Foreign Hackers Cripple Texas County's Email System, Raising Election Security Concerns (propublica.org) 51
Last week, voters and election administrators who emailed Leanne Jackson, the clerk of rural Hamilton County in central Texas, received bureaucratic-looking replies. "Re: official precinct results," one subject line read. The text supplied passwords for an attached file. But Jackson didn't send the messages. From a report: Instead, they came from Sri Lankan and Congolese email addresses, and they cleverly hid malicious software inside a Microsoft Word attachment. By the time Jackson learned about the forgery, it was too late. Hackers continued to fire off look-alike replies. Jackson's three-person office, already grappling with the coronavirus pandemic, ground to a near standstill. "I've only sent three emails today, and they were emails I absolutely had to send," Jackson said Friday. "I'm scared to" send more, she said, for fear of spreading the malware. The previously unreported attack on Hamilton illustrates an overlooked security weakness that could hamper the November election: the vulnerability of email systems in county offices that handle the voting process from registration to casting and counting ballots. Although experts have repeatedly warned state and local officials to follow best practices for computer security, numerous smaller locales like Hamilton appear to have taken few precautionary measures.
U.S. Department of Homeland Security officials have helped local governments in recent years to bolster their infrastructure, following Russian hacking attempts during the last presidential election. But desktop computers used each day in small rural counties to send routine emails, compose official documents or analyze spreadsheets can be easier targets, in part because those jurisdictions may not have the resources or know-how to update systems or afford security professionals familiar with the latest practices. A ProPublica review of municipal government email systems in swing states found that dozens of them relied on homebrew setups or didn't follow industry standards. Those protocols include encryption to ensure email passwords are secure and measures that confirm that people sending emails are who they purport to be. At least a dozen counties in battleground states didn't use cloud-hosted email from firms like Google or Microsoft. While not a cure-all, such services improve protections against email hacks.
U.S. Department of Homeland Security officials have helped local governments in recent years to bolster their infrastructure, following Russian hacking attempts during the last presidential election. But desktop computers used each day in small rural counties to send routine emails, compose official documents or analyze spreadsheets can be easier targets, in part because those jurisdictions may not have the resources or know-how to update systems or afford security professionals familiar with the latest practices. A ProPublica review of municipal government email systems in swing states found that dozens of them relied on homebrew setups or didn't follow industry standards. Those protocols include encryption to ensure email passwords are secure and measures that confirm that people sending emails are who they purport to be. At least a dozen counties in battleground states didn't use cloud-hosted email from firms like Google or Microsoft. While not a cure-all, such services improve protections against email hacks.
Email insecurity (Score:4, Interesting)
Why has it taken so long to make email secure?
Why aren't emails signed and encrypted already everywhere?
(I know GMail have some email address verification features)
Everything else seems to have improved (FTP -> SCP, Telnet -> SSH, Gopher -> WWW w SSL/TLS encryption).. so why hasn't email improved?
Re: (Score:2)
So everyone will have to pay for a security certificate to use email? Regular folks are not going to like that.
I'd like to see "e-stamps" because a money trail makes tracing easier. And the stamp fees would help pay for inspectors and detectives to hunt down riff-raff.
For example, offer a $30/yr subscription which comes with 500 emails per subscriber. Anything above 500 requires 1 cent per message.
I'd be happy to spend $30/yr for less riff-raff.
Re: (Score:3)
Re: (Score:3)
Unsigned (or mis-signed) email messages need to be automatically flagged. We've already made that transition for web pages; we should have bitten the email bullet even before that.
Re: (Score:2)
And what a victory! I celebrate every time I log into a firewall, and need 3 extra clicks because self-signed certificates are a tool of the devil.
Thank you browsers, for caving in to the SSL mafia.
But but but, how do you know the site you're connecting to is who it says it is if the cert is self signed???? SSL certs don't guarantee identity, and anyone who thinks they do is DOING I.T. WRONG.
Cyber security is like airport security. An ineffectual bur
Re: (Score:2)
BTW- People claiming to be Nigerian princes sent mail before e-mail existed.
FTFY.
Re: (Score:3)
How is the public key published? Even more important, how do you revoke a key? All the public key allows is verifying that the message came from someone with the matching private key- not you.
