STE WILLIAMS

Bulgaria hack: 20-year-old infosec whizz cuffed after ‘adult population’s’ finance deets nicked

A 20-year-old infosec bod has been arrested in Bulgaria after most of the country’s population had their personal and financial details stolen.

Local media reported (in Bulgarian, so get your translation hat on) that “more than 5 million” people’s data – almost the entire adult population, according to Reuters, had been lifted from the Bulgarian tax service’s database.

Bulgaria has a population of 7 million, according to the CIA Factbook. Snippets of the data were reportedly sent by the hackers to local media outlets – in much the same way as by the criminal who stole tens of thousands of people’s personal data from British supermarket chain Morrison’s.

The hacker’s email said around 110 databases had been compromised, according to Reuters, which added that finance minister Vladislav Goranov said 3 per cent of the records of the Bulgarian tax agency, unfortunately abbreviated in English as NRA, had been accessed.

One newspaper, 24 Chasa, said it had been sent the details of 1.1 million people’s national insurance numbers along with details of their income and healthcare arrangements, according to Reuters.

Security journalist Graham Cluely wrote a useful roundup that centres around the arrest of one Kristian Boykov, a researcher who works for infosec outfit TAD Group. In a (translated) statement the company said: “Christian is our 2017 official in the ‘Cybersecurity Expert’ position. As part of the company, Christian has always been ethical, professional and loyal to his work commitments, including our clients and the entire team.”

Boykov, 20, is said to have worked with local police after discovering another data breach a few years ago. Reports of a local telly interview with his lawyers and the local country manager of TAD Group suggest they don’t think Boykov was responsible for the data heist. Indeed, they suggest he might have been framed.

The investigation continues. Nobody has yet been charged. ®

Sponsored:
Balancing consumerization and corporate control

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/07/18/bulgaria_financial_hack_arrest_5m_records_accessed/

Calculating the Value of Security

What will it take to align staff and budget to protect the organization?

As much as we’d like to think things have changed in the wake of WannaCry, NotPetya, and other high-profile breaches, many companies still don’t take IT security seriously. It’s easy to see why: Target, Sony Pictures, Equifax, and Maersk are still very much in business and doing just fine.

Have those organizations changed their protocols as a result? Undoubtedly. It takes a direct hit on an organization, with a significant financial impact, to force change. Until then, it’s business as usual.

Of course, this is a tremendous source of stress for CISOs and their security teams. They’re reminded daily how vulnerable the organization is: patching that is woefully out of date, remote workers with unprotected systems out in the wild, insufficient budget and resources and a lack of cooperation — or worse, direct conflict — between IT operations and IT security.

A new report on IT security from 1E, “Getting Your House in Order,” finds three challenges facing IT: securing new technologies, restrictive budgets, and a lack of understanding between IT security and IT operations on how the other works. Worse yet, 90% of organizations prioritize something else (customer service, sales, etc.) ahead of IT security when it comes to budget allocation. 

Short of a breach, what will it take for companies to get it together and properly protect the organization? They must do the following:

1. Acknowledge how accessible their data is. There’s a general lack of knowledge about how discoverable data sets are, even in supposedly secure cloud platforms. Too many operate under the assumption that they can dump data into an S3 bucket in the cloud and it will be safe because it’s on a secure platform. Cloud storage is only as secure as your protocols and endpoints used for accessing it. A single compromised user credential can provide unfettered access to your most valuable data.

2. Recognize outsourcing isn’t the answer. Most companies believe by dumping their data into the cloud, they’re also dumping the security responsibility onto the cloud host. They assume that buying space on Amazon Web Services or Azure is like buying an insurance policy. This is not the case; plenty of S3 buckets are left completely unsecured. Even if they were secured by the host, the data is only as secure as the points of access to it, which is why safeguarding endpoints is absolutely critical.

3. Match the value of their data with equivalent resources. Unless you’re putting enough resources and investment toward protecting data, it’s not going to be secure. To improve cybersecurity, over 75% of IT pros say their organization needs to invest more in software migration automation and training for IT security and IT operations teams. And more than 60% say their company needs to invest more in software patching. Clearly, there is misalignment on the value of security and the resources allocated toward it.

