Skip to main content

Report suggests local election officials’ emails could be at risk for phishing attempts Cybersecurity firm Area 1 found 666 of 10,000 election workers used personal email accounts

Photo by JEFF KOWALSKY/AFP via Getty Images

Many election officials across the US are using email systems that could make them more susceptible to phishing attempts, according to a new report in The Wall Street Journal. Area 1 Security found less than 20 percent of 10,000 state and local election administrations had advanced anti-phishing controls in place, and about 666 of the election officials were relying on personal email addresses for election-related matters.

Jurisdictions in several states were using a version of free Exim software that Russia’s GRU intelligence service had targeted for online attacks starting in 2019, according to the Journal. Security experts told the Journal it was unlikely that weak email security would lead to vote hacking, however, since the email systems aren’t connected to systems that count votes.

But it raises concerns that local election officials may be underprepared for possible intrusions into their email systems. GRU was accused of stealing and leaking emails from Hillary Clinton’s presidential campaign in 2016, and in 2018, GRU had registered web domains that appeared to spoof government web addresses, ostensibly for phishing purposes. Microsoft seized the domains before officials believe any damage was done.

And already this year, foreign hackers have targeted the personal email accounts of staffers working on the campaigns of presumptive Democratic nominee Joe Biden and President Trump. State-backed hackers from China tried to target staffers’ emails on the Biden campaign, while Iranian hackers targeted the Trump campaign staff’s emails. Google, which reported the attempts, said last month it had not seen evidence that those attacks were successful.


                                                                                                                           Source:The Verge

Comments

Popular posts from this blog

Install Aircrack-ng on Ubuntu linux OS

Install Aircrack-ng on Ubuntu -AnoxBotox Aircrack-ng is a whole suite of tools for Wireless Security Auditing. It can be used to monitor, test, crack or attack Wireless Security Protocols like WEP, WPA, WPA2. Aircrack-ng is command line based and is available for Windows and Mac OS and other Unix based Operating systems. Aircrack-ng suite contains a lot of tools used for various purposes but here we’ll only look at some important tools that are used more often in Wireless Security testing. Airmon-ng Airmon-ng is used to manage wireless card modes and to kill unnecessary processes while using aircrack-ng. To sniff a wireless connection, you need to change your wireless card from managed mode to monitor mode and airmon-ng is used for that purpose. Airodump-ng Airodump-ng is a wireless sniffer that can capture wireless data from one or more wireless Access Points. It is used to analyze nearby Access Points and to capture handshakes. Aireplay-ng Aireplay-ng is use...

The star cluster closest to Earth is in its death throes-Stars in the Hyades are moving so fast it will disintegrate in 30 million years

The closest cluster of stars to Earth is falling apart and will soon die, astronomers say. Using the Gaia spacecraft to measure velocities of stars in the Hyades cluster and those escaping from it, researchers have  predicted the cluster’s demise . “We find that there’s only something like 30 million years left for the cluster to lose its mass completely,” says Semyeong Oh, an astronomer at the University of Cambridge. “Compared to the Hyades’ age, that’s very short,” she says. The star cluster, just 150 light-years away and visible to the naked eye in the constellation Taurus, formed about 680 million years ago from a large cloud of gas and dust in the Milky Way. Stellar gatherings such as the Hyades, known as open star clusters, are born with hundreds or thousands of stars that are held close to one another by their mutual gravitational pull. But numerous forces try to tear them apart: Supernova explosions from the most massive stars eject material that had been binding the clust...

How to hack Facebook account using bruteforce attack in termux(no need any password file) 2020

By AnoxBotox Hello guys,   Today I will tell you about how to hack Facebook account using termux. For that we using bruteforce tool in termux. Installation command :- ☆ pkg install git ☆ pkg install python3 ☆ pip3 install requests bs4 ☆ git clone https://github.com/IAmBlackHacker/Facebook-BruteForce Uses :- ☆ cd Facebook-BruteForce ☆ python3 fb.py Now enter victim email/username That's it. Now your Attack will be start & wait for cracking password. It takes some time. Facebook hacking   Termux Tutorials                                                                                                   source:coolzgeeks.blogspot.com