meet regulatory requirements such as HIPAA and PCI DSS.

Cyberbit

Cyberbit

Cyberbit empowers cybersecurity teams to be fully prepared with a product portfolio ready to detect and respond effectively across both IT and OT networks.

ETAS

ETAS

ETAS (formerly Escrypt) is a pioneer and one of today’s leading solution providers for embedded IT security.

Redshift Consulting

Redshift Consulting

Redshift is an information management and information security consulting company offering a full range of services from infrastructure design to security assessments and network monitoring.

DAkkS

DAkkS

DAkkS is the national accreditation body for Germany. The directory of members provides details of organisations offering certification services for ISO 27001.

Xmirror Security

Xmirror Security

Xmirror Security focuses on integrated detection and defense of the continuous threat to the DevSecops software supply-chain with artificial intelligence technology as the core.

Onyxia Cyber

Onyxia Cyber

Onyxia's unique dynamic cybersecurity platform identifies gaps and prioritizes recommendations for proactive cybersecurity strategy, performance, remediation and management.

Buchanan Technologies

Buchanan Technologies

Buchanan Technologies is a leading IT consulting and outsourcing services firm. Our methodology transforms everyday technology investments into streamlined, secure and scalable solutions.

Beyon Cyber

Beyon Cyber

Beyon Cyber offer a complete portfolio of advanced solutions & services for cyber security in Bahrain.

Action Fraud

Action Fraud

Action Fraud is the UK’s national reporting centre for fraud and cyber crime where you should report fraud if you have been scammed, defrauded or experienced cyber crime.

Clarity

Clarity

Clarity is an AI cybersecurity startup that protects against deepfakes and new social engineering and phishing attack vectors accelerated by the rapid adoption of Generative AI.

Raito

Raito

Raito's unique solution integrates with the data development process and lets data teams monitor, manage, and automate data security across the data stack.

AirMDR

AirMDR

Designed by experts, AirMDR solutions cater to the unique demands of security operations centers.

M6iT Consulting

M6iT Consulting

M6iT Consulting is an industry-leading solution partner managing the IT requirements for a full range of companies.