Ohio officials thwarted a cyber attack against its election infrastructure earlier this month, the state’s elections chief announced.
According to the Republican Secretary of State Frank LaRose, the cyber attack was “relatively unsophisticated” and it took place on Election Day, on November 5. The attack was apparently originated in Panama, but experts traced it to a Russian-owned company.
“Ohio Secretary of State Frank LaRose said Tuesday that the so-called SQL injection attack was detected by the state’s internal systems. The attack was attempting to insert malicious code into his office’s website.” reported The Columbus Dispatch.
“The attempted hack originated in Panama but was traced to a Russian-owned company, LaRose said, although he called the effort “relatively unsophisticated.”
“Some of these unsophisticated attacks are ways that they probe for vulnerabilities. They are poking around for soft spots,” LaRose said
LaRose explained that the attackers were probing for vulnerabilities in his office’s website.
Although the attack aimed at disrupting and undermining the credibility of the elections, according to LaRose it cannot affect Ohio’s election results because voting systems are not exposed online
LaRose added that the attack was spotted by the Ohio intrusion system “Albert.”
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – Ohio Election Day, hacking)
[adrotate banner=”5″]
[adrotate banner=”13″]
Victoria’s Secret took its website offline after a cyberattack, with experts warning of rising threats…
Google says China-linked group APT41 controlled malware via Google Calendar to target governments through a…
GreyNoise researchers warn of a new AyySSHush botnet compromised over 9,000 ASUS routers, adding a…
The Czech government condemned China after linking cyber espionage group APT31 to a cyberattack on…
PumaBot targets Linux IoT devices, using SSH brute-force attacks to steal credentials, spread malware, and…
Apple blocked over $9B in fraud in 5 years, including $2B in 2024, stopping scams…
This website uses cookies.