Was The German Election Hacked?

On September 24th, 2017, federal elections took place in Germany to elect Germany’s next parliament, the 19th Bundestag. 

The Christian Democratic Union (CDU) won the majority of votes with 33%, making this Angela Merkel’s fourth term in office.

Merkel has been a steadfast supporter of the European Union, and much of the EU’s viability can be credited to Germany’s economic prowess and political stability. This made Germany an appealing yet somewhat challenging target for the likes of Russian President Vladimir Putin, whose interference in Western elections has unfolded in a dramatic and unprecedented fashion. The question on much of the world’s mind was, could the German election successfully be hacked?

There are two primary ways that modern elections can be interfered with:

  • The most direct method is to attack the election apparatus itself which is often easier said than done unless you happen to be a dictator in control of the entities delivering election results. 
  • The other method, and the one that has been the most prolific, is to attempt to influence the electorate to support or oppose candidates or initiatives of the attacker’s choosing. 

With the rise of the Internet and social media, it’s not hard to spool up tons of fake social media accounts and use them to spread rumors, lies, or even amplify real news when it benefits attackers’ motives. It’s often hard to gauge the true impact of these efforts on election results, however; even for the attackers.
A Tale of Election Software

Many German states use a software created by vote iT to count votes from local and national elections, called PC-Wahl. IT specialists Thorsten Schröder, Linus Neumann and Martin Tschirsich analysed the software and found numerous security flaws. Neumann is quoted as stating 
"We did this in our spare time. Everybody's worried about state sponsors and professional hackers, if we can do this in a couple of evenings of sitting around in our apartments, you can imagine how easily this could be accomplished by a state actor."

Vote iT told German news magazine Der Spiegel that there were “no security-related weaknesses in the software.” Nevertheless, patches were soon issued.  German hacker collective Chaos Computer Club (CCC) corroborated these findings, releasing a report warning that this software is easily manipulated. Passwords were either found online or easily guessed, and encryption methods were out of date. Germany’s top technology security agency, BSI, later ordered PC-Wahl’s security to be improved.

CCC previously uncovered vulnerabilities in German election voting systems in 2006 by circumventing their security measures and reprogramming voting computers to play chess. The German Federal Constitutional Court has since eliminated use of voting computers, resulting in the return to pen and paper votes.

As a result of the move back to pen and paper, attacking the election apparatus in German elections poses a particular challenge. This analog system would require significant resources to affect the outcome of the election if trying to boost numbers directly at the polls.  

Each voter casts two votes in a system that blends an additional member system with elements of a first-past-the-post system. Parties must win at least 5% of the second vote to enter parliament, a mandate put down to prevent splinter parties from bogging down the government such as with the Weimar Republic of the 1920s. The Weimar Republic was characterised by instability and short governing terms due to a large number of political parties that failed to compromise on key issues.
Individual voters, therefore, do not directly cast a ballot for the new chancellor as voters do for the President of the United States. Within the US a disparity of results between the popular vote and electoral college is a sometimes expected, if not frustrating event for many voters. 

Any disparity of reported results and actual votes in Germany would instead incite a resoundingly more chaotic result, potentially leading to calls for another election.

Should someone look to meddle with the German election, their only realistic option would be to interfere with the software responsible for tallying or reporting the results. 

Votes are collected and disseminated through digitised means determined by each region. And, although the paper votes could always be recounted, any strife would likely degrade confidence in the democratic system. 

As a result of suspected interference in recent elections, we now find ourselves wondering if attackers will attempt to manipulate each major election. It may be the case that, for whatever reasoning, the recent German election seems to have been spared of any significant attempts at outside manipulation. 

Regardless, there will be more major elections soon in Western countries and we will once again be asking ourselves if attackers will try to influence the results. 

Anomali

You Might Also Read: 

Fake Facebook Ads Surged During The US Presidential Election:

Germany May Go Offensive After Russian Cyber Attacks:

Angela Merkel’s Ally Caught In Cyber Attack As Elections Loom:

Germany Gets Tough On Social Media:

 

« Deloitte Hit by Cyber Attack: Clients' Private Data Exposed
Could the US Use A Cyber Attack To Take Down N. Korea? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Council of European Professional Informatics Societies (CEPIS)

Council of European Professional Informatics Societies (CEPIS)

CEPIS is the representative body of national informatics associations throughout Europe and represent over 450,000 ICT and informatics professionals in 32 countries.

HackCon Norway

HackCon Norway

HackCon is for the people who are interested in technology, psychology, IT and security, and who wants to improve their knowledge within these areas.

SBS CyberSecurity

SBS CyberSecurity

SBS CyberSecurity is a premier cybersecurity consulting and audit firm.

Convercent

Convercent

We offer comprehensive and integrated compliance management, reporting, and analytics. A 360-degree view of compliance drives efficiency by aligning initiatives and data into a single dashboard.

ICS2

ICS2

ICS² is the first cyber security company focusing on protecting the control system of power, oil, gas, and petrochemicals plants.

Ogasec

Ogasec

Ogasec is a cybersecurity company formed by the merger between Aker and N-Stalker in 2017. Solutions include Security & Connectivity Networking, Application Security, and Managed Security Services.

Cyber Covered

Cyber Covered

Cyber Covered provide complete website & data cover with market leading cyber insurance and powerful compliance software in one affordable package.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Security Alliance

Security Alliance

Security Alliance provide bespoke cyber intelligence consulting and research services.

36 Group

36 Group

36 Group's criminal law team, has the experience and specialist knowledge to conduct effectively trials heavily concerned with the growing phenomenon of Cybercrime.

DoControl

DoControl

DoControl gives organizations the automated, self-service tools they need for SaaS applications data access monitoring, orchestration, and remediation.

Binarly

Binarly

Binarly is a global firmware and software supply chain security company founded in 2021.

Harbor Networks

Harbor Networks

Harbor Networks is a communications systems integrator and managed services provider. We provide business consultation services for voice and data communication technology.

Securance Consulting

Securance Consulting

Since 2002, Securance has empowered enterprises to assume proactive security, compliance, and risk management strategies.

Summit 7 (S7)

Summit 7 (S7)

Summit 7 is a national leader in cybersecurity, compliance, and managed services for the Aerospace and Defense industry and corporate enterprises.

Bluerydge

Bluerydge

Bluerydge specialises in cyber security and technology, focusing on the delivery of innovative sovereign solutions through trusted, cleared and experienced professionals.