Vulnerable to Hackers and Errors
The wide examples here show that hacks and software errors
can be reduced but not prevented. The widespread The only protection is to detect errors and recover, which means
independently checking the counts. Reputable software has hundreds
of bugs, and annual updates have bugs. Chinese,
Russians,
other countries,
and organized
crime have infiltrated everywhere worth infiltrating. The SolarWinds
hack is one of many similar (as yet undiscovered) infestations
which affect all organizations. Policy
makers need a broader, longer term view than software designers.
Contents of
This Page
B. Election Hacking, With Unknown Results
D. Future Hacks
A. ELECTION MACHINE ERRORS
B. ELECTION VULNERABILITIES, WITH UNKNOWN RESULTS
1. 2022 tests found that 30% of workers fall for phishing
attacks in technology companies (election vendors would be in this
category), and 25% in government.. These dropped to 5% after a year of regular
anti-phishing training and monthly simulated phishes, so companies or
governments with hundreds of workers stay very vulnerable.
2. On 6/3/2022, CISA warned states about several vulnerabilities in Dominion
ballot marking devices.
3. On 11/4/2020, before any state had audited election results, the
federal government assured
voters that "Robust safeguards including canvassing and auditing
procedures help ensure the accuracy of official election results." And
11/12/2020 they said "The November 3rd election was the most
secure in American history" still before audits were done. These were the same federal officials who had not noticed their own
systems had been infiltrated by Russian hackers for 8
months. Yet they were sure all 15,000 election jurisdictions were secure. Commentary
narrowed their claims.
4. As of 2019, researchers have found security
flaws in all election computers, which let voters, staff members or
outsiders disrupt or change results, often without detection.
5. Through 2019, Russia has spent billions of dollars on a decade of work
to create broad-based
new ways to attack election computers (zero days), using independent teams
so they don't reveal each other's methods.
6. In July 2018 the FBI told Maryland officials that a local web
hosting company they used for voter registration, candidacy, online ballot
delivery, and election results had been owned since 2015 (or 2011) by a company financed by Vladimir Potanin, a Russian
oligarch close to Putin. The manager is a Russian millionaire, Guerman Aliev, who took an
American name, Gerald T. Banks. Maryland's Senate President said the FBI "weren't really anxious for us to come forward"
to tell the public (quote is at 6:54 in video). FBI also told state officials
in 2017 not to tell the public about foreign intrusion attempts (pages 146-151 of court filing).
7. In March 2018 the security site CSO found on the dark web over 100 emails of workers at one of the
largest companies making and programming election machines, ES&S, and
smaller numbers at smaller voting machine companies. They also found passwords
for the accounts, though the companies said these passwords did not meet their
current standards, so would have been changed. Nevertheless with valid emails,
attackers can spray password variations until they log in on at
least one of the accounts and install malware. Hackers share tips on the dark web.
8. From August 2017 to March 2018 Georgia's election software was on the
public web without passwords or encryption (pages 140-143, 153-163 of court filing, news).
9. In August 2017 the biggest manufacturer of voting machines, Election Systems & Software, created
a public file on Amazon Web Services with "encrypted versions of passwords for ES&S employee accounts. The
encryption was strong enough to keep out a casual hacker but by no means
impenetrable...The worse-case scenario is that they could be completely
infiltrated right now".
10. In May 2019 the FBI told Florida officials 2 counties' voter
registration systems had been penetrated by Russia in 2016. The FBI could not say if the Russians changed the files,
and only revealed anything because the Mueller Report did. The counties were Washington and one other.
11. In 2016, "We can assume that the majority of states were probably
a target... I want to make clear today on the record, it's likely that all 50
states were likely affected... Every organization is scanned a lot, sometimes
thousands of times a day. What we were trying to differentiate between: we saw
very concerning activity from known suspicious servers in this case... They
were targeting to look for vulnerabilities... Probably tried all the states.
These are the states we could see they were trying. That's right." ~US Department of Homeland Security Senate
hearing at 41 minutes.
