Skip to main content

Report suggests local election officials’ emails could be at risk for phishing attempts Cybersecurity firm Area 1 found 666 of 10,000 election workers used personal email accounts

Photo by JEFF KOWALSKY/AFP via Getty Images

Many election officials across the US are using email systems that could make them more susceptible to phishing attempts, according to a new report in The Wall Street Journal. Area 1 Security found less than 20 percent of 10,000 state and local election administrations had advanced anti-phishing controls in place, and about 666 of the election officials were relying on personal email addresses for election-related matters.

Jurisdictions in several states were using a version of free Exim software that Russia’s GRU intelligence service had targeted for online attacks starting in 2019, according to the Journal. Security experts told the Journal it was unlikely that weak email security would lead to vote hacking, however, since the email systems aren’t connected to systems that count votes.

But it raises concerns that local election officials may be underprepared for possible intrusions into their email systems. GRU was accused of stealing and leaking emails from Hillary Clinton’s presidential campaign in 2016, and in 2018, GRU had registered web domains that appeared to spoof government web addresses, ostensibly for phishing purposes. Microsoft seized the domains before officials believe any damage was done.

And already this year, foreign hackers have targeted the personal email accounts of staffers working on the campaigns of presumptive Democratic nominee Joe Biden and President Trump. State-backed hackers from China tried to target staffers’ emails on the Biden campaign, while Iranian hackers targeted the Trump campaign staff’s emails. Google, which reported the attempts, said last month it had not seen evidence that those attacks were successful.


                                                                                                                           Source:The Verge

Comments

Popular posts from this blog

Install Aircrack-ng on Ubuntu linux OS

Install Aircrack-ng on Ubuntu -AnoxBotox Aircrack-ng is a whole suite of tools for Wireless Security Auditing. It can be used to monitor, test, crack or attack Wireless Security Protocols like WEP, WPA, WPA2. Aircrack-ng is command line based and is available for Windows and Mac OS and other Unix based Operating systems. Aircrack-ng suite contains a lot of tools used for various purposes but here we’ll only look at some important tools that are used more often in Wireless Security testing. Airmon-ng Airmon-ng is used to manage wireless card modes and to kill unnecessary processes while using aircrack-ng. To sniff a wireless connection, you need to change your wireless card from managed mode to monitor mode and airmon-ng is used for that purpose. Airodump-ng Airodump-ng is a wireless sniffer that can capture wireless data from one or more wireless Access Points. It is used to analyze nearby Access Points and to capture handshakes. Aireplay-ng Aireplay-ng is use...

How to hack Facebook account using bruteforce attack in termux(no need any password file) 2020

By AnoxBotox Hello guys,   Today I will tell you about how to hack Facebook account using termux. For that we using bruteforce tool in termux. Installation command :- ☆ pkg install git ☆ pkg install python3 ☆ pip3 install requests bs4 ☆ git clone https://github.com/IAmBlackHacker/Facebook-BruteForce Uses :- ☆ cd Facebook-BruteForce ☆ python3 fb.py Now enter victim email/username That's it. Now your Attack will be start & wait for cracking password. It takes some time. Facebook hacking   Termux Tutorials                                                                                                   source:coolzgeeks.blogspot.com  

इटहरीमा हाम्रो समाज डेन्टल क्लिनिक संचालनमा - यसको सुविधाहरू र सेवाहरू

हाम्रो समाज डेन्टल क्लिनिक     इटहरी उपमहानगर पालिका अगाडी