Election infrastructure at risk

Eighty-one percent of security professionals believe cyber attackers will target machine communications from local polling stations to central aggregation points.

  • 5 years ago Posted in
Venafi has published the results of a study on the security of election infrastructure. According to the study, ninety-three percent of security professionals are concerned about cyber-attacks targeting election infrastructure and data. Eighty-one percent believe cyber criminals will target election data as it is transmitted by machines, software and hardware applications, from local polling stations to central aggregation points.
 
“Last year, attendees at DEF CON managed to find and take advantage of vulnerabilities in five different voting machine types within 24 hours,” said Jeff Hudson, CEO of Venafi. “While these findings were disturbing, conference attendees only examined a small portion of election infrastructure. It’s clear to nearly all security professionals that the back-end systems that transmit, aggregate, tabulate, validate and store election data are at least as vulnerable to cyber-attacks as voting machines.”
Additional findings from the study include:
 
  • Ninety-five percent believe election systemsincluding voting machines, software and back-end systemsshould be considered critical infrastructure.
  • When asked what areas of election infrastructure were most vulnerable to cyber attackers:
    • Fifty-four percent say voting machines that collect election data.
    • Fifty-two percent say encrypted communications between polling stations and back-end election systems. 
    • Fifty percent say systems that store voter registration data.
  • Only two percent are very confident in their local, state and federal governments' abilities to detect cyber-attacks targeting election infrastructure. In addition, only three percent are very confident in their local, state and federal governments' abilities to block them.
  • Sixty-four percent believe vulnerabilities and exploits connected with election systems are available to cyber attackers on the dark web.
Earlier this month, a grand jury issued a detailed indictment on international interference during the 2016 U.S. presidential election. Details in the indictment indicate that nation-state actors utilized encrypted tunnels to target vulnerabilities in election infrastructure, along with other attack methods. Attacks that hide in encrypted tunnels are difficult to detect and block without a comprehensive machine identity protection program in place.
 
“Security professionals clearly think that machine-to-machine communication in the electoral process is a high value asset for attackers targeting election results,” said Kevin Bocek, vice president of security strategy and threat intelligence for Venafi. “This is just one reason why governments around the world need to make the security of all encrypted, machine-to-machine communication their top concern.”
Research shows ‘game needs to be changed,’ with security innovation years behind that of the...
Node4 has released its Mid-Market IT Priorities Report 2021. The independent report reveals that...
Atos has launched Atos OneCloud Sovereign Shield, a set of solutions, methodologies, and...
New distribution agreement set to bolster Westcon-Comstor’s Zero Trust offering in more markets...
Research from Avast has found that employees in almost a third (31%) of Small and Medium...
This year, over half of MSPs or their end customers have been attacked by ransomware but only 53%...
Trend Micro has published new research revealing that 90% of IT decision makers claim their...
Cyber consultants call on businesses to act now, or risk budgets shrinking further in ‘real...