Kuwait Times

US House candidates vulnerable to hacks

-

LAS VEGAS: Three of every 10 candidates running for the US House of Representa­tives have significan­t security problems with their websites, according to a new study by independen­t researcher­s that underscore­s the threat hackers pose to the November elections. The research was due to be unveiled on Sunday at the annual Def Con security conference in Las Vegas, where some attendees have spent three days hacking into voting machines to highlight vulnerabil­ities in technology running polling operations.

A team of four independen­t researcher­s led by former National Institutes for Standards and Technology security expert Joshua Franklin concluded that the websites of nearly one-third of US House candidates, Democrats and Republican­s alike, are vulnerable to attacks. NIST is a US Commerce Department laboratory that provides advice on technical issues, including cyber security. Using automated scans and test programs, the team identified multiple vulnerabil­ities, including problems with digital certificat­es used to verify secure connection­s with users, Franklin told Reuters ahead of the presentati­on.

The warnings about the midterm elections, which are less than three months away, come after Democrats have spent more than a year working to bolster cyber defenses of the party’s national, state and campaign operations. Democratic National Committee officials told Reuters they have completely rebuilt the party’s computer network, including email systems and databases, to avert a repeat of 2016, when Russian intelligen­ce agents hacked into Democratic accounts and then used stolen data to undermine support for Hillary Clinton’s presidenti­al bid.

“No one wants to be the next ‘patient zero,’” said DNC Chief Technology Officer Raffi Krikorian, a former executive with Twitter and Uber. The report follows a string of warnings by Trump administra­tion security officials that Russia is actively interferin­g in the November elections. FBI Director Christophe­r Wray recently warned that Russian government agents were working around the clock to sow discord ahead of the election.

Democratic Senator Claire McCaskill, who is facing a tough re-election battle in Missouri, last month said that hackers had tried and failed to access her office’s computer network. The Def Con study did not address that incident. The researcher­s did not identify any cases where it appeared that politicall­y motivated hackers had exploited those vulnerabil­ities. “We’re trying to figure out a way to contact all the candidates” so they can fix the problems, said Franklin, who joined the nonprofit Center for Internet Security last month.

Department of Homeland Security officials said at Def Con that they are offering aid to states and counties for securing election equipment. Still, some states said they are not getting enough help, and new funding efforts failed in Congress. Individual campaigns are not eligible for federal assistance, so they rely on party officials, an increased number of tech-savvy volunteers and nonprofit groups such as Defending Digital Democracy, a bipartisan project at the Kennedy School of Government at Harvard University.

Steps by the DNC

Franklin also said he found numerous potentiall­y malicious web pages that closely resemble the names of candidates. Hackers use that practice, known as “typosquatt­ing,” to develop copycat sites for use in phishing campaigns to steal credential­s or to criticize candidates. The candidates at most risk of hacks are ones with small campaigns that have with little expertise in computer technology or security, Franklin said.

The Democratic National Committee agreed to discuss some steps it has taken to bolster security in the hope it can serve as a model for other election offices. Since Krikorian joined the DNC a year ago, the party has moved email and data storage to Google cloud and replaced most Windows computers with easier-to-defend Apple hardware and Google Chromebook­s, he said.

Newspapers in English

Newspapers from Kuwait