Truth & Lies About US Hacked Voter Data

Malicious actors are trying to undermine US public confidence in the security of US election infrastructure. They are spreading lies, falsely claiming that cyber attacks compromised voter registration databases, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have announced. The two agencies note that malicious actors are spreading disinformation to manipulate public "opinion and undermine confidence in US democratic institutions." However, the announcement itself is disturbing as it admits that voter’s data is freely available.

The FBI claims that there are no indications of any breach and that “most US voter information can be purchased or otherwise legitimately acquired through publicly available sources.” Malicious actors try to prove that election infrastructure was hacked using obtained voter registration information as evidence. “The reality is that having access to voter registration data is not by itself an indicator of a voter registration database compromise,” the announcement reads.

A report by the dat privacy firm Incognim,found that data brokers in the US even expose and sell information on 75% of US House members due to the lack of comprehensive federal law protecting against personal data collection and dissemination. So, while voters’ data may not be protected and acquired by anyone, the US election infrastructure is safe. “In recent election cycles, when cyber actors have obtained voter registration information, the acquisition of this data did not impact the voting process or election results,” the FBI explains.

The FBI and CISA have no information suggesting any compromise of election infrastructure

No cyberattack has ever prevented an election from occurring, changed voter registration information, prevented an eligible voter from casting a ballot, compromised the integrity of any ballots cast, or disrupted the ability to count votes or transmit unofficial election results in a timely manner. Therefore, claims about hacked or leaked voter information meed to critically evaluated. “Do not accept claims of intrusion at face value, and remember that these claims may be meant to influence public opinion and undermine the American people's confidence in our democratic process,” the FBI said.

Malicious actors often spread propaganda on social media, via unsolicited emails from unfamiliar email addresses, and even phone calls or text messages. Voters should rely on trusted sources for election information, such as state and local government election officials and local state and elections office websites. Most of these have web addresses with a ".gov" domain, indicating they’re official government sites.

Cyber News     |     Incogni     |     IC3     |     Bleeping Comp

Image: Greg Thames

You Might Also Read: 

2024 US Presidential Election: Nation State Cyber Threats:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« AI Is Not a Substitute For Cyber Experts
Chinese Botnet Deployed To Infect Critical Infrastructure »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Caliber Security Partners

Caliber Security Partners

Caliber Security Partners is a full-service information security company, with a wide range of security services for clients with varying levels of security maturity.

SecureNow Insurance Broker

SecureNow Insurance Broker

SecureNow is a commercial insurance broker based in India. Services offered include Cyber Risk insurance.

Resource Centre for Cyber Forensics (RCCF)

Resource Centre for Cyber Forensics (RCCF)

RCCF is a pioneering institute, pursuing research activities in the area of Cyber Forensics.

Roke Manor Research

Roke Manor Research

Roke is a world-class electronics engineering consultancy. Areas of expertise include cyber security, cyber assurance and cryptographic solutions.

PrivateCore

PrivateCore

We protect data-in-use from hackers trying to steal data such as encryption keys, certificates, intellectual property.

Zighra

Zighra

Zighra is a leading provider of On-Device AI solutions for continuous authentication and fraud detection on mobile and web applications.

Green House Data

Green House Data

Green House Data is a managed services provider delivering hybrid solutions to enterprises who need secure IT environments and efficient management of their critical applications and business data.

BigPanda

BigPanda

BigPanda is the first provider of Autonomous Operations solutions that empower IT Operations at large, complex enterprises.

ContraForce

ContraForce

ContraForce is a threat detection and response software providing complete visibility across cloud, network, endpoints, user, and email with the ability to target and block threats in real-time.

Technology Innovation & Startup Centre (TISC)

Technology Innovation & Startup Centre (TISC)

TISC is a startup incubator at the Indian Institute of Technology Jodhpur (IITJ) and we back deep-tech startups.

Network Perception

Network Perception

Network Perception proactively and continuously assures the security of critical OT assets with intuitive network segmentation verification and visualization.

BIRD Cyber

BIRD Cyber

BIRD Cyber is a program to promote collaboration on cybersecurity and emerging technologies aimed at enhancing the cyber resilience of critical infrastructure.

Heartland Business Systems (HBS)

Heartland Business Systems (HBS)

Heartland Business Systems serves commercial, public sector and small to medium business with results-driven and dedicated information technology services.

Concorde Technology Group

Concorde Technology Group

Concorde Technology Group is one of the UK’s leading IT support and services providers, delivering cost-effective and innovative IT solutions to businesses across the country.

The Purple Guys

The Purple Guys

The Purple Guys offer Trouble-Free IT Support to businesses across the Central and Southern US. Safe and Secure, Rapid Response, Friendly Support that’s our Purple Promise.

Odaseva

Odaseva

Odaseva delivers the strongest data security solution for enterprises running on Salesforce, safeguarding confidentiality and integrity of critical business information.