Ongoing Russian Cyberattacks Are Targeting U.S. Election Systems, Feds Say

Active Russian cyberattacks are targeting a wide swath of American government networks, including those involved with the ongoing election, federal authorities revealed Thursday.

- Advertisement -

The focus of the effort include “U.S. state, local, territorial, and tribal government networks, as well as aviation networks,” according to a new bulletin from the FBI and the Cybersecurity and Infrastructure Security Agency.

It continued: “As this recent malicious activity has been directed at … government networks, there may be some risk to elections information … However, the FBI and CISA have no evidence to date that integrity of elections data has been compromised.”

U.S. officials said separately on Thursday afternoon that systems in two local government jurisdictions had been accessed, granting attackers admission to some limited data about voters.

The announcement followed one day after an in-person briefing by Director of National Intelligence John Ratcliffe and FBI Director Christopher Wray in which they warned about Russian interference as well as an Iranian scheme to intimidate voters with spoof emails.

- Advertisement -

The agencies involved have been warning for months, including with similar bulletins about cyberrisks confronting U.S. elections infrastructure, which they have suggested likely would focus on systems adjacent to core operations — such as a website that shows results — as opposed to the casting and counting of ballots themselves.

Ratcliffe, Wray and others have warned about the prospect that influence-mongers could exploit the headlines about cyberattacks, and some potential real exploits, to make claims about compromised election systems that might not be legitimate.

“We’ve been working for years as a community to build resilience in our election infrastructure — and today that infrastructure remains resilient,” Wray said on Wednesday evening. “You should be confident that your vote counts. Early, unverified claims to the contrary should be viewed with a healthy dose of skepticism.”

The bulletin on Thursday alluded to the prospect that the network activity detected by U.S. authorities could enable attackers to access sensitive systems, including even by printing access badges.

And even though American authorities said they’ve detected no disruptions, “the [attackers] may be seeking access to obtain future disruption options, to influence U.S. policies and actions, or to delegitimize … government entities.”

- Advertisement -

It wasn’t immediately clear how or whether the U.S. might respond to the Russian cyberattacks discussed on Thursday afternoon, but earlier in the day the Treasury Department announced it has sanctioned a number of Iranian government entities in connection with what U.S. officials called their interference in the election.

Also Read:

YOU MIGHT LIKE

Download (Google Camera) Gcam 7.3 APK mod for all Android devices

Gcam (Google Camera) is a camera phone application developed by Google for Android. It was initially supported on all devices running Android 4.4 KitKat and higher but is now only officially...

Moto G 5G launched in India

Motorola has launched its mid-range smartphone Moto G 5G in India . This smartphone has been launched in gray and silver colors and this Android One smartphone will be available on Flipkart from 7...

Several Unpatched Popular Android Apps Put Millions of Users at Risk of Hacking

A number of high-profile Android apps are still using an unpatched version of Google's widely-used app update library, potentially putting the personal data of...

Moto G 5G VS Oneplus Nord

Moto G series is one of the most recognized series in the Indian smartphone market. They had been doing great with their G series...

Hackers are Targeting the COVID-19 Vaccine Supply Chain, IBM finds

A global phishing campaign has been targeting organizations associated with the distribution of COVID-19 vaccines since September 2020, IBM security researchers say. In a blog post,...

Leave A Reply

Please enter your comment!
Please enter your name here