Truth & Lies About US Hacked Voter Data

Malicious actors are trying to undermine US public confidence in the security of US election infrastructure. They are spreading lies, falsely claiming that cyber attacks compromised voter registration databases, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have announced. The two agencies note that malicious actors are spreading disinformation to manipulate public "opinion and undermine confidence in US democratic institutions." However, the announcement itself is disturbing as it admits that voter’s data is freely available.

The FBI claims that there are no indications of any breach and that “most US voter information can be purchased or otherwise legitimately acquired through publicly available sources.” Malicious actors try to prove that election infrastructure was hacked using obtained voter registration information as evidence. “The reality is that having access to voter registration data is not by itself an indicator of a voter registration database compromise,” the announcement reads.

A report by the dat privacy firm Incognim,found that data brokers in the US even expose and sell information on 75% of US House members due to the lack of comprehensive federal law protecting against personal data collection and dissemination. So, while voters’ data may not be protected and acquired by anyone, the US election infrastructure is safe. “In recent election cycles, when cyber actors have obtained voter registration information, the acquisition of this data did not impact the voting process or election results,” the FBI explains.

The FBI and CISA have no information suggesting any compromise of election infrastructure

No cyberattack has ever prevented an election from occurring, changed voter registration information, prevented an eligible voter from casting a ballot, compromised the integrity of any ballots cast, or disrupted the ability to count votes or transmit unofficial election results in a timely manner. Therefore, claims about hacked or leaked voter information meed to critically evaluated. “Do not accept claims of intrusion at face value, and remember that these claims may be meant to influence public opinion and undermine the American people's confidence in our democratic process,” the FBI said.

Malicious actors often spread propaganda on social media, via unsolicited emails from unfamiliar email addresses, and even phone calls or text messages. Voters should rely on trusted sources for election information, such as state and local government election officials and local state and elections office websites. Most of these have web addresses with a ".gov" domain, indicating they’re official government sites.

Cyber News     |     Incogni     |     IC3     |     Bleeping Comp

Image: Greg Thames

You Might Also Read: 

2024 US Presidential Election: Nation State Cyber Threats:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« AI Is No Substitute For Cyber Experts
Chinese Botnet Deployed To Infect Critical Infrastructure »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Avast Software

Avast Software

Avast Software is a security software company that develops antivirus software and internet security services.

Exprivia

Exprivia

Exprivia is active in the design, development and integration of IT systems including cyber security.

NopSec

NopSec

NopSec provides automated IT security control measurement and risk remediation solutions to help businesses protect their IT environments from security breaches.

Matta

Matta

Matta is a cyber security consulting company providing information security services and solutions including vulnerability assessments, penetration testing and emergency response.

Cyber Security Raad (CSR) - Netherlands

Cyber Security Raad (CSR) - Netherlands

The Cyber Security Council (CSR) is a national, independent advisory body of the Dutch government undertaking efforts at strategic level to bolster cyber security in the Netherlands.

CyberGuru

CyberGuru

CyberGuru is a service provided by CyberSecurity Malaysia specializing in cyber security professional training and development.

Kaspersky Industrial CyberSecurity (KICS)

Kaspersky Industrial CyberSecurity (KICS)

Kaspersky addresses all the cybersecurity needs of industrial organizations in its Kaspersky Industrial CyberSecurity (KICS) portfolio.

Blackpoint Cyber

Blackpoint Cyber

Blackpoint’s mission is to provide effective, affordable real-time threat detection and response to organizations of all sizes around the world.

Technisanct

Technisanct

Technisanct works with Governments, especially Law Enforcement and Defence agencies, helping them in monitoring threats, managing their data and resolving their forensic needs.

BDO Global

BDO Global

BDO is an international network of public accounting, tax and advisory firms which perform professional services under the name of BDO.

Quad9 Foundation

Quad9 Foundation

Quad9 is a free security solution that uses DNS to protect your system against the most common cyber threats. It improves your system's performance, plus, it preserves and protects your privacy.

LogicBoost Labs

LogicBoost Labs

LogicBoost Labs has the expertise, experience, funding and connections to make your startup succeed. We are always interested in new ways to change the world for the better.

Vancord

Vancord

Vancord is an information and security technology company that works in collaboration with clients to support their infrastructure and data security needs for today and tomorrow.

Third Wave Innovations

Third Wave Innovations

Third Wave Innovations (formerly RCS Secure) offers a full spectrum of cybersecurity safeguards and IT services.

Vultara

Vultara

Vultara provides web-based product security risk management tools for electronics manufacturers.

PDQ

PDQ

PDQ helps IT professionals to manage and organize hardware, software, and configuration data for Windows- and Apple-based devices.