Story image

State-sponsored election hacks are acts of cyber warfare - survey

11 Sep 17

Most IT security professionals see state-sponsored attacks on elections as acts of cyber war and have huge impacts on confidence in the democratic process, according to a new survey.

At the US Black Hat conference in July, Venafi conducted a study which found that 78% of respondents said they would deem an act as cyber war if a nation-state was behind a successful or attempted hack of another country’s election.

Nation states have already been behind some major election targeting. The United States NSA found that Russia had attacked an election systems provider VR systems before last year’s election.

60% of respondents believe that hackers could alter election results and 27% believe attackers have already done so.

“The definition of an act of war is an action by one country against another which is an immediate threat to peace,” comments Venafi CEO Jeff Hudson.

“An attempt at election hacking could easily be considered an act of cyber war. The intent is to undermine the foundation of government, which is responsible for protecting the country. Elections are being targeted by cyber attacks, and the potential repercussions of election hacking cannot be understated. Malicious actors have the ability to alter voting databases, delay vote counts and subvert trust in the election process,” Hudson continues.

Attendees at security conference DEF CON 2017 were also discover and exploit vulnerabilities in five different voting machine types within 24 hours.

The conference featured a ‘voting machine village’ which comprised 30 different voting machines used in US elections. Machines included Sequoia AVC Edge, AccuVote TXS, Diebold Expresspoll 4000 and E-poll book.

Attendees were encouraged to hack the devices. The E-poll book machine was compromised in one hour. Another attendee discovered the OpenSSL CVE-2011-4019 vulnerability within the Diebold Expresspoll 4000 device, which compromised the entire machine.

“One user specifically calls out the use of ‘self-signed’ certificates still being used in machines. We see similar issues in IoT devices, where the manufacturer should be putting trusted CA issued certificates and rotating them. However, many organizations ignore this because they don’t have an easy way to do this. Instead, they simply embed a self-signed certificate,” comments Nick Hunter, Venafi senior digital trust manager.

Those systems that use self-signed certificates are targeted more because they are less trustworthy. If they are compromised, their identities can’t be validated.

“The machines it connects to will blindly trust the compromised system. And once a trusted session is established, all communication between machines is compromised,” Venafi concludes in a blog.

Hillstone CTO's 2019 security predictions
Hillstone Networks CTO Tim Liu shares what key developments could be expected in the areas of security compliance, cloud, security, AI and IoT.
Can it be trusted? Huawei’s founder speaks out
Ren Zhengfei spoke candidly in a recent media roundtable about security, 5G, his daughter’s detainment, the USA, and the West’s perception of Huawei.
Oracle Java Card update boosts security for IoT devices
"Java Card 3.1 is very significant to the Internet of Things, bringing interoperability, security and flexibility to a fast-growing market currently lacking high-security and flexible edge security solutions."
Sophos hires ex-McAfee SVP Gavin Struther
After 16 years as the APAC senior vice president and president for McAfee, Struthers is now heading the APJ arm of Sophos.
Security platform provider Deep Instinct expands local presence
The company has made two A/NZ specific leadership hires and formed several partnerships with organisations in the region.
Half of companies unable to detect IoT device breaches
A Gemalto study also shows that the of blockchain technology to help secure IoT data, services and devices has doubled in a year.
Stepping up to sell security services in A/NZ
WatchGuard Technologies A/NZ regional director gives his top tips on how to make a move into the increasingly lucrative cybersecurity services market.
Huawei founder publically denies spying allegations
“After all the evidence is made public, we will rely on the justice system.”