Truth & Lies About US Hacked Voter Data

Malicious actors are trying to undermine US public confidence in the security of US election infrastructure. They are spreading lies, falsely claiming that cyber attacks compromised voter registration databases, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have announced. The two agencies note that malicious actors are spreading disinformation to manipulate public "opinion and undermine confidence in US democratic institutions." However, the announcement itself is disturbing as it admits that voter’s data is freely available.

The FBI claims that there are no indications of any breach and that “most US voter information can be purchased or otherwise legitimately acquired through publicly available sources.” Malicious actors try to prove that election infrastructure was hacked using obtained voter registration information as evidence. “The reality is that having access to voter registration data is not by itself an indicator of a voter registration database compromise,” the announcement reads.

A report by the dat privacy firm Incognim,found that data brokers in the US even expose and sell information on 75% of US House members due to the lack of comprehensive federal law protecting against personal data collection and dissemination. So, while voters’ data may not be protected and acquired by anyone, the US election infrastructure is safe. “In recent election cycles, when cyber actors have obtained voter registration information, the acquisition of this data did not impact the voting process or election results,” the FBI explains.

The FBI and CISA have no information suggesting any compromise of election infrastructure

No cyberattack has ever prevented an election from occurring, changed voter registration information, prevented an eligible voter from casting a ballot, compromised the integrity of any ballots cast, or disrupted the ability to count votes or transmit unofficial election results in a timely manner. Therefore, claims about hacked or leaked voter information meed to critically evaluated. “Do not accept claims of intrusion at face value, and remember that these claims may be meant to influence public opinion and undermine the American people's confidence in our democratic process,” the FBI said.

Malicious actors often spread propaganda on social media, via unsolicited emails from unfamiliar email addresses, and even phone calls or text messages. Voters should rely on trusted sources for election information, such as state and local government election officials and local state and elections office websites. Most of these have web addresses with a ".gov" domain, indicating they’re official government sites.

Cyber News     |     Incogni     |     IC3     |     Bleeping Comp

Image: Greg Thames

You Might Also Read: 

2024 US Presidential Election: Nation State Cyber Threats:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« AI Is No Substitute For Cyber Experts
Chinese Botnet Deployed To Infect Critical Infrastructure »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Technology Institute - De Montfort University

Cyber Technology Institute - De Montfort University

The Cyber Technology Institute provides training and high quality research and consultancy services in the fields of cyber security, software engineering and digital forensics.

CNCERT/CC

CNCERT/CC

CNCERT is the national Computer Network Emergency Response Technical Team / Coordination Center of China.

National Response Centre for Cyber Crime (NR3C) - Pakistan

National Response Centre for Cyber Crime (NR3C) - Pakistan

National Response Centre for Cyber Crime (NR3C) is a law enforcement agency in Pakistan dedicated to fighting cyber crime.

Ilex International

Ilex International

Ilex International is a European software vendor which specialises in Identity & Access Management solutions.

Japan Information Security Audit Association (JASA)

Japan Information Security Audit Association (JASA)

JASA is non-profit association active in developing and managing the quality of Information Security Auditing and Auditors in Japan.

CyberVista

CyberVista

CyberVista is a cybersecurity training education and workforce development company. Our mission is to eliminate the skills gap by creating job ready professionals.

Matta

Matta

Matta is a cyber security consulting company providing information security services and solutions including vulnerability assessments, penetration testing and emergency response.

TI Safe

TI Safe

TI Safe provide cybersecurity solutions for industrial networks of main critical infrastructures in Latin America.

HumanFirewall

HumanFirewall

HumanFirewall makes it possible for every individual to take part in securing their organisation. With HumanFirewall, achieving security has never been easier.

GreenWorld Technologies

GreenWorld Technologies

GreenWorld has a proven track record in industry leading IT asset management, secure data destruction and remarketing.

Avertium

Avertium

Avertium is the managed security and consulting provider that companies turn to when they want more than check-the-box cybersecurity.

CyberHunter Solutions

CyberHunter Solutions

CyberHunter is a leading website security company that provides penetration testing, Network Vulnerability Assessments, cyber security consulting services to prevent cyber attacks.

Viettel Cyber Security

Viettel Cyber Security

Viettel Cyber Security is an organization under the Military Telecommunication Industry Group, conducting research and developing information security solutions for domestic and foreign customers.

Infinipoint

Infinipoint

Infinipoint pioneers the first Device-Identity-as-a-Service (DIaaS) solution, addressing Zero Trust device access and enabling enterprises of all sizes to automate cyber hygiene.

Prembly

Prembly

Prembly are a compliance and security infrastructure company.

Vector Choice Technologies

Vector Choice Technologies

Vector Choice Technology Solutions has a long standing reputation in cyber security consulting since 2008.