SecurityBrief Australia - Technology news for CISOs & cybersecurity decision-makers
Story image

State-sponsored election hacks are acts of cyber warfare - survey

Mon, 11th Sep 2017
FYI, this story is more than a year old

Most IT security professionals see state-sponsored attacks on elections as acts of cyber war and have huge impacts on confidence in the democratic process, according to a new survey.

At the US Black Hat conference in July, Venafi conducted a study which found that 78% of respondents said they would deem an act as cyber war if a nation-state was behind a successful or attempted hack of another country's election.

Nation states have already been behind some major election targeting. The United States NSA found that Russia had attacked an election systems provider VR systems before last year's election.

60% of respondents believe that hackers could alter election results and 27% believe attackers have already done so.

"The definition of an act of war is an action by one country against another which is an immediate threat to peace," comments Venafi CEO Jeff Hudson.

"An attempt at election hacking could easily be considered an act of cyber war. The intent is to undermine the foundation of government, which is responsible for protecting the country. Elections are being targeted by cyber attacks, and the potential repercussions of election hacking cannot be understated. Malicious actors have the ability to alter voting databases, delay vote counts and subvert trust in the election process," Hudson continues.

Attendees at security conference DEF CON 2017 were also discover and exploit vulnerabilities in five different voting machine types within 24 hours.

The conference featured a 'voting machine village' which comprised 30 different voting machines used in US elections. Machines included Sequoia AVC Edge, AccuVote TXS, Diebold Expresspoll 4000 and E-poll book.

Attendees were encouraged to hack the devices. The E-poll book machine was compromised in one hour. Another attendee discovered the OpenSSL CVE-2011-4019 vulnerability within the Diebold Expresspoll 4000 device, which compromised the entire machine.

"One user specifically calls out the use of 'self-signed' certificates still being used in machines. We see similar issues in IoT devices, where the manufacturer should be putting trusted CA issued certificates and rotating them. However, many organizations ignore this because they don't have an easy way to do this. Instead, they simply embed a self-signed certificate," comments Nick Hunter, Venafi senior digital trust manager.

Those systems that use self-signed certificates are targeted more because they are less trustworthy. If they are compromised, their identities can't be validated.

"The machines it connects to will blindly trust the compromised system. And once a trusted session is established, all communication between machines is compromised," Venafi concludes in a blog.

Follow us on:
Follow us on LinkedIn Follow us on X
Share on:
Share on LinkedIn Share on X