As the 2024 election nears, election officials finalize preparations to protect themselves against the most common threats seen targeting voters and campaigns. CISA recently released an Election Infrastructure Cybersecurity Readiness and Resilience Checklist, providing guidance on potential security incidents that may impact election infrastructure.
Tom Marsland, VP of Technology for Cloud Range who has personally led live-fire simulation attacks on election infrastructure, including forensic analysis of voting machines and misinformation campaigns, has shared his thoughts on CISA’s checklist:
This checklist by CISA is a great reminder to election officials and participants about the basics – however, with less than two months until the election, many of these will be hard to implement if not at least begun already. That said, it provides a clean slate for officials to take a step back and give their practices of cyber hygiene a holistic overview, and an honest look as they enter the final stages of preparation. I’ll repeat the findings from CISA that our elections are as secure as they’ve ever been. We really have to stay on top of misinformation campaigns and social engineering in that realm, but this is a great product for CISA, and I hope we see it used.
A great way for election officials to test their readiness against the checklist provided by CISA is by conducting hands-on, tabletop exercises that test the organizations policies and playbooks against the very items called out in the checklist. Lessons learned from table top exercises should be incorporated into the organization’s continuous improvement, made actionable, and tracked to completion.
The CISA has put out a number of these sorts of checklists. But checklists aren’t good if they’re not followed. So here’s hoping that this one is followed as this November’s elections are going to be extremely important to the future of the US.



US Justice Takes Out Chinese Backed Threat Actor “Flax Typhoon”
Posted in Commentary with tags US Justice Department on September 20, 2024 by itnerdThe US Justice Deptment announced that it had taken out a Chinese cyberespionage group known as Flax Typhoon. Here’s the back story:
Evan Dornbush, former NSA cybersecurity expert:
“I cannot understate how important Ryan and his team at Black Lotus are to safeguarding our collective security. Kudos to Lumen for being transparent.
“The reason this threat actor goes after SOHO devices like SOHO routers and DVRs and IP cameras is because the owner/operator is neither technical nor interested.
“Network threat detection — inaccessible for most users — is critical. Forward leaning ISP and telecom companies that can advance the reach of NDR (network detection & response) should be praised for sharing their findings and allowing big action, such as a botnet takedown, to occur.
“By disrupting the threat actor’s operations, Black Lotus has made it more costly and challenging for them to carry out future attacks. Making attacks more costly is a critical and often overlooked aspect to protecting our digital infrastructure.”
I applaud the US Justice Department on executing this takedown. But I want to point out that this was consumer and SOHO based devices that this group was targeting. Which means that consumers and SOHO types are now the low hanging fruit for threat actors. And by extension need to step up their game to avoid being targets in the future.
Leave a comment »