Re: (Score:2)
use a trusted third party. verisign, keybase, your web server....
Re: (Score:2)
Re: Email insecurity (Score:2)
Re: (Score:2)
Publish it where? And how do they verify that it's your key without ever meeting you?
The issue is a lack of infrastructure.
Re: (Score:3)
jpay email starting $0.35 per message! (Score:2)
jpay email starting $0.35 per message!
Re: (Score:2)
Not sure I believe you since there have been a number of email systems that tried such models and none of them have been markedly successful. Too hard to compete with free, even when it's just an illusion of free and all of us are bearing the costs.
One of my old solution approaches would have involved exchange-based accounting you referenced. It didn't even need to involve the exchange of real money, since the costs could be imposed on the spammers' servers in the form of exponentially increasing time delay
Re: (Score:1)
Use Protonmail already, FFS.
Re:Email insecurity (Score:5, Informative)
Why has it taken so long to make email secure?
Lots of legacy mail systems out there.
Why aren't emails signed and encrypted already everywhere?
Turns out that global PKI is hard. Explain it to your relatives. They will laugh at you. Ain't no one going to just through all those hoops just to send an email.
(I know GMail have some email address verification features)
Everything else seems to have improved (FTP -> SCP, Telnet -> SSH, Gopher -> WWW w SSL/TLS encryption).. so why hasn't email improved?
Where are you going to get my public key from, before you send me that first email? What do you do when your cousin Jeb loses his private key? Tell him all his mail is now gone forever? Sure folks will put up with that?
Re: (Score:2)
+1
You took the words out of my mouth. There is no easy and workable and standard way for Email encryption. You are lucky if you can get 2 of the three.
Securing content isn't that difficult, however, since you can password protect most attachments in the file format itself (pdf, zip, odf, etc). As long as the password is not ALSO sent via the same channel. But that does require extra steps.
Ensuring the message is coming from who you think it is, that is more complicated and at least requires the senders
Re: (Score:2)
I was sending secure, signed emails 25 years ago with mutt & GnuPG. Revocation, key servers, everything. There's no reason for Jeb to lose a single message if he simply had half a clue. You're right--the technology isn't the problem. As usual, the weak links are the humans in the chain.
EASY use DANE (Score:2)
There is a key distribution method in place it turns text into numbers and is scalable... its called DNS
Using DANE server to server is then verified without involving the users
https://tools.ietf.org/html/rfc7671
NIST standard
SP 800-177 Rev. 1
Trustworthy Email
https://csrc.nist.gov/publications/detail/sp/800-177/rev-1/final [nist.gov]
Re:Email insecurity [due to bad financial models] (Score:2)
I'm taking your questions as sincere rather than rhetorical, but the obvious answers are because the spammers make money and the email providers just respond "Live and let spam". It is quite safe to say that Bayesian filtering is something the spamming scammers can live and profit with.
It is NOT an unsolvable problem. Proof of concept is the death of pump-and-dump stock-scam spam. You don't get that now because they decided "Live and let spam" was unacceptable AFTER some academic papers proved the spammers
Re: (Score:2)
S/MIME Is clunky and requires paid certificates, and CAs are shitty for validating personal info anyway.
What we need is for the Federal government to just issue certificates with passports and state governments with driver's licenses. They're in the best position to verify identities.
And with a universal certificate standard, you might get the major email providers (Microsoft, Google, etc) coerced into adopting this and making end-user signing and encryption to work in an easy manner.
But let's not pretend
Re: (Score:2)
Free from the government always has a huge price for someone! You just may not know or care who since it is not you!
Almost sounds like a national ID. And my last state drivers lic renewal took 4 months to be processed.
Re: (Score:2)
Re: (Score:2)
Last time I had to renew my license (including new photo and all that), I was in and out of the DPS within 2 hours. It showed up in the mail in 2 or 3 weeks.
The time before that, it took 30 minutes at the DPS, and not more than a month waiting on the mail.
Re: Email insecurity (Score:1)
Re: (Score:2)
Re: (Score:2)
And obviously the OP was someone not from the US, where only around 30-50% of Americans have a passport (There's almost no need - a significant chunk never leave their home towns, and for
Re: (Score:2)
Did not even think about that
Is there a place in the world where government Country/Regional actually works.