12. They attacked "in alphabetical order by state name... voter
registration and election results sites... to identify and exploit SQL database
vulnerabilities in webservers and databases. The FBI and DHS... noted that they had no
information on how many of those attempts were successful, aside from two
instances"
13. August 24, 2016, hackers sent phishing emails to seven workers at VR Systems, which provides voter
registration systems and election-night reporting. "At least one of the employee accounts was likely compromised."
Then on October 27 they used VR Systems credentials to send phishing emails to
122 local election officials. If they opened it, it installed malware which
opened a persistent back door into the computer. At least 10
computers were harmed (¶77b). The government has not said and may
not know what the hackers did with their back door. Mueller's indictment July
13, 2018 confirms these events (¶73-77) and adds that the hackers targeted more
than one election company (¶69). 2 years after the election, the
press revealed that VR Systems had a common practice of remotely accessing county election systems, to
troubleshoot them, up to the day before the election.
14. Also in 2016 hackers sent emails pretending to be from another election vendor, offering
"election-related products and services." The same hackers sent
emails to election workers in American Samoa "mimicking a legitimate absentee ballot-related service provider."
NSA does not know what they accomplished with any of
these attacks.
15. In 2016 Georgia, Indiana and Idaho said the US Dept. of Homeland
Security tried to bypass firewalls in election systems without permission. Kentucky and West Virginia said DHS probes of
their systems were not malicious.
16. Ukraine's 2014 election results were hacked, but
officials removed a virus and believe they had correct totals. South Africa's 1994 election was hacked, and
officials hand-compiled the counts, as noted at right.
17. A 2007 study for the Ohio Secretary of State reported on election
software from ES&S, Premier and Hart. Besides specific problems it found,
it noted that all "election systems rely heavily on third
party software that implement interfaces to the operating systems, local
databases, and devices such as optical scanners... the construction and
features of this software is unknown, and may contain undisclosed
vulnerabilities such trojan horses or other malware."
C. BEST-DEFENDED INDUSTRIES
This list shows that companies' computers will never be
bug-proof or hack-proof, since problems happen at even the best-defended
industries. Hacks and bugs can be reduced but not prevented. The only
protection is to detect errors and
recover, which means independently checking election tallies.
1. 2022 China runs
"a coordinated campaign on a grand scale... Seeking to bend our economy,
our society, our attitudes to suit the Chinese Communist Party’s interests...
the Chinese Communist Party is interested in our democratic, media and legal
systems. Not to emulate them, sadly, but to use them for its gain... But the
right model can’t be to scale the operational agencies to somehow take on all
of this activity."
2. 2022
Homeland Security staff have been charged with helping China.
3. 2022
Organizations which discover they've been hacked don't improve defenses enough
to avoid future hacks.
4. 2022 "Managed
Service Providers This advisory defines MSPs as entities that deliver, operate,
or manage ICT services and functions for their customers via a contractual
arrangement, such as a service level agreement... Offerings may include
platform, software, and IT infrastructure services; business process and
support functions; and cybersecurity services... U.S. cybersecurity authorities expect
malicious cyber actors—including state-sponsored advanced persistent threat
(APT) groups—to step up their targeting of MSPs in their efforts to exploit
provider-customer network trust relationships."
5. 2022
Malware "offline and online delivery technique" is for sale for
$69/month or $249 lifetime use.
6. 2022
Defense staff & contractors need card reader at home to use secure systems.
Common reader has malware.
7. 2022
storage from SanDisk,
Sony, Lexar, and probably others has a flawed, breakable file encryption
system.
8. 2022
Defense Department still uses Chinese telecom & security equipment declared
insecure 3 years before. So do corporate jets and rural cell phone towers
(needed by election workers). Chinese companies are ending support in the US.
DOD use includes web-connected security cameras.
9. 2019-2022
Ragnar Locker ransomware infected "at least 52 entities ... in the
critical manufacturing, energy, financial services, government, and information
technology sectors,"
10. 2022
China has been using a hacking tool unnoticed for 10 years
11. 2022
NSA used a set of hacking tools for 10 years in 45 countries, primarily China,
Japan, Korea, Germany, Spain, India, Russia, Mexico and Italy.
12.
