“The Russians are Coming!”
The cry “The Russians are Coming!” has taken on new meaning as a result of increased cyber threats from Russian hackers. While corporate, financial, and federal networks have been targets for quite some time, multiple state government election databases were recently breached. First the infamous DNC hack, and now an investigation into the election database hacks of Illinois and Arizona.
According to eWeek, “The U.S. government is taking the threat seriously enough that Secretary of Homeland Security Jeh Johnson held a conference call with state election officials on Aug. 15 to discuss the need for increased security of election sites and to encourage state election officials to follow the recommendations of the National Institute of Standards and Technology and the Department of Justice in securing their systems.”
While the FBI investigates the incidents and the motives behind them, budget constrained state governments need to proactively address security gaps that can make them vulnerable.
What can be done to shore up security?
According to a study by the Institute for Critical Infrastructure Technology election systems lack adequate security:
“More often than not, electronic voting systems are nothing but bare-bone, decade old computer systems that lack even rudimentary endpoint security. As an exponential “security free” attack surface, compounded by the absence of cyber hygiene, black box technologies, and an expansive threat landscape, an adversary needs only to pick a target and exploit at will.”
State agencies need to get aggressive about security; patch systems, conduct penetration testing, control comprehensive physical access and force manufacturers to build more secure voting systems. Given the flaws in security and hacks that we know about, they also need to start proactively looking for malware and compromises that may already be on their systems quietly siphoning data unbeknownst to them.
Fortunately, there are tools that can help quickly assess the state of their systems and answer the crucial question “Are we hacked?” Infocyte HUNT does just this. It enables IT teams to proactively discover the presence of attackers, active or dormant, who have successfully evaded their organization’s defenses and established a beachhead within the network. Infocyte’s unique, agentless threat hunting platform is designed to rapidly assess network endpoints for evidence of compromise without a forensics expert. Unlike many other tools, Infocyte HUNT has been designed to be easy to use by regular administrators and IT Security professionals without any special training – making it a smart investment for budget constrained states.
Cyber threats from Russia, state-sponsored crime and hacktivists are not going away, but states can employ technology that doesn’t allow them to persist undetected. Learn more about how threat hunting improves security.
More from our blog
Despite the rich data provided by SIEMs, organizations find themselves drowning in false positives, making it difficult to focus on high-priority events. This problem of alert fatigue prevents cyber security teams from identifying and addressing real threats – impacting small teams with no SOC, large enterprise teams with a SOC, and MSSPs overseeing the security for many SOCs/customers.Read More »
In 2018, the U.S. Healthcare Industry Remained a Hot Target for Data Breaches. Last year alone, over 15 million patient records were affected with an average of one data breach occurring every 24 hours in the healthcare industry. It goes without saying that hackers and cyber attackers are finding ways around/through/past security defenses—exploiting vulnerabilities and…Read More »
A Brief History of Forensic State Analysis Prior to starting Infocyte, our co-founders, Chris Gerritz and Russ Morris, created the first enterprise-scoped threat hunting team for the entire U.S. Department of Defense. Their teams were responsible for hunting, detecting, and responding to highly sophisticated attacks across an 800,000-node network. With virtually unlimited resources and access…Read More »