• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Data Protection  /  What kind of cyber threats loom over elections?
21 January 2019

What kind of cyber threats loom over elections?

Written by Sanjay Katkar
Sanjay Katkar
Data Protection
  • 8.1K
    Shares
Estimated reading time: 3 minutes

Election hacking is among the most controversial and hotly-debated topics of today. For good reason too, free and fair elections are one of the major elements that make up a democratic society. It’s one of the tools for a peaceful transition of power in a state.

Hence, if there is any shadow or question about whether the elections were fair or not, it’s liable to plunge the entire state into anarchy. That is why election hacking is such a controversial topic.

State-sponsored attacks

Cyber attacks refer to the deliberate exploitation of computer systems, technology-dependent enterprises, and networks. When a particular nation or state uses cyber attacks to perpetrate another nation’s cyber systems or networks, it is considered a state-sponsored cyber attack. The impact of these kinds of attacks is only growing – according to former CIA director Leon Panetta, the next form of war the US could face was a “cyber-Pearl Harbor”.

State-sponsored cyber attacks can be of different types. According to the context in which it takes place, it can be labeled as cyber campaign, cyber warfare or cyber terrorism.

  • Cyber campaign alone is generally used by a state to influence the perception of the citizens of another country regarding the policies or actions of the former.
  • Cyber warfare utilizes techniques of defending and attacking information and computer networks that inhabit cyberspace, often through a prolonged cyber campaign or a series of related campaigns.
  • Cyber-terrorism, on the other hand, is “the use of computer network tools to shut down critical national infrastructures (such as energy, transportation, government operations) or to coerce or intimidate a government or civilian population.

The entire objective behind all these different types though is the same: damaging critical infrastructures and computer systems

Pre-Voting Manipulation

Create chaos and hostility. That, in a nutshell, describes the strategy used to manipulate agendas before electors go in to vote. This is basically a communication strategy using digital channels. It is subtle and can often go unnoticed. Basically, external hackers look to sow discord and create confusion in the minds of the voters. The Cambridge Analytica scandal was an important example. Using data collected of thousands of Facebook users, specific ads were showcased to targeted users.

There was also the hacking of emails from the DNC, mentioned earlier, which is also part of the tactic of manipulating voters. Another common tactic which is a part of this strategy is spreading fake news, whether in the form of tweaking a new report or deliberately spreading lies.

Manipulation of Votes and Voting Machines

This is a more direct way of hacking elections. Hackers basically manipulate voting infrastructure, whether voter logs, voting software and machines to influence elections. There have been many allegations, in the US and other countries that voting machines have been used to rig elections. While these have been strenuously denied, the fact remains that it is a distinct possibility.

It was alleged that Russian hackers tried to delete or alter voter data in systems in a total of 39 US states. It has also repeatedly been proved that voting machines can be exploited – at a DEFCON hacking conference, a voting machine used in 18 states was hacked in two minutes.

Causing Disruption

The third strategy is causing disruption before, after or during Election Day. This could be in the form of deleting or corrupting voter logs, causing substantial delays. After the 2016 US Election, the country’s Department of Homeland Security revealed that it had notified 21 states of Russian efforts to hack voter registration files or public election sites. Personal information for thousands of voters was breached in Illinois while a breach of a smaller level (username and password of a single official) happened in Arizona

In a similar vein, Distributed Denial of Service (DDoS) attacks are also urged to target election-related websites to cause disruption. One such attack caused a result-reporting website to crash during a municipal primary in Tennessee along with two DDoS attacks on Democratic campaigns. A DDoS attack also occurred on a website opposing a Mexican presidential candidate during a debate in 2018 while Russian officials claimed they also suffered a similar attack.

Elections coming under scrutiny are dangerous for the entire world as it could incite violence and uncertainty. Important elections are coming up in many different countries, including India’s General Election in 2019 and it is up to the election officials to ensure there is a fair and free vote without interference from external forces. Considering India’s neighborhood, its place in the world as among the fastest-growing economies and the number of non-friendly actors around it (China, Pakistan, etc.), the chances of state-sponsored cyber attacks can be high.

Seqrite is the enterprise security brand of Quick Heal Technologies Ltd., which offers
world-class enterprise cybersecurity solutions.

This is the first article in the #SeqriteOnElectionSecurity series. Watch this space to get more updates on the protection of citizens and voting infrastructure from cyber threats during elections.

 Previous PostHow to reduce the risk of data leakage when an employee is Out Of...
Next Post  GandCrab Ransomware along with Monero Miner and Spammer
Sanjay Katkar
About Sanjay Katkar

Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of Quick Heal Technologies Limited. He holds a Masters in Computer Science from University...

Articles by Sanjay Katkar »

Related Posts

  • The Indian Defence becoming the top target of information warfare.

    Attacks on the defence sector could prove very costly!

    October 16, 2020
  • Have you considered security risks when moving to the cloud?

    Are you making these common public cloud migration mistakes?

    October 9, 2020
  • Are you doing enough to protect your sensitive data?

    Did you know that adversaries are planning to steal your data?

    September 11, 2020

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • RAT used by Chinese cyberspies infiltrating Indian businesses RAT used by Chinese cyberspies infiltrating Indian businesses December 18, 2020
  • How can EdTech companies deal with rising security challenges? How can EdTech companies deal with rising security challenges? December 24, 2020
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Are we prepared against risks generating from the IoT revolution?

    Are we prepared against risks generating from the IoT revolution?

    January 15, 2021
  • Proactiveness is the key to resolving hybrid cloud’s security challenges

    Proactiveness is the key to resolving hybrid cloud’s security challenges

    January 6, 2021
  • How can EdTech companies deal with rising security challenges?

    How can EdTech companies deal with rising security challenges?

    December 24, 2020

Stay Updated!

Topics

Antivirus For Linux (10) Antivirus For Server (9) BYOD (9) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (274) cyber security (25) Cyber threat (29) cyber threats (44) Data (10) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) incident response plan (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (54) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.