Cybercriminals Could Steal Elections, Security Researcher Warns
Risks include the dissemination of misinformation, fraud, phishing, malicious code, and the invasion of privacy, according to Symantec analysts.
Cybercriminals could imperil the 2008 presidential election and the U.S political process, according to a forthcoming book.
Titled Crimeware and edited by Markus Jakobsson, a professor at the Indiana University School of Informatics, and Zulfikar Ramzan, senior principal security researcher with Symantec, the book details various forms of cybercrime. It is scheduled for publication in February.
The book's 10th chapter, Cybercrime and the Electoral System, by Oliver Friedrichs, director of emerging technologies at Symantec Security Response, explores the risks cybercrime poses to U.S. elections.
"It is important to understand the associated risks as political candidates increasingly turn to the Internet to more effectively communicate their positions, rally supporters, and seek to sway critics," writes Friedrichs. "These risks include among others the dissemination of misinformation, fraud, phishing, malicious code, and the invasion of privacy. Some of these attacks, including those involving the diversion of online campaign donations have the potential to threaten voters' faith in our electoral system."
In a phone interview, Friedrichs said that he believes the threat is significant and pointed to past elections that have felt the effects of cybercrime. "In 2004, phishers targeted the Kerry-Edwards campaign, which at the time was really seen as one of the campaigns that led the way in using the Internet to communicate with constituents."
There were at least two phishing attacks that targeted that campaign, said Friedrichs. One of them was a fairly traditional attack that tried to solicit money in the name of the candidates. The other tried to convince recipients of phishing e-mails to call a 900 number. Calling the number resulted in an unexpected $1.99 charge.
"Four years later, it's a much different time," said Friedrichs. "Phishing itself has grown into an epidemic, and we see over 1,000 phishing campaigns every single day. So the potential for phishing to manifest itself is fairly high."
That's demonstrated by the high number of typo domains that have been registered. Such sites receive traffic from Web visitors who misspell or mistype legitimate campaign Web site addresses. They may also serve as a place to direct visitors duped by phishing messages and as a launchpad for security exploits.
Symantec has identified 58 typo domains related to Hillary Clinton's official Web site, 52 related to Barak Obama's official Web site, 34 related to John Edwards' official Web site, 20 related to John McCain's official Web site, and 18 related to Mitt Romney's official Web site. The research did not indicate why Democratic candidates have been more heavily targeted by typo squatters than Republican candidates.
As to the possibility that legitimate politicians might try to gain an advantage by enlisting cybercriminals, Friedrichs said, "We haven't seen that yet and we certainly hope we don't see it."
[Interop ITX 2017] State Of DevOps ReportThe DevOps movement brings application development and infrastructure operations together to increase efficiency and deploy applications more quickly. But embracing DevOps means making significant cultural, organizational, and technological changes. This research report will examine how and why IT organizations are adopting DevOps methodologies, the effects on their staff and processes, and the tools they are utilizing for the best results.
2017 State of IT ReportIn today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.