Truth & Lies About US Hacked Voter Data

Malicious actors are trying to undermine US public confidence in the security of US election infrastructure. They are spreading lies, falsely claiming that cyber attacks compromised voter registration databases, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have announced. The two agencies note that malicious actors are spreading disinformation to manipulate public "opinion and undermine confidence in US democratic institutions." However, the announcement itself is disturbing as it admits that voter’s data is freely available.

The FBI claims that there are no indications of any breach and that “most US voter information can be purchased or otherwise legitimately acquired through publicly available sources.” Malicious actors try to prove that election infrastructure was hacked using obtained voter registration information as evidence. “The reality is that having access to voter registration data is not by itself an indicator of a voter registration database compromise,” the announcement reads.

A report by the dat privacy firm Incognim,found that data brokers in the US even expose and sell information on 75% of US House members due to the lack of comprehensive federal law protecting against personal data collection and dissemination. So, while voters’ data may not be protected and acquired by anyone, the US election infrastructure is safe. “In recent election cycles, when cyber actors have obtained voter registration information, the acquisition of this data did not impact the voting process or election results,” the FBI explains.

The FBI and CISA have no information suggesting any compromise of election infrastructure

No cyberattack has ever prevented an election from occurring, changed voter registration information, prevented an eligible voter from casting a ballot, compromised the integrity of any ballots cast, or disrupted the ability to count votes or transmit unofficial election results in a timely manner. Therefore, claims about hacked or leaked voter information meed to critically evaluated. “Do not accept claims of intrusion at face value, and remember that these claims may be meant to influence public opinion and undermine the American people's confidence in our democratic process,” the FBI said.

Malicious actors often spread propaganda on social media, via unsolicited emails from unfamiliar email addresses, and even phone calls or text messages. Voters should rely on trusted sources for election information, such as state and local government election officials and local state and elections office websites. Most of these have web addresses with a ".gov" domain, indicating they’re official government sites.

Cyber News     |     Incogni     |     IC3     |     Bleeping Comp

Image: Greg Thames

You Might Also Read: 

2024 US Presidential Election: Nation State Cyber Threats:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« AI Is No Substitute For Cyber Experts
Chinese Botnet Deployed To Infect Critical Infrastructure »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

InfoSecurity Magazine

InfoSecurity Magazine

Infosecurity Magazine has over ten years of experience providing knowledge and insight into the information security industry.

Patchstack

Patchstack

Patchstack (formerly WebARX) is a web application security platform, which allows digital agencies and developers to monitor, protect and maintain their websites.

Apcon

Apcon

Apcon's mission is to provide valuable network insights that enable security and network professionals to monitor, secure and protect their data in both physical and virtual environments.

TeleTrusT

TeleTrusT

TeleTrust is an IT Security association and network for IT security comprising members from industry, administration, consultancy and research.

Digital Ship

Digital Ship

Digital Ship provides news, information, conferences and events focused on digital ship systems, information technology and security relating to maritime operations.

Acuant

Acuant

Acuant is a leading global provider of identity verification, regulatory compliance (AML/KYC) and digital identity solutions.

Rentalworks

Rentalworks

Rentalworks is a leading provider of Internet-of-Things (IoT) Asset Lifecycle Management Services including secure data erasure and disposal.

CyberRisk Alliance (CRA)

CyberRisk Alliance (CRA)

CyberRisk Alliance is a business intelligence company created to serve the rapidly evolving cybersecurity and information risk management marketplace.

Skudo

Skudo

Skudo is dedicated to creating innovative best-in-class solutions that protect data exchange with the highest level of security and privacy.

GLIMPS

GLIMPS

GLIMPS-Malware automatically detects malware affecting standard computer systems, manufacturing systems, IOT or automotive domains.

Rootshell Security

Rootshell Security

Rootshell Security is transforming vulnerability management with its vendor-agnostic Prism Platform and industry-leading offensive security assessments.

Dexian

Dexian

Dexian is a leading provider of staffing, IT, and workforce solutions with nearly 12,000 employees and 70 locations worldwide.

Epic Machines

Epic Machines

Epic Machines is a Value Added Reseller and Managed Security Services provider offering Security Transformation using Cloud-native solutions to commercial and government markets.

Axient

Axient

Axient advances defense and civilian missions from aerospace to cyberspace with multi-domain test and analysis, mission engineering and operations, and advanced technologies.

Theta

Theta

Theta is a New Zealand owned technology consultancy. Our team of over 330 experienced professionals help organisations transform with technology.

Silobreaker

Silobreaker

Silobreaker is a SaaS platform that enables threat intelligence teams to produce high-quality and relevant intelligence at a faster pace.