Russia's US Election Hacks More Persistent Than First Thought

Voting systems across the US were far more susceptible to Russian hacking efforts during last year's presidential election than was previously known, according to evidence uncovered during the federal government's investigation and a leaked classified intelligence report.

A wave of attacks in the summer and fall of 2016 targeted and accessed a campaign finance database and software that poll workers were supposed to use on Election Day, Bloomberg reports, citing people with knowledge of the government's investigation into the hacking.

The FBI previously confirmed that hackers breached voter registration databases in Illinois and Arizona, but the investigation has since determined that voting systems in 39 states were compromised, according to Bloomberg. 
The Obama administration complained about the hacking to Russian officials via rarely used diplomatic channels, including a "red phone," before ultimately sanctioning Russia in December for its involvement in the hacks.

A classified report from the National Security Agency that The Intercept published recently provides some insight into the investigation. "Russian intelligence obtained and maintained access to elements of multiple US state or local electoral boards," the NSA wrote, although "the types of systems we observed Russian actors targeting or compromising are not involved in vote tallying."

Russian president Vladimir Putin has repeatedly denied the hacking accusations, although he recently appeared to suggest that Democratic presidential candidate Hillary Clinton may have prompted private Russian hackers to attempt to compromise the US election of their own accord.

"If they are patriotically minded, they start making their contributions, which are right, from their point of view, to the fight against those who say bad things about Russia," Putin said of the hackers during a recent TV interview.

Entrepreneur

You Might Also Read:

Deterrence & Cyber Attacks On The US Electoral System:

Russia Will Try To Hack German Elections:

Hacking The Vote: Russia Wins, America Loses:

 

« Google Launches GDPR Compliance Site
GDPR - 10 Things You Must Know – »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Blueliv

Blueliv

Blueliv is a leading provider of targeted cyber threat information and intelligence. We deliver automated and actionable threat intelligence to protect the enterprise and manage your digital risk.

SGCyberSecurity

SGCyberSecurity

SGCyberSecurity is Singapore's No.1 Cyber Security portal. From this platform, you will be able to find useful articles, resources and connect with the security companies for your business needs.

i-Sprint Innovations

i-Sprint Innovations

i-Sprint is a leader in Securing Identity and Transactions in the Cyber World for industries that are security sensitive.

Pixalate

Pixalate

Pixalate is an omni-channel fraud intelligence company that works with brands and platforms to prevent invalid traffic and improve ad inventory quality.

Workz Group

Workz Group

Workz connects and protects mobile subscribers of today and tomorrow by providing secure removable or embedded SIMs and remote provisioning solutions for consumer, M2M and IOT devices.

DANAK

DANAK

DANAK is the national accreditation body for Denmark. The directory of members provides details of organisations offering certification services for ISO 27001.

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling and Data Destruction protect the environment and your data with proven and trusted electronics recycling and data destruction services.

Truesec

Truesec

TRUESEC has an exceptional mix of IT specialists. We are true experts in cyber security, advanced IT infrastructure and secure development.

7layers

7layers

7layers has established itself as one of the world’s leading test house groups for mobile devices and the growing number of wireless devices, modules and chipsets.

ITSEC Asia

ITSEC Asia

ITSEC Asia works to effectively reduce exposure to information security threats and improve the effectiveness of its clients' information security management systems.

Hub71

Hub71

Hub71 is a world-class tech ecosystem opening doors to global opportunities from an optimal business environment for entrepreneurial-minded innovators.

Codean

Codean

The Codean Review Environment automates mundane software analysis tasks, so security experts can focus on finding vulnerabilities.

Europol - European Cybercrime Centre (EC3)

Europol - European Cybercrime Centre (EC3)

The European Cybercrime Centre (EC3) was set up by Europol to strengthen the law enforcement response to cybercrime in the EU.

SHI International

SHI International

SHI International deliver against your IT and business needs, helping you build strategies and solutions that will drive innovation, collaboration and security.

G-71

G-71

G-71 LeaksID is a cutting-edge ITM technology aimed at safeguarding sensitive documents from insider threats.

Aberrant

Aberrant

A radically new approach to managing information security. Aberrant is the single pane of glass through which a security program can be viewed.