Government Officials Worry That Ransomware Attacks Could Derail 2020 Elections
The Department of Homeland Security is preparing to launch an education program on the potential of ransomware attacks targeting voter databases, some of which were compromised by Russian hackers in 2016.
- By Haley Samsel
- Aug 30, 2019
Amid concerns about the security of American election systems and the rapid rise in ransomware attacks on governments and other institutions, the U.S. government is planning to launch a program next month that will focus on protecting registration databases ahead of the 2020 elections, according to Reuters.
The Department of Homeland Security and its cyber unit, the Cybersecurity Infrastructure Security Agency (CISA), fear that the databases are prime targets for ransomware, a type of malware that encrypts computer systems and can only be unlocked by a password provided by the hacker. The attacks recently hit 22 Texas towns and halted city operations in Atlanta and Baltimore.
"Recent history has shown that state and county governments and those who support them are targets for ransomware attacks,” Chris Krebs, the head of CISA, said in a statement to CNN. “Voter registration databases could be an attractive target for these attacks.”
Russian hackers were able to compromise at least some of the voter registration systems in the 2016 elections. The threat continues to grow in 2020, as officials worry about breaches and the possibility of hackers manipulating, disrupting or destroying the data, Reuters reported.
In order to combat the threat, the CISA program will contact state election officials to prepare for ransomware attacks and provide education material, remote computer penetration testing and vulnerability testing. In addition, the agency will give a list of recommendations on how to prevent and recover from ransomware.
One thing the CISA program won’t cover: advice on if a state should pay a ransom to the hacker if its systems have been locked down. Companies, governments and other organizations have been increasingly willing to pay off hackers rather than try to recover their systems independently, which requires significant amounts of time, money and expertise. Insurance companies have also vouched to pay the fine rather than face ongoing costs, potentially fueling a rise in attacks, according to a recent ProPublica investigation.
“Our thought is we don’t want the states to have to be in that situation,” a DHS official told Reuters of CISA’s decision not to recommend whether or not to pay the ransom. “We’re focused on preventing it from happening.”
Since 2016, DHS has been working with local officials to address what went wrong in the election cycle and how it could be prevented. But many lawmakers and cybersecurity experts fear that many states have not taken enough action to protect American voting systems.
The Republican-controlled Senate has not taken up an election security bill passed by the House of Representatives in June, which would have required states to provide paper ballots and replace insecure voting equipment.
Regardless of political disagreements over election security, Krebs said his agency is determined to prevent cyber attacks from derailing this year’s election cycle.
“A successful ransomware attack at a critical point before an election could limit access to information and has the potential to undermine public confidence in the election itself,” Krebs said. “That is why we are working alongside election officials and their private sector partners to help protect their databases and respond to possible ransomware attacks.”