Get 40% Off
👀 👁 🧿 All eyes on Biogen, up +4,56% after posting earnings. Our AI picked it in March 2024.
Which stocks will surge next?
Unlock AI-picked Stocks

U.S. House candidates vulnerable to hacks: researchers

Published 08/12/2018, 01:06 PM
Updated 08/12/2018, 01:10 PM
© Reuters. FILE PHOTO: A man types into a keyboard during the Def Con hacker convention in Las Vegas

By Joseph Menn

LAS VEGAS (Reuters) - Three of every 10 candidates running for the U.S. House of Representatives have significant security problems with their websites, according to a new study by independent researchers that underscores the threat hackers pose to the November elections.

The research was due to be unveiled on Sunday at the annual Def Con security conference in Las Vegas, where some attendees have spent three days hacking into voting machines to highlight vulnerabilities in technology running polling operations.

A team of four independent researchers led by former National Institutes for Standards and Technology security expert Joshua Franklin concluded that the websites of nearly one-third of U.S. House candidates, Democrats and Republicans alike, are vulnerable to attacks. NIST is a U.S. Commerce Department laboratory that provides advice on technical issues, including cyber security.

Using automated scans and test programs, the team identified multiple vulnerabilities, including problems with digital certificates used to verify secure connections with users, Franklin told Reuters ahead of the presentation.

The warnings about the midterm elections, which are less than three months away, come after Democrats have spent more than a year working to bolster cyber defenses of the party's national, state and campaign operations.

Democratic National Committee officials told Reuters they have completely rebuilt the party's computer network, including email systems and databases, to avert a repeat of 2016, when Russian intelligence agents hacked into Democratic accounts and then used stolen data to undermine support for Hillary Clinton's presidential bid.

"No one wants to be the next 'patient zero,'" said DNC Chief Technology Officer Raffi Krikorian, a former executive with Twitter and Uber.

3rd party Ad. Not an offer or recommendation by Investing.com. See disclosure here or remove ads .

The report follows a string of warnings by Trump administration security officials that Russia is actively interfering in the November elections. FBI Director Christopher Wray recently warned that Russian government agents were working around the clock to sow discord ahead of the election.

Democratic Senator Claire McCaskill, who is facing a tough re-election battle in Missouri, last month said that hackers had tried and failed to access her office's computer network. The Def Con study did not address that incident.

The researchers did not identify any cases where it appeared that politically motivated hackers had exploited those vulnerabilities.

"We're trying to figure out a way to contact all the candidates" so they can fix the problems, said Franklin, who joined the nonprofit Center for Internet Security last month.

Department of Homeland Security officials said at Def Con that they are offering aid to states and counties for securing election equipment.

Still, some states said they are not getting enough help, and new funding efforts failed in Congress. Individual campaigns are not eligible for federal assistance, so they rely on party officials, an increased number of tech-savvy volunteers and nonprofit groups such as Defending Digital Democracy, a bipartisan project at the Kennedy School of Government at Harvard University.

Franklin also said he found numerous potentially malicious web pages that closely resemble the names of candidates. Hackers use that practice, known as “typo-squatting,” to develop copycat sites for use in phishing campaigns to steal credentials or to criticize candidates.

3rd party Ad. Not an offer or recommendation by Investing.com. See disclosure here or remove ads .

The candidates at most risk of hacks are ones with small campaigns that have with little expertise in computer technology or security, Franklin said.

STEPS BY THE DNC

The Democratic National Committee agreed to discuss some steps it has taken to bolster security in the hope it can serve as a model for other election offices.

Since Krikorian joined the DNC a year ago, the party has moved email and data storage to Google (NASDAQ:GOOGL) cloud and replaced most Windows computers with easier-to-defend Apple (NASDAQ:AAPL) hardware and Google Chromebooks, he said.

The party also requires staff to fill out monthly surveys pledging that they are following key security practices, including use of two-factor authentication for personal accounts, long and unique passwords, and encryption on computers. They are also asked if they are running operating systems and application software with up-to-date security patches.

The party uses software from San Francisco-based Okta that grants access to DNC systems only after testing devices to confirm the identity of users and verify they are not running malicious software.

The biggest change has been psychological, as staffers and volunteers are trained to assume that the network has been breached, avoid putting the most sensitive information in emails and use end-to-end encrypted messaging like Signal.

The party is also reaching out to campaigns and stressing basic precautions.

DNC Chief Security Officer Bob Lord, a former security executive with Yahoo (NASDAQ:AABA) and Twitter, sent an email a week ago to state party leaders, urging them not to use phones from Chinese manufacturers Huawei [HWT.UL] and ZTE Corp (HK:0763).

3rd party Ad. Not an offer or recommendation by Investing.com. See disclosure here or remove ads .

U.S. intelligence officials have warned that Chinese authorities could seek to use those devices to spy on Americans.

Latest comments

Risk Disclosure: Trading in financial instruments and/or cryptocurrencies involves high risks including the risk of losing some, or all, of your investment amount, and may not be suitable for all investors. Prices of cryptocurrencies are extremely volatile and may be affected by external factors such as financial, regulatory or political events. Trading on margin increases the financial risks.
Before deciding to trade in financial instrument or cryptocurrencies you should be fully informed of the risks and costs associated with trading the financial markets, carefully consider your investment objectives, level of experience, and risk appetite, and seek professional advice where needed.
Fusion Media would like to remind you that the data contained in this website is not necessarily real-time nor accurate. The data and prices on the website are not necessarily provided by any market or exchange, but may be provided by market makers, and so prices may not be accurate and may differ from the actual price at any given market, meaning prices are indicative and not appropriate for trading purposes. Fusion Media and any provider of the data contained in this website will not accept liability for any loss or damage as a result of your trading, or your reliance on the information contained within this website.
It is prohibited to use, store, reproduce, display, modify, transmit or distribute the data contained in this website without the explicit prior written permission of Fusion Media and/or the data provider. All intellectual property rights are reserved by the providers and/or the exchange providing the data contained in this website.
Fusion Media may be compensated by the advertisers that appear on the website, based on your interaction with the advertisements or advertisers.
© 2007-2024 - Fusion Media Limited. All Rights Reserved.