CISA Reports No Significant Attacks On US Elections

Following early warnings of the threat of interference from malicious foreign hackers in advance of this week's US House and Senate elections the US election processes continues to be a target of interest for malicious actors. 

Now, the Cybersecurity and Infrastructure Security Agency (CISA) has confirmed there were a number of cyber attacks on State and local election websites during the 2022 midterms. 

Reassuringly, however, those early warnings have been heeded by the local-level government agencies responsible for running the elections and no significant harm has been identified. 

“Election systems that house voter registration information or manage non-voting election processes continue to be a target of interest for malicious threat actors,” says CISA's report. However, there has been no specific or credible threat to disrupt election infrastructure or Election Day operations. “We’ve seen no activity that should cause anyone to question the security, integrity or resilience of our election infrastructure,” said a senior CISA official said. 

In Mississippi, the secretary of state’s website, which serves as a digital resource for election-related information and is not involved in vote tabulations, was temporarily inaccessible after experiencing “an abnormally large increase in traffic volume due to DDoS activity,” the office said in a statement. These were attempts to disrupt access to websites and servers by overwhelming them with manipulated online traffic, often through the use of bots or a network of hijacked computers. 

“We want to be extremely clear and reassure Mississippians our election system is secure and has not been compromised,” the Mississippi secretary of state’s office confirmed. 

CISA worked closely with state and local jurisdictions to help officials detect and stop cyber-attacks and threats made against election management and 14 states used cyber teams to help secure voting systems. This cyber security work has been successful for this election, as CISA has said it was only “checking a handful” of jurisdictions.

CISA:    NextGov:      DefenseOne:    Cyberwire:       The Record

You Might Also Read: 

The Personal Data Being Used To Get Your Vote:

 

« The Reality Check For Small & Medium Businesses
Why Are Businesses Still Falling Victim To Ransomware? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

HackRead

HackRead

HackRead is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends.

Wilson Sonsini Goodrich & Rosati (WSGR)

Wilson Sonsini Goodrich & Rosati (WSGR)

WSGR is the premier provider of legal services to technology, life sciences, and growth enterprises worldwide. Practice areas include cybersecurity and data protection.

Egerie

Egerie

EGERIE's RiskManager solution provides a Global, Centralized, and Updated view of risk maps and security measures for your company.

Uniscon

Uniscon

Uniscon is a leading provider of cloud security solutions in Europe.

Fyde

Fyde

Fyde helps companies with an increasingly distributed workforce mitigate breach risk by enabling secure access to critical enterprise resources.

SHIELD

SHIELD

SHIELD is an established end-to-end fraud management solution that blocks fraudulent activities such as account takeovers, fake accounts creation, fraudulent payments, loyalty fraud and more.

TES

TES

TES is a provider of IT Lifecycle Services, offering bespoke solutions that help customers manage the commissioning, deployment and retirement of Information Technology assets.

T-REX

T-REX

T-REX is a coworking space, technology incubator, and entrepreneur resource center for technology startups.

Genius Guard

Genius Guard

Genius Guard specializes in DDoS Protection, DDoS Protected Webhosting, HYIP Hosting, Bitcoin Hosting, Cryptocurrency Hosting.

Patriot Cyber Defense

Patriot Cyber Defense

Patriot Cyber Defense is a Cyber Security and Management Consulting professional services firm.

ISMAC

ISMAC

ISMAC was founded to create a security solution that would work for smaller to medium as well as bigger corporations at an affordable price.

Tromzo

Tromzo

Tromzo's mission is to eliminate the friction between developers and security so you can scale your application security program.

Unified Solutions

Unified Solutions

Unified Solutions provide a full continuum of cyber security services, compliance, and technology solutions.

Beround

Beround

Beround is an IT consultancy firm specialized in software testing.

Baselime

Baselime

Baselime, the cloud-native observability platform. Resolve issues in your cloud application before they become problems.

Diverto

Diverto

Diverto is a company that provides a high level of information security to companies, institutions and other organisations in an information-centric world.