| 
		Exclusive: U.S. officials fear ransomware attack against 2020 election
		 Send a link to a friend 
		
		 [August 27, 2019] 
		By Christopher Bing 
 WASHINGTON (Reuters) - The U.S. government 
		plans to launch a program in roughly one month that narrowly focuses on 
		protecting voter registration databases and systems ahead of the 2020 
		presidential election.
 
 These systems, which are widely used to validate the eligibility of 
		voters before they cast ballots, were compromised in 2016 by Russian 
		hackers seeking to collect information. Intelligence officials are 
		concerned that foreign hackers in 2020 not only will target the 
		databases but attempt to manipulate, disrupt or destroy the data, 
		according to current and former U.S. officials.
 
 “We assess these systems as high risk,” said a senior U.S. official, 
		because they are one of the few pieces of election technology regularly 
		connected to the Internet.
 
 The Cybersecurity Infrastructure Security Agency, or CISA, a division of 
		the Homeland Security Department, fears the databases could be targeted 
		by ransomware, a type of virus that has crippled city computer networks 
		across the United States, including recently in Texas, Baltimore and 
		Atlanta.
 
		
		 
		
 “Recent history has shown that state and county governments and those 
		who support them are targets for ransomware attacks,” said Christopher 
		Krebs, CISA's director. “That is why we are working alongside election 
		officials and their private sector partners to help protect their 
		databases and respond to possible ransomware attacks.”
 
 A ransomware attack typically locks an infected computer system until 
		payment, usually in the form of cryptocurrency, is sent to the hacker.
 
 The effort to counter ransomware-style cyberattacks aimed at the 
		election runs parallel to a larger intelligence community directive to 
		determine the most likely vectors of digital attack in the November 2020 
		election, according to current and former U.S. officials.
 
 “It is imperative that states and municipalities limit the availability 
		of information about electoral systems or administrative processes and 
		secure their websites and databases that could be exploited,” the FBI 
		said in a statement, supporting the Homeland Security initiative.
 
 CISA's program will reach out to state election officials to prepare for 
		such a ransomware scenario. It will provide educational material, remote 
		computer penetration testing, and vulnerability scans as well as a list 
		of recommendations on how to prevent and recover from ransomware.
 
 These guidelines, however, will not offer advice on whether a state 
		should ultimately pay or refuse to pay ransom to a hacker if one of its 
		systems is already infected.
 
 “Our thought is we don’t want the states to have to be in that 
		situation,” said a Homeland Security official. “We’re focused on 
		preventing it from happening.”
 
 [to top of second column]
 | 
            
			 
            
			A woman wears an "I Voted Today" sticker at a polling place during 
			the midterm election in Ponte Vedra Beach, Florida, U.S., November 
			6, 2018. REUTERS/Carlo Allegri 
            
 
            Over the last two years, cyber criminals and nation state hacking 
			groups have used ransomware to extort victims and create chaos. In 
			one incident in 2017, which has since been attributed to Russian 
			hackers, a ransomware virus was used to mask a data deletion 
			technique, rendering victim computers totally unusable.
 That attack, dubbed “NotPetya,” went on to damage global 
			corporations, including FedEx and Maersk, which had offices in 
			Ukraine where the malware first spread.
 
 The threat is concerning because of its potential impact on voting 
			results, experts say.
 
 “A pre-election undetected attack could tamper with voter lists, 
			creating huge confusion and delays, disenfranchisement, and at large 
			enough scale could compromise the validity of the election,” said 
			John Sebes, chief technology officer of the ESET Institute, an 
			election technology policy think tank.
 
 The databases are also “particularly susceptible to this kind of 
			attack because local jurisdictions and states actively add, remove, 
			and change the data year-round,” said Maurice Turner, a senior 
			technologist with the Center for Democracy and Technology. “If the 
			malicious actor doesn’t provide the key, the data is lost forever 
			unless the victim has a recent backup.”
 
 Nationwide, the local governments that store and update voter 
			registration data are typically ill-equipped to defend themselves 
			against elite hackers.
 
 State election officials told Reuters they have improved their cyber 
			defenses since 2016, including in some cases preparing backups for 
			voter registration databases in case of an attack. But there is no 
			common standard for how often local governments should create 
			backups, said a senior Homeland Security official.
 
            
			 
            
 “We have to remember that this threat to our democracy will not go 
			away, and concern about ransomware attacks on voter registration 
			databases is one clear example,” said Vermont Secretary of State Jim 
			Condos. “We’re sure the threat is far from over.”
 
 (Reporting by Christopher Bing; Editing by Steve Orlofsky)
 
		[© 2019 Thomson Reuters. All rights 
			reserved.] Copyright 2019 Reuters. All rights reserved. This material may not be published, 
			broadcast, rewritten or redistributed.  
			Thompson Reuters is solely responsible for this content. |