4. Assess the level of risk within their IT estate. Only about 60% of organizations report having a high level of control and visibility over endpoints on the network and software in use. With remote workers, local admin rights and departmental or location-based autonomy, it’s nearly impossible for IT to keep up with tracking the organization’s assets without some type of automated solution to do so. However, you can’t safeguard what you can’t see; organizations must gain clearer visibility of the IT estate in order to deliver proper protection.

5Migrate to Windows 10. There isn’t a business case for upgrading to Windows 10 beyond security. Yet, whether you pay the extended support agreement for Windows 7 or you bite the bullet and migrate to 10, you’ll still be forking over the cash for endpoint security. CIOs must recognize improving security is a valid business case, and protecting the organization protects the bottom line — and potentially the financial security of the board of directors and shareholders. In fact, 58% of survey respondents believe that failure to migrate to Windows 10 by 2020 will result in “significant security risk.” CISOs can use this risk potential to garner investment in making the upgrade.

6. Solve patching and bandwidth issues. The pace of updates and the challenge of limited bandwidth creates a bottleneck for many companies. If I run a financial firm and my day traders are down for an hour for a system patch, they could lose $1 million apiece. Considering that more than half of IT pros believe unpatched software is one of the main causes of security breaches, patching must become a priority. Investing in the right tools to automate the process can help overcome patching challenges and the bandwidth deficits that are partly to blame.

Bringing IT operation and IT security together establishes cohesion on the end goal. At Microsoft, not only do all of the developers have some level of security training, they also have security people sitting alongside them. They collaborate to ensure that work in progress meets the company’s established security guidelines from the beginning to reduce the risk of a security flaw and prevent adversarial situations.

By educating both teams on the roles, goals, and objectives of the other, companies can leverage the full capability of their IT resources to secure the organization with an investment that reflects the value they place on security.

Related Content:

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Jason Sandys, Enterprise Mobility MVP, has 20+ years of experience in a wide range of technologies, environments, and industries and extensive knowledge in implementing and supporting all things SMS and Configuration Manager beginning with SMS 2.0. He is currently a … View Full Bio

Article source: https://www.darkreading.com/cloud/calculating-the-value-of-security/a/d-id/1335241?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

79% of US Consumers Fear Webcams Are Watching

Widespread privacy concerns have caused 60% of people to cover their laptop webcams – some in creative ways – survey data shows.

If you’re worried someone might be watching through your webcam, you’re not alone: Seventy-nine percent of US consumers are aware their privacy could be compromised via their laptop webcams.

The data comes from a survey commissioned by HP, which sought to learn how people associate webcam privacy in their day-to-day lives. Researchers polled approximately 3,000 people across North America, 1,000 of whom own a laptop with an internal webcam. Three-quarters say if in view of their webcams, they turn them off, cover them, or close their machines to get out of view.

Nearly 60% of consumers physically cover their webcams, though some are more creative than others: Forty-three percent use tape, 35% place a sticky note, 8% use a bandage, and 2% use … a piece of gum.

Awareness and concern around webcam compromise vary by age and gender, researchers found. Eighty percent of Baby Boomers are aware of the issue, but only 49% have covered their webcams to feel more secure. Women feel much more vulnerable than men: Sixty-seven percent of female respondents are worried about webcam privacy, compared with 59% of male participants.

How did webcam spying become a common fear? Most (43%) respondents learned about it through social media, 40% through a movie or television show, and 38% by word of mouth. One in 10 has either had their own webcam compromised or knows someone else who has.

Read more details here.   

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/risk/79--of-us-consumers-fear-webcams-are-watching/d/d-id/1335291?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

How Capture the Flag Competitions Strengthen the Cybersecurity Workforce

These competitions challenge participants with problems involving digital forensics, cryptography, binary analysis, web security, and many other fields.

