CISA Reports No Significant Attacks On US Elections

Following early warnings of the threat of interference from malicious foreign hackers in advance of this week's US House and Senate elections the US election processes continues to be a target of interest for malicious actors. 

Now, the Cybersecurity and Infrastructure Security Agency (CISA) has confirmed there were a number of cyber attacks on State and local election websites during the 2022 midterms. 

Reassuringly, however, those early warnings have been heeded by the local-level government agencies responsible for running the elections and no significant harm has been identified. 

“Election systems that house voter registration information or manage non-voting election processes continue to be a target of interest for malicious threat actors,” says CISA's report. However, there has been no specific or credible threat to disrupt election infrastructure or Election Day operations. “We’ve seen no activity that should cause anyone to question the security, integrity or resilience of our election infrastructure,” said a senior CISA official said. 

In Mississippi, the secretary of state’s website, which serves as a digital resource for election-related information and is not involved in vote tabulations, was temporarily inaccessible after experiencing “an abnormally large increase in traffic volume due to DDoS activity,” the office said in a statement. These were attempts to disrupt access to websites and servers by overwhelming them with manipulated online traffic, often through the use of bots or a network of hijacked computers. 

“We want to be extremely clear and reassure Mississippians our election system is secure and has not been compromised,” the Mississippi secretary of state’s office confirmed. 

CISA worked closely with state and local jurisdictions to help officials detect and stop cyber-attacks and threats made against election management and 14 states used cyber teams to help secure voting systems. This cyber security work has been successful for this election, as CISA has said it was only “checking a handful” of jurisdictions.

CISA:    NextGov:      DefenseOne:    Cyberwire:       The Record

You Might Also Read: 

The Personal Data Being Used To Get Your Vote:

 

« The Reality Check For Small & Medium Businesses
Why Are Businesses Still Falling Victim To Ransomware? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Information Risk Management (IRM)

Information Risk Management (IRM)

IRM is an international consultancy dedicated to helping organisations solve key business issues. We provide strategic cyber security advice across a wide range of sectors.

F-Secure

F-Secure

F-Secure defends enterprises and consumers against everything from opportunistic ransomware infections to advanced cyber attacks.

Digital DNA

Digital DNA

Digital DNA provides Law-Enforcement-Grade Computer Forensics, Cyber Security and E-Discovery Investigations.

Device Authority

Device Authority

Device Authority specialises in security automation for the Internet of Things (IoT).

ESNC

ESNC

ESNC’s vulnerability management and real-time SAP security monitoring solutions help largest corporations in the world to effectively prioritize SAP security tasks and secure their business.

GM Security Technologies

GM Security Technologies

GM Security Technologies provides leading managed security services of the highest quality to every type of individual and organization in Puerto Rico, Caribbean and Latin America.

Mendoza Ventures

Mendoza Ventures

Mendoza Ventures is a venture capital fund focusing on pre-seed Artificial Intelligence (AI), Fintech, and Cybersecurity startups.

KDM Analytics

KDM Analytics

KDM Analytics software products automate the NIST risk management framework (RMF) assessment for operational technology (OT) systems.

Cado Security

Cado Security

Cado Security is pushing digital forensics, and cyber incident response to the next level with an incident response software platform and specialist consulting services.

ContraForce

ContraForce

ContraForce is a threat detection and response software providing complete visibility across cloud, network, endpoints, user, and email with the ability to target and block threats in real-time.

RedHunt Labs

RedHunt Labs

RedHunt Labs is a premier Cybersecurity Solutions provider, offering Attack Surface Management solution 'NVADR' and Penetration Testing services.

Gunnison Consulting Group

Gunnison Consulting Group

Gunnison Consulting Group serves the Federal Government with high quality IT consulting services.

Digital Edge

Digital Edge

Digital Edge provides unparalleled Managed Cloud Solutions, as well as superior Information Technology Support Services.

Sidcon International Consulting Company

Sidcon International Consulting Company

SIDCON International Consulting Company has been providing consulting services since 2002 for private and public organizations in Ukraine and other countries.

Arakyta

Arakyta

Arakÿta specializes in business strategy, work flow process and IT systems for organizations.

Binarii Labs

Binarii Labs

Binarii are focused on helping enterprises to design and deploy SaaS solutions that utilise DLT (Digital Ledger Technology) effectively, efficiently and sensibly.