In late August, the FBI warned state election officials about an attack on voter registration databases from Illinois and Arizona. “According to the FBI’s alert, ‘an unknown actor’ attacked a state election database by using widely available penetrating testing tools, including Acunetix, SQLMap, and DirBuster,” reported IDG’s Michael Kan. “The hackers then found an SQL injection vulnerability — a common attack point in websites — and exploited it to steal the data. The FBI has traced the attacks to eight IP addresses, which appear to be hosted from companies based in Bulgaria, the Netherlands, and Russia.” It isn’t known whether these election database hacks are tied either to the DNC hack or other recent breaches, but Amit Ashbel, director of product marketing at Checkmarx believes it wasn’t part of a state-sponsored attack. The following infographic from application security provider Checkmarx offers an overview of the election breaches, including how the attackers got in and what they stole. Continue reading the article (and check out the Infographic) on CSO.
Blog
Election exploits: What you need to know [infographic]
-
By Stephen Gates
- September 7, 2016
About the Author
Stephen Gates
Stephen Gates is an experienced writer, blogger, and published author who brings 15+ years of hands-on knowledge in information security to the Checkmarx team. Stephen is dedicated to conveying facts, figures, and information that brings awareness to the cybersecurity issues all organizations and consumers face. Aligning with Checkmarx mission of improving software security for all organizations, he is an advocate and promoter of their solutions worldwide.
See All Blogs > Stephen Gates
Stephen Gates is an experienced writer, blogger, and published author who brings 15+ years of hands-on knowledge in information security to the Checkmarx team. Stephen is dedicated to conveying facts, figures, and information that brings awareness to the cybersecurity issues all organizations and consumers face. Aligning with Checkmarx mission of improving software security for all organizations, he is an advocate and promoter of their solutions worldwide.
See All Blogs > About the Author
Never miss an update. Subscribe today!
By submitting my information to Checkmarx, I hereby consent to the terms and conditions found in the Checkmarx Privacy Policy and to
the processing of my personal data as described therein. By clicking submit below, you consent to allow Checkmarx
to store and process the personal information submitted above to provide you the content requested.
the processing of my personal data as described therein. By clicking submit below, you consent to allow Checkmarx
to store and process the personal information submitted above to provide you the content requested.