Russia's US Election Hacks More Persistent Than First Thought

Voting systems across the US were far more susceptible to Russian hacking efforts during last year's presidential election than was previously known, according to evidence uncovered during the federal government's investigation and a leaked classified intelligence report.

A wave of attacks in the summer and fall of 2016 targeted and accessed a campaign finance database and software that poll workers were supposed to use on Election Day, Bloomberg reports, citing people with knowledge of the government's investigation into the hacking.

The FBI previously confirmed that hackers breached voter registration databases in Illinois and Arizona, but the investigation has since determined that voting systems in 39 states were compromised, according to Bloomberg. 
The Obama administration complained about the hacking to Russian officials via rarely used diplomatic channels, including a "red phone," before ultimately sanctioning Russia in December for its involvement in the hacks.

A classified report from the National Security Agency that The Intercept published recently provides some insight into the investigation. "Russian intelligence obtained and maintained access to elements of multiple US state or local electoral boards," the NSA wrote, although "the types of systems we observed Russian actors targeting or compromising are not involved in vote tallying."

Russian president Vladimir Putin has repeatedly denied the hacking accusations, although he recently appeared to suggest that Democratic presidential candidate Hillary Clinton may have prompted private Russian hackers to attempt to compromise the US election of their own accord.

"If they are patriotically minded, they start making their contributions, which are right, from their point of view, to the fight against those who say bad things about Russia," Putin said of the hackers during a recent TV interview.

Entrepreneur

You Might Also Read:

Deterrence & Cyber Attacks On The US Electoral System:

Russia Will Try To Hack German Elections:

Hacking The Vote: Russia Wins, America Loses:

 

« Google Launches GDPR Compliance Site
GDPR - 10 Things You Must Know – »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Radware

Radware

Radware is a global leader of application delivery and cyber security solutions for virtual, cloud and software defined data centers.

Evidian

Evidian

Evidian, a Bull Group company, is the European leader and one of the major worldwide vendors of identity and access management software.

RPC

RPC

RPC is a business law firm. Practice areas include technology and cyber risk.

AntemetA

AntemetA

AntemetA specializes in network infrastructure, security and cloud computing, helping companies transform their Information Systems.

Stealthcare

Stealthcare

Stealthcare is a full service, global cyber security firm offering solutions that educate, empower and protect.

National Digital Exploitation Centre (NDEC) - United Kingdom

National Digital Exploitation Centre (NDEC) - United Kingdom

NDEC is a project to create a centre of cyber and digital development and education for the UK. It will offer training in digital practices, cyber security and research.

Jumio

Jumio

Jumio’s end-to-end identity verification and authentication solutions fight fraud, maintain compliance and onboard good customers faster.

Emirates International Accreditation Center (EIAC)

Emirates International Accreditation Center (EIAC)

EIACI is the national accreditation body for the United Arab Emirates. The directory of members provides details of organisations offering certification services for ISO 27001.

Cyber Lockout

Cyber Lockout

Comprehensive ransomware insurance and preventative cybersecurity technology solution, working together to help protect businesses 24/7/365.

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

CSRI solves the cyber security threats of tomorrow, today. We work with industry and government leaders on innovative research that has real-world impact.

Serbus

Serbus

Serbus Secure is a fully managed suite of secure communication, enterprise mobility and mobile device security tools.

Praxis Security Labs

Praxis Security Labs

Praxis Security Labs is a research driven cybersecurity company that helps our customers to reduce risk and improve security.

Aegis9

Aegis9

Aegis9 is an Australian owned and sovereign consultancy that specialises in providing tailored security solutions for both public and private sector clients based on their specific needs.

Iron Mountain

Iron Mountain

Iron Mountain Incorporated is a global business dedicated to storing, protecting and managing, information and assets.

Prophet Security

Prophet Security

Prophet Security empowers organizations to triage, investigate, and respond to alerts with unparalleled speed and accuracy.

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions is a managed security service provider that humanizes cybersecurity managed services to the Small-to-Medium Business (SMB) and Small-to-Medium Enterprise (SME) sectors.