As cyberattacks become more sophisticated and network complexity increases, there are just not enough security professionals to handle the massive amount of attacks, intrusions, and breaches that are observed every day in every kind of organization. Given the scarcity of human talent, it is not surprising that cybersecurity professionals are difficult to hire, train, and retain. One tool that can help in this process is the use of cybersecurity competitions, also known as capture the flag (CTF) competitions.

CTF competitions take two main forms: They can be “challenge-based” or “interactive.” More precisely, challenge-based competitions are structured in a way that presents to the participants a number of challenges that require different skills (e.g., reversing binaries, performing forensic analysis on file systems, manipulating network traffic) at different levels of complexity (which are usually rewarded with different amounts of points when challenges are solved). These challenges are a form of a take-home test and do not include any interactions with other teams.

Alternatively, interactive (or “attack/defense”) competitions focus on the interaction between teams. Every participant is given the same system (usually a server with a number of network-accessible services), and their task is to identify flaws in their own copy of the server, patch (if possible) their own services without breaking the service’s functionality, and use the same knowledge to attack the other participants.

As proof of having been able to exploit an opponent’s service, the goal of an attack is to grab a file or other data on the opponent’s machine; this piece of data is referred to as a “flag” (and this is where the “capture the flag” label comes from). This type of exercise provides opportunities for exercising both attack and defense skills.

Even though many imagine these competitions as the domain of skilled hackers who turn to crime at the first opportunity, participants are, most of the time, very bright and skilled security enthusiasts who want to explore, in a fun and competitive setting, the world of security beyond the corporate domain. Therefore, CTF events are a great opportunity to hire new talent, and major corporations are already doing so, by sponsoring events or by sending representatives to spot the best security experts.

Cybersecurity competitions can also be used to train the cyber workforce. These competitions challenge the participants with problems that cover digital forensics, cryptography, binary analysis, web security, and many other fields.

As a result, participating in these events can help in honing and expanding the skill set of the security workforce. In addition, much of the benefit of participating in these competitions is the effort that goes into preparing for the competition itself.

Teams and individuals search for the best tools and test them for viability in different situations. It is therefore not surprising that CTF competitions are also used in academic settings, as a tool to train students. The competitive nature of these events pushes students well beyond the call of duty and result in an effective transfer of knowledge and skills.

Finally, these events are great for retaining the cybersecurity workforce. Working in security can be a repetitive, stressful, and sometimes thankless job. Nobody gets congratulated because “no one compromised our network today.” Usually, the only time a security professional is contacted is when things go wrong, in a way similar to the role of a goalie in a soccer team.

It is therefore unsurprising that cybersecurity professionals experience burnout, and often they move to a different company in order to get a fresh start. Cybersecurity competitions allow cybersecurity professionals to have a team experience in a fun, engaging environment. By participating in security competitions as a team, cybersecurity professionals feel engaged and connected to their teammates, while, at the same time, training to operate as a functional unit under pressure.

I have experienced all this firsthand, having founded Shellphish, a hacking team that has been at more DEF CON CTF competitions than any other team (DEF CON CTF is the most well-known attack/defense CTF, happening every year as part of the DEF CON convention).

Students (who usually represent the vast majority of the team’s participants) are always eager to participate in competitions in which they can showcase their skills, and spend a considerable amount of time training, working as teams and even coming up with innovative techniques that advance the state of the art in security.

However, one does not have to be a doctoral student in computer science to enter the world of cybersecurity competitions: There are many competitions for any skill level. Most competitions are listed on the site ctftime.org, and many websites provide challenges for every level of expertise that can be carried out at one’s own pace.

So, game on!

Related Content:

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Dr. Giovanni Vigna leads technology innovation at Lastline. He has been researching and developing security technology for more than 20 years, working on malware analysis, web security, vulnerability assessment, and intrusion detection. He is a professor in the Department of … View Full Bio

Article source: https://www.darkreading.com/careers-and-people/how-capture-the-flag-competitions-strengthen-the-cybersecurity-workforce/a/d-id/1335246?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Bulgarian Tax Breach Nets All the Records

An attack by a ‘wizard hacker’ results in leaked records for virtually every Bulgarian taxpayer.