2022
DHS & Commerce report said, "The ubiquitous use of open-source
software can threaten the security of the software supply chain given its vulnerability
to exploitation... outsource firmware development to third party suppliers,
which introduces risks related to the lack of transparency into suppliers’
programming and cybersecurity standards." (Cartoon which they
didn't cite)
13. 2022
75% of US defense contractors fail government standards
14. 2021-2031
Ubiquitous Log4j
will allow attacks on computer for a decade. China requires its companies to
disclose vulnerabilities to the Chinese government when found, before they're
fixed.
15. 2021
58-80 vulnerabilities exploited in the wild before manufacturers knew of them
(zero-days). In 2020 there had only been 25-30. "For all types of actors,
a lot of bread-and-butter hacking still involves exploiting vulnerabilities
that became public long ago but haven't been patched consistently. Zero-days
are still less common. But by tracking which zero-days have already been
actively exploited, defenders can prioritize deploying certain patches and
mitigations in the endless stream of updates that need to be done."
16. 2021
University of Cambridge found a dangerous vulnerability in at least 19
compilers (used in all commercial software), it gave 99 days
notice, and only 9 of the 19 said they'd fix it. (Horrifyingly, 2
require that bug reports come in by non-encrypted email). Software companies
tended to ignore
bugs which used an unfamiliar approach.
17. 2021 2/3
of organizations have had ransomware attacks and most multi-factor authentication
is vulnerable.
18. 2021 US military generally
omits cybersecurity from contracts for weapons systems.
19. 2021
Australian sites pervasively hacked by Chinese actors, "state actor activity
often goes unnoticed by targets, who only find out they’ve been compromised
from government officials or outside threat analysts,"
20. In Jan-March 2021
30,000-250,000
email systems were hacked by a previously unnoticed Chinese team, with software
which also leaves a backdoor in the organization's computers. The hack started
by Jan 3, was reported to Microsoft Jan 5, became widely used in late February,
and a patch
was issued March 2, though thousands more systems per hour were still being
hacked by at least 5
groups on March 3. The vulnerabilities in the software had been present
since at least 2010. A different Microsoft email hack was in Jan-March 2019.
All computer systems are now targeted
by nation-states, though cloud systems may get patched faster.
21. In 2020,
the US government and worldwide companies were infiltrated broadly by a hacked
update of Orion computer management software from SolarWinds company. 2021 summary.
The company used password solarwinds123 from 2017-2019. As an update, it was
installed in air-gapped
systems as well as internet-connected ones (partial list of victims).
At the same time a separate
Chinese hack also infiltrated Orion's code and its customers. It's the tip
of an iceberg: "Chinese, others, they've all built huge capabilities,
they're well-resourced, well-staffed, [and] focused on doing exactly this. This
is not a one-off, this is not something unusual... I guarantee you that there
are other operations similar in size and scope, if not larger, that haven't
been discovered." Federal systems watched for known
problems, not for connections to previously
unknown servers. Sure enough, the Chinese
had been hacking through SolarWinds at the same time.
22. The depth of CIA infiltration of
China has led to China
espionage teams in 2010-2021 becoming much more professional and wanting
the same depth of infiltration in the US.
23. US energy companies in 2018-2020
and "a wide range of US-based organizations, state and federal government
agencies, and educational institutions," hacked by Russia.
24. Domain registrars for entire
countries in 2018-19, letting hackers spy on and change emails
and web results throughout the country. The registrars succumbed to phishing.
25. Phone calls for several years up to 2019
26.
Homeland Security
in 2019, through a contractor
27.
Attacks rising in 2018
28.
Encryption hacked by NSA and Germany 1960s-2018, first seen in 1995
29.
2018
Defense Department kept buying and using Lexmark printers and Hikvision
security cameras despite knowing China can conduct surveillance through them.
30.
Chinese hacked most of the biggest providers
of cloud computing in 2010-2017, including IBM, 224 systems at Hewlett
Packard Enterprise, Computer Sciences Corp, Fujitsu, Tata Consultancy, NTT
Data, and many other firms through them, including the US Navy's biggest
shipbuilder (incl. nuclear submarines), Sabre reservations for thousands of
hotels and hundreds of airlines (so they could surveil all traveling
executives), Ericsson telecoms, biotech firm Syngenta, which was then bought by
Chinese. Hacks continued to succeed even after they were noticed and defenses
mounted. They gathered hundreds of login credentials. Many hacked companies
were not told, and if told they denied they lost anything.
