From the “we better be paying attention to this” department comes Google’s recent Mandiant report that lists a dozen different ways cyber threat actors can influence elections. From the executive summary:
- The election cybersecurity landscape globally is characterized by a diversity of targets, tactics, and threats. Elections attract threat activity from a variety of threat actors including: state-sponsored actors, cyber criminals, hacktivists, insiders, and information operations as-a-service entities. Mandiant assesses with high confidence that state-sponsored actors pose the most serious cybersecurity risk to elections.
- Operations targeting election-related infrastructure can combine cyber intrusion activity, disruptive and destructive capabilities, and information operations, which include elements of public-facing advertisement and amplification of threat activity claims. Successful targeting does not automatically translate to high impact. Many threat actors have struggled to influence or achieve significant effects, despite their best efforts.
- When we look across the globe we find that the attack surface of an election involves a wide variety of entities beyond voting machines and voter registries. In fact, our observations of past cycles indicate that cyber operations target the major players involved in campaigning, political parties, news and social media more frequently than actual election infrastructure.
- Securing elections requires a comprehensive understanding of many types of threats and tactics, from distributed denial of service (DDoS) to data theft to deepfakes, that are likely to impact elections in 2024. It is vital to understand the variety of relevant threat vectors and how they relate, and to ensure mitigation strategies are in place to address the full scope of potential activity.
- Election organizations should consider steps to harden infrastructure against common attacks, and utilize account security tools such as Google’s Advanced Protection Program to protect high-risk accounts.
Madison Horn (OK-5) Congressional Candidate had this comment:
In the recent Mandiant report by Google, a range of cyber threats to elections is detailed, but the proliferation of mis- and disinformation campaigns stands out as particularly alarming. These campaigns, which meticulously erode trust in governmental institutions and corrupt democratic processes, pose a severe threat that transcends political lines and demands immediate action.
Driven by motives ranging from shifting electoral outcomes to undermining public confidence and generating profit, these disinformation efforts are often orchestrated by state-backed entities from nations such as China, Russia, and Iran. Their impact is undeniable, as seen in instances like Russia’s involvement in the 2016 U.S. election and China’s ongoing global influence operations, which starkly demonstrate their capacity to sway public opinion and disrupt electoral integrity.
The avenues for these campaigns are primarily popular social media platforms—X, Telegram, Facebook—and YouTube, making the digital battlefield as accessible as it is dangerous. The consequences are profound, resulting in increased voter disengagement, the rise of unqualified leaders, and the destabilization of nations.
This is an urgent security issue that cannot be politicized. The integrity of our democracy is in jeopardy, making it imperative that we elect officials who grasp the complexity of these modern challenges. We need leaders who are committed to implementing robust cybersecurity measures, enhancing digital literacy, and fostering international cooperation to counteract the pervasive influence of state-sponsored disinformation. Our response must be swift and resolute to safeguard our democratic processes.
My opinion is that we all need to be paying attention to this and acting on this report to make sure that elections regardless of where they are are conducted in a free and fair manner without interference. The thing that concerns me is that we live in such a partisan environment at the moment that this could become a partisan issue. And it shouldn’t be regardless wherever on the political spectrum you happen to be on.
Ransomware Resurged In 2023 With 50 New Variants: Mandiant
Posted in Commentary with tags Mandiant on June 4, 2024 by itnerdIn a report published by Mandiant on Monday, despite law enforcement operations against prolific ransomware groups such as ALPHV/BlackCat, ransomware activity increased in 2023 compared to 2022 with researchers observing 50 new ransomware variants and a third branching off of existing malware.
Researchers also saw a 75% increase in posts on ransomware groups’ data leak sites. This is consistent with a Chainalysis report stating that a record breaking $1bn was paid to ransomware attackers in 2023.
Code reuse, actor overlaps and rebrands have become common in the modern ransomware threat landscape. According to Mandiant, the increase in extortion activities is likely driven by factors including:
Finally, Mandiant found that threat actors increased their reliance on remote management tools in ransomware operations, 41% in 2023 compared to 23% of intrusions in 2022.
Emily Phelps, Director, Cyware had this to say:
“The proliferation of new ransomware variants and the surge in extortion activities reinforce the urgent need for a collective defense strategy. To get ahead of these threats, organizations must be enabled to share threat intelligence and defensive strategies. By adopting integrated solutions that facilitate seamless information sharing and collaboration, organizations can better defend against these sophisticated attacks and minimize the impact of ransomware on their operations.”
Given that I reported on an apparent ransomware attack as recently as this morning, this is something that requires a lot of focus. Because we’re on the edge of having ransomware get out of control. If it hasn’t already.
UPDATE: BullWall Executive, Carol Volk had this to say:
“In promptly shutting down affected systems and reporting the incident to the SEC, Frontier demonstrated a solid response strategy. This approach, focused on containment and transparency, likely minimized the impact of the attack despite the sensitive data involved.
“If the “containment they had in place was in fact a ransomware containment system, it would account for their quick turnaround in dealing with the breach.
“This incident underscores the need for all organizations to have well-defined ransomware containment strategies. Frontier’s handling of the situation serves as a reminder of the critical importance of preparation and quick action in the face of cyber threats.”
Dave Ratner, CEO, HYAS adds this:
“Preparation for this rise in ransomware requires more than confirming backups and checking configurations — without the implementation of cyber resiliency solutions, as suggested by everyone from CISA to the White House — organizations will remain vulnerable and susceptible. The deployment of solutions like PDNS and others can be accomplished in short order, rapidly shift the tide, and should be done immediately.”
Leave a comment »