A hacker hit Bulgaria’s NRA tax agency and gained access to the tax records of Bulgaria’s citizens — all of them. That is the initial report from the Bulgarian government as word begins to emerge of the attack from what the government is calling a “wizard hacker” who breached the system.

Bulgarian media has identified Kristian Boykov, an employee of US cybersecurity firm TAD Group. He has been arrested by authorities in Bulgaria though both he and his employer have dismissed the charges against him.

Initial reports from Bulgaria’s government and other groups differ on whether the attacker is very talented, the government’s IT security is very poor, or some combination of the two. Regardless of the ultimate determination of the cause, the tax agency now faces a fine of up to 20 million euros (approximately $22.5 million) over the privacy violation.

For more, read here and here.

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/bulgarian-tax-breach-nets-all-the-records/d/d-id/1335294?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Still not using HTTPS? Firefox is about to shame you

Two years after promising to report all HTTP-based web pages as insecure, Mozilla is about to deliver. Soon, whenever you visit one of the shrinking number of sites that doesn’t use a security certificate, the Firefox browser will warn you.

Firefox developer Johann Hofmann announced the news this week:

In desktop Firefox 70, we intend to show an icon in the “identity block” (the left hand side of the URL bar which is used to display security / privacy information) that marks all sites served over HTTP (as well as FTP and certificate errors) as insecure.

Firefox 70 will ship in October. The change is an attempt to crack down on sites that don’t secure their communications.

Insecure browsers use the hypertext transfer protocol (HTTP), which sends data in clear text. HTTPS sites are more secure because they use Transport Layer Security (TLS), which establishes an encrypted link between the browser and the Web server before any HTTP requests are sent.

Hofmann explained that this was part of a broader initiative to simplify the security user-interface in Firefox 70.

Firefox began showing the ‘insecure’ icon in January 2017 but limited it to HTTP pages that collected passwords with login forms. It said at the time that it would expand the initiative to cover all HTTP pages.

Deciding to pull the trigger now is a clear statement that Mozilla believes HTTPS has become the norm. Hofmann cited Firefox’s own telemetry data, which shows that almost 80% of pages loaded in Firefox are HTTPs-based.

Other companies have been more aggressive in their attempt to stamp out HTTP. Google has gradually cracked down on sites not using TLS. In 2015, it began rewarding HTTPS websites with better search rankings. Then, in 2017, it began labelling transactional non-HTTPS sites as ‘Not Secure’, expanding this scheme last year to label any non-HTTPS site the same way. Then, when it released Chrome 69 in September 2018, it removed the ‘secure’ label from HTTPS sites, signalling that they were now mainstream as far as Google was concerned.

Our tests showed that as of this week, Safari marks non-HTTPS pages as insecure, but the Edge browser doesn’t, instead opting only to show HTTPS sites as secure.

TLS protects your HTTP traffic from eavesdropping and manipulation as it moves over a network, between you and the site you’re using. It doesn’t say anything about the security or legitimacy of the site itself though.

Unfortunately, the padlock symbol that your browser displays when you’re using HTTPS can fool users into thinking it does. Many assume (not least because security professionals spent years telling them to) that the padlock means the website they’re looking at must be the real thing, rather than a fake.

the FBI recently warned that phishing sites are preying on this misunderstanding and using TLS to appear more legitimate to victims.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/WU2mRCCofMU/

Google Chrome is ditching its XSS detection tool

Google is removing a nine-year-old feature in its Chrome web browser, which spotted a common online attack. Don’t worry, though – another, hopefully better, protection measure is on the way.

Introduced in 2010, XSS Auditor is a built-in Chrome function designed to detect cross-site scripting (XSS) vulnerabilities. In an XSS attack, a malicious actor injects their own code onto a legitimate website. They might do that by adding malicious code to a legitimate URL, or by posting content to a site that stores and displays what they’ve posted (persistent XSS).

When someone looks at the code injected by the attacker it executes a command in their browser, which might do anything from stealing the victim’s cookies to trying to infect them with a virus.