Re: (Score:2)
Use PGP/MIME so you can have multiple signatures and trust levels, and each CA can have whatever policies they want.
Damn good idea; I highly approve. And I'd bet the federal signature would end up being the gold standard in a l
Re: (Score:1)
> (I know GMail have some email address verification features)
Google is DMARC and OpenARC enabled sender/receiver. Second largest ESP using DMARC is not open since 2018 and follows only part of the DMARC spec that suits them. Something that got to do with corporate culture in that multibillion corp.
DMARC, DKIM and SPF depend on sender system using those features. They won't stop homonym based spoofs.
Re: (Score:2)
Re: (Score:2)
Email _is_ secure. What is not secure is MS word and broken email clients that are actually web-browsers.
The Horror! (Score:3)
Jackson's three-person office, already grappling with the coronavirus pandemic, ground to a near standstill. "
Seriously? We think the US election system can be brought to its knees by someone infecting an email server 6 weeks before the election?
Here's a thought - set up a secure standalone email server just for election results, give everyone their own email account, and only turn the server on the day of the election, prohibit external/incoming email, and turn it off after counting ends.
Or, simply drive results to a central location - from what I've seen, most states will be taking several days to determine a winner, owing to extended windows to receive post-marked ballots.
FFS email is easy, this isn't the way the election will be brought down.
Re: (Score:2)
And I don't think they use email to submit results. Pretty sure it's only being used for normal office purposes, which means they can just fall back on phones and paper if necessary. Meaning this is pretty overblown as an election issue. It is significant as an example of the need for local governments to put some money into securing their systems.
Define secure (Score:2)
Then let us know how much secure costs. Itâ(TM)s not particularly cheap, or for that matter secure.
Then wave your arms about in despair as people wonâ(TM)t pay.
Re: (Score:2)
Re: (Score:2)
Thanks for the pecision. What's your point, that election fraud is OK as long as the part we know about only occurs in small numbers?
Re: (Score:2)
That the people voting fraudulently don't know who to vote for.
Trump's trying to discredit mail in voting because it's going to fraudulently let Biden win. So the fraudsters sent in 9 fake ballots voting for Trump? How's Trump supposed to tweet about that as a victory against mail in voting?
Re: (Score:2)
Ths is slashdot. We're nerds. Numbers are important.
Re: (Score:2)
inflammitory headlines and partial information are tools of propaganda, the opposite if what is required for an informed electorate.
Link, please. (Score:2)
Also 7 were for Trump, not all.
The linked article said that all the ballots found (so far, search continues) were for Trump.
You said there were 7 of 9 for Trump, 2 not for Trump. But you provide no link to a source for that claim.
Can you provide such a link? Or could you otherwise elaborate? (i.e. if you're involved in the investigation could you say so?)
Re: (Score:2)
Any discrepancies in election returns tend to discredit the electoral process as a whole. One party in particular is eager to seize on the mere suggestion of a less than perfect election because they believe that institutional elites are well positioned to override the votes of a increasingly pissed off electorate.
Re: (Score:2)
Nine ballots, to be precise.
Gosh. If they'd just shredded them with the rest there wouldn't be any election fraud to report. B-)
Re: (Score:2)
The trolls are hard at work burying comments they don't like such as yours. How many ballots for Trump have been thrown out that haven't been found?
That or they they fail to understand that a single stack of 9 ballots that happened to get found one day could be but one of thousands that get discarded on any given day across the nation. I thought postal workers weren't supposed to be able throw away the votes of citizens like that? Imagine how easily they could do that at scale when several states are puttin
Passwords (Score:4, Interesting)
>" The text supplied passwords for an attached file. But Jackson didn't send the messages."
And there is the obvious red flag. You NEVER send passwords via Email for documents that were also sent via Email. Never. Doesn't matter if it is the same Email as the attachments or a different Email. And yet, I have to tell users this over and over again.
Re: (Score:2)
It shows how bad humans are at identifying procedural contradictions: "What's the point of locking something then leaving the key in the lock?" is not the problem: They have a document to read and a pointless extra step, is the problem getting their attention.
It's like when 'electronic-lock' safes appeared: People threw the backup keys in the safe, despite the obvious contradiction. Soon, the batteries went flat and the safe could not be opened again.
Trump would love it. (Score:2)