• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Apple addressed the seventh actively exploited zero-day

 | 

Hackers deploy DripDropper via Apache ActiveMQ flaw, patch systems to evade detection

 | 

A Scattered Spider member gets 10 years in prison

 | 

FBI: Russia-linked group Static Tundra exploit old Cisco flaw for espionage

 | 

US CERT/CC warns of flaws in Workhorse Software accounting software used by hundreds of municipalities in Wisconsin

 | 

DOJ takes action against 22-year-old running RapperBot Botnet

 | 

Google fixed Chrome flaw found by Big Sleep AI

 | 

Pharmaceutical firm Inotiv discloses ransomware attack. Qilin group claims responsibility for the hack

 | 

A hacker tied to Yemen Cyber Army gets 20 months in prison

 | 

Exploit weaponizes SAP NetWeaver bugs for full system compromise

 | 

Allianz Life security breach impacted 1.1 million customers

 | 

U.S. CISA adds Trend Micro Apex One flaw to its Known Exploited Vulnerabilities catalog

 | 

AI for Cybersecurity: Building Trust in Your Workflows

 | 

Taiwan Web Infrastructure targeted by APT UAT-7237 with custom toolset

 | 

New NFC-Driven Android Trojan PhantomCard targets Brazilian bank customers

 | 

Cisco fixed maximum-severity security flaw in Secure Firewall Management Center

 | 

'Blue Locker' Ransomware Targeting Oil & Gas Sector in Pakistan

 | 

Hackers exploit Microsoft flaw to breach Canada ’s House of Commons

 | 

Norway confirms dam intrusion by Pro-Russian hackers

 | 

Zoom patches critical Windows flaw allowing privilege escalation

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Hacking
  • Intelligence
  • Are voting machines easy to hack? Yes, because they are outdated

Are voting machines easy to hack? Yes, because they are outdated

Pierluigi Paganini August 12, 2016

Is it possible to hack voting machines? According to cyber security experts, it is possible due to the use of outdated systems.

The recent attacks against the DNC and Hillary Clinton‘s server raised the question about the cyber security of entire US election machine.

Speaking at the Aspen Security Forum, Lisa O. Monaco, homeland security adviser, admitted that the US Government might soon have to consider whether the electoral system as “critical infrastructure,” to be protected.

“I think it’s a serious question,” she said, especially if there is “coercion, destruction, manipulation of data.” Ms. Monaco noted that whenever the United States thinks about retaliation, “the danger of escalation and misinterpretation is such that we have to be responsible for it.” But she also said that if an event were serious enough, “we have to be very clear we will respond.”

Threat actors, such as nation-state hackers and hacktivists, represent a serious threat to the next Presidential elections.

A cyber attack can cause the leakage of sensitive information that could influence the elections or in the worst scenarios hackers can compromise voting systems.

The ranking member of the Senate Homeland Security Committee sent a letter to the Department of Homeland Security, expressing concerns about the situation and saying that “Election security is critical, and a cyberattack by foreign actors on our elections systems could compromise the integrity of our voting process.”

Let’s focus on a cyber attack against voting machines, is it feasible? Which is the potential impact?

According to the CBS News that analyzed the problem with the support of experts, roughly 70 percent of states in the US currently use some form of electronic voting. Hackers told CBS News that problems with electronic voting machines have been around for years. The machines and the software are old and antiquated.

According to a report published by the Brennan Center for Justice, voting systems are vulnerable to cyber attacker due to their age.

More than 40 states are using old voting machines there are at least 10 years.

The CBS, citing hackers, confirmed that the voting machines are antiquated so it is reasonable to believe that hacker will have any difficulties in hacking them.

“Hackers told CBS News that problems with electronic voting machines have been around for years. The machines and the software are old and antiquated. But now with millions heading to the polls in three months, security experts are sounding the alarm” reported the CBS News journalist Mireya Villarreal.

Donald Trump has expressed in different public occasion his concerns for the risk that the election could be rigged, and voting machines could be a privileged instrument to breach the voting systems of the Presidential Election.

“I’m afraid the election is going to be rigged, I have got to be honest,” Trump said to his voters recently.

hacking voting machines

How to hack voting machines?

Experts at Symantec Security Response explained that it could be quite easy to manipulate a voting machine by using an affordable device easy to find online.

Ill-intentioned voters could hack the voting machines directly from the booth using a $15device.

“I can insert it, and then it resets the card, and now I’m able to vote again,” said Brian Varner, cyber security researcher at Symantec, while showing the device to the CBS New correspondent.

“For $15 and in-depth knowledge of the card, you could hack the vote,” 

The Symantec Security Response director Kevin Haley has exactly the same opinion on the possibility of hacking voting machines, the expert explained that hackers can compromise the machines after the votes are collected.

“The results go from that machine into a piece of electronics that takes it to the central counting place,” Haley told CBS News. “That data is not encrypted and that’s vulnerable for manipulation.”

“How big of a hacking potential problem is this?” Villarreal asked him.

“Well, there’s a huge potential,” Haley responded. “There are so many places in the voting process once it goes electronic that’s vulnerable.”

The good news is that even is the voting machine very old and outdated, they need to meet specific government standards.

“Our voting systems are heavily regulated. They’re tested both before and after. There are paper trails everywhere…by in large, I would say the American election system works very well,” said Denise Merrill, president of the National Association of Secretaries of State.

It it true?

CBS News reported that according to its sources, 60 percent of states routinely conduct audits post-election by checking paper trails. Clearly, in those states where there are nopaper records the impact of a cyber attack on voting machines could be devastating.

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs – voting machines, hacking)

[adrotate banner=”13″]


facebook linkedin twitter

DNC Hacking Presidential Election 2016 voting machines

you might also like

Pierluigi Paganini August 21, 2025
Apple addressed the seventh actively exploited zero-day
Read more
Pierluigi Paganini August 21, 2025
Hackers deploy DripDropper via Apache ActiveMQ flaw, patch systems to evade detection
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Apple addressed the seventh actively exploited zero-day

    Security / August 21, 2025

    Hackers deploy DripDropper via Apache ActiveMQ flaw, patch systems to evade detection

    Malware / August 21, 2025

    A Scattered Spider member gets 10 years in prison

    Cyber Crime / August 21, 2025

    FBI: Russia-linked group Static Tundra exploit old Cisco flaw for espionage

    Intelligence / August 21, 2025

    US CERT/CC warns of flaws in Workhorse Software accounting software used by hundreds of municipalities in Wisconsin

    Security / August 21, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT