Story image

Expert: Farce involving Russia’s US elections breach needs resolving

05 Mar 2018

For quite some time there has been scandal surrounding the 2016 US Presidential election, with many believing Russia was maliciously involved.

And now multiple US officials have announced the US intelligence community had substantial evidence that state websites or voter registration systems in seven states were compromised by Russian-backed cybercriminals prior to the 2016 election – and they never told the affected states.

These states as of January 2017 were reported to have been Alaska, Arizona, California, Florida, Illinois, Texas, and Wisconsin.

Some of the breaches were more serious than others and ranged from entry into state websites to penetration of actual voter registration databases.

Washington officials were reported to have informed several of those states leading up to the election that there were foreign parties delving into their systems, but none were told that it was the Russian government.

The debate about whether or not the states were notified is ongoing with the Department of Homeland Security’s acting press secretary Tyler Houlton reporting the news to be ‘inaccurate’ and ‘misleading’ in a series of tweets.

Regardless, it’s clear that there is a relationship that needs strengthening between the federal government and state governments in the electoral area to improve cybersecurity, and the same is probably true around the world.

High-Tech Bridge CEO Ilia Kolochenko says the whole farce needs to be resolved sooner rather than later.

"If these allegations are true, we are likely dealing with an unprecedented scale of attack that deserves the most rigorous technical investigation and a proportional response. However, so far we are mainly dealing with a number of isolated, often contradictory facts and testimonies from various conflicting sources,” says Kolochenko.

“For example, the breach of a state website will unlikely have any direct consequences on the election outcomes. Many adduced facts - are excerpts from secret reports and thus can hardly be used to derive a reliable conclusion without reading the entire report.”

Kolochenko says for obvious reasons, or even technically impossible, to know who is pulling the strings of the attacks. But otherwise, such news stories may just give valuable hints to the attackers to destroy some unexpected evidence and hinder the investigation.

"The alleged interference with the elections - is a matter of public interest and society deserves to know the truth about it,” Kolochenko says.

“I think a close cooperation between federal agencies can shed some light on the scope and material consequences (if any) of the alleged attacks. In the meantime, Federal and State governments should enhance their cybersecurity strategy and urgently allocate additional budget for national defense against cyber-attacks."

Salesforce continues to stumble after critical outage
“To all of our Salesforce customers, please be aware that we are experiencing a major issue with our service and apologise for the impact it is having on you."
D-Link hooks up with Alexa and Assistant with new smart camera
The new camera is designed for outdoor use within a wireless smart home network.
Slack users urged to update to prevent security vulnerability
Businesses that use popular messaging platform Slack are being urged to update their Slack for Windows to version 3.4.0 immediately.
Secureworks Magic Quadrant Leader for Security Services
This is the 11th time Secureworks has been positioned as a Leader in the Gartner Magic Quadrant for Managed Security Services, Worldwide.
Google puts Huawei on the Android naughty list
Google has apparently suspended Huawei’s licence to use the full Android platform, according to media reports.
Using data science to improve threat prevention
With a large amount of good quality data and strong algorithms, companies can develop highly effective protective measures.
General staff don’t get tech jargon - expert says time to ditch it
There's a serious gap between IT pros and general staff, and this expert says it's on the people in IT to bridge it.
ZombieLoad: Another batch of flaws affect Intel chips
“This flaw can be weaponised in highly targeted attacks that would normally require system-wide privileges or a complete subversion of the operating system."