31.
Electric grid air-gapped computers hacked in 2014, 2016-2018 (and US in 2012-2019 Russian and Iranian grids)
32.
In
2017, using NSA software, "hackers from North
Korea were using some of those picklocks to break into the computer systems
of, among other places, British hospitals, German railways, Russian banks, a
French automaker, Indian airlines, Chinese universities, the Japanese police,
FedEx, and electrical-utility companies all over the United States...
WannaCry."
33.
CIA air-gapped computers in 2017. Investigation has found circumstantial
evidence and a mistrial, so punishment
for the leaker(s) is not assured.
34.
"Deloitte
in 2017
35.
NSA air-gapped computers in 2016, followup in 2017
36.
CIA in 2011-15 had "A major concern... that
the Russians were collecting information from a breach of computers not connected to the Internet... The CIA had
already figured out how to perform similar operations themselves."
37.
FBI in 2011-2016 radio encryption decrypted by Russia
38.
DoD in 2007, Jan and June 2015, 2016, so DoD pays bug bounties. In 2018,
GAO staff "were able to take control of [DOD weapons] systems
relatively easily and operate largely undetected." Alarms went off so
often the operators ignored them.
39.
Securities and Exchange Commission in 2016
40.
OPM security clearances in 2015 (details) $63 million settlement
41.
Mozilla in 2015
42.
General Electric/Safran aircraft engine designs
hacked by China 2010-2015
43.
Boeing (jet fighters) in 2008-2014
44. 1,000 oil and gas companies in 84 countries, 2012-2014
45. 2014
"there
are two kinds of big companies in the United States. There are those who've
been hacked by the Chinese and those who don't know they've been hacked by the
Chinese... Their strategy seems to be: We'll
just be everywhere all the time."
46. By 2013
the NSA "appeared
to have acquired a vast library of invisible backdoors into almost every major
app, social media platform, server, router, firewall, antivirus software,
iPhone, Android phone, BlackBerry phone, laptop, desktop, and operating
system."
47.
Nuclear and other companies in 2006-2014
48.
Google in 2010, 2014, so they pay bug
bounties
49.
"In 2008,
Russia got into a network at the Pentagon; hackers broke into the campaigns of
both Barack Obama and John McCain; the next year, North Korea compromised the
Web sites of everything from the Treasury Department to the New York Stock
Exchange. In 2010, a computer worm called Stuxnet... NSA’s sponsors—American
taxpayers—who now relied on NSA-compromised technology not only for
communication but for banking, commerce, transportation, and health care. And
nobody apparently stopped to ask whether in their zeal to poke a hole and
implant themselves in the world’s digital systems, they [NSA] were rendering
America’s critical infrastructure—hospitals, cities, transportation,
agriculture, manufacturing, oil and gas, defense; in short, everything that
undergirds our modern lives—vulnerable to foreign attacks.
50.
Microsoft in 2000, 2013, and can be slow to protect customers
51.
Military contractors in 2007-2010 and 2013
52.
Symantec in 2012
53.
State lotteries in 2005-2011 (CO, IA, KS, OK, WI; security director
sentenced in 2017)
54.
Programmers'denial of reality codified in
2003.
55.
Moonlight Maze 1996-1999
documents taken from US military, other government agencies, and military
contractors.
56.
"In 1968,
the Pentagon’s Defense Science Board Task Force on Computer Security concluded
that “contemporary technology cannot provide a secure system in an open
environment."
D. FUTURE HACKS (and recent advisories)
6. In 2021 Bruce Schneier
wrote "The president of the United States is a singular espionage
target, but so are members of his staff and other administration officials.
Members of Congress are targets, as are governors and mayors, police officers
and judges, CEOs and directors of human rights organizations, nuclear power
plant operators, and election officials. All of these people have smartphones,
tablets, and laptops.
Many have Internet-connected cars and appliances, vacuums, bikes, and
doorbells. Every one of those devices is a potential security risk, and all of
those people are potential national security targets. But none of those people
will get their Internet-connected devices customized by the NSA."