Websites should prevent this kind attack by sanitising user-submitted data, but many don’t.

XSS Auditor tries to detect XSS vulnerabilities while the browser is parsing HTML. It uses a blocklist to identify suspicious characters or HTML tags in request parameters, matching them with content to spot attackers injecting code into a page.

The beef that some developers have is that it doesn’t catch all XSS vulnerabilities in a site. XSS code that the feature doesn’t spot, called bypasses, are common online.

Google’s engineers had already adapted XSS Auditor to filter out troublesome XSS code rather than blocking access altogether, citing “undesirable consequences”, but this clearly wasn’t enough, and now they’re killing it off altogether.

When first discussing the plan to retire XSS Auditor, Google senior security engineer Eduardo Vela Nava said:

We haven’t found any evidence the XSSAuditor stops any XSS, and instead we have been experiencing difficulty explaining to developers at scale, why they should fix the bugs even when the browser says the attack was stopped. In the past 3 months we surveyed all internal XSS bugs that triggered the XSSAuditor and were able to find bypasses to all of them.

Although there was some pushback, the developers seem to have reached enough consensus that they’re going ahead with the plan. In announcing the deprecation on Monday, Google security engineer Thomas Sepez said:

Bypasses abound.

It prevents some legit sites from working.

Once detected, there’s nothing good to do.

It introduces cross-site info leaks.

 Fixing all the info leaks has proven difficult.

Without XSS Auditor, how will web developers check to see if their sites are buggy? Another feature is in development to help: an application programming interface (API) called Trusted Types. Trusted types treats user input as untrustworthy by default and forces developers to take steps to sanitise it before it can be included in a web page.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/jIK25UgQlMw/

Hacked Bluetooth hair straighteners are too hot to handle

What do cigarettes, candles, and faulty electrical appliances have in common with one another?

The answer is they are among the top causes of house fires in countries such as the US and UK.

However, it seems there is another often overlooked cause that should be near the top of the fear list – hair straighteners.

They get hot (235 degrees Celsius, or 455 degrees Fahrenheit) and are easy to leave turned on inadvertently, which together explains why Hampshire Fire and Rescue estimates that up to 2016 they have been responsible for as many as 650,000 house fires in the UK alone.

All of which brings us to one particular expensive hair straightener product, the Glamoriser Smart Bluetooth straightener, which according to Pen Test Partners offers up yet another dismal example of how not to implement the Internet of Things (IoT) in an already risky product.

What merry hell?!

As its name implies, it uses Bluetooth Low Energy (BLE) to communicate with an Android Glamoriser app and, as with a growing number of previously dumb and perfectly satisfactory consumer products, it’s SMART – by now most readers will know what’s coming next.

Correct: Pen Test Partners researcher Stuart Kennedy found enough weaknesses to remotely override the product’s chosen temperature setting as someone is using it. Writes Kennedy:

For instance, if somebody was using the straighteners at 120°C and had a sleep time of say 5 mins after use, you could change that to 235°C and 20 mins sleep time.

That is, raise the temperature and keep it at this level for longer than would be realised by its owner, assuming an attacker running the control app was sufficiently close to connect to it across Bluetooth.

We should make it crystal clear that neither this nor any other aspect of the product is documented as having contributed to a house fire, but the potential for trouble is implicit.

IoT again

What went wrong when the Glamoriser had the smart stuff added?

It’d be easy to point out the lack of authentication between the smartphone app and the straightener itself, but the bigger problem was simply how easy it was for the researcher to work out how to send the device commands via Bluetooth.

The log files that are part of its software design were far too open, allowing anybody with a little time on their hands to infer the commands to do dangerous things.

In fact, it seems a hacker might not even need to do that – they could just fire up the app on their own phone and do the whole thing from there as long as the owner wasn’t connected or is out of range. Concludes Kennedy:

Yes, this attack requires the hacker to be within Bluetooth range, but it would have been so easy for the manufacturer to include a pairing/bonding function to prevent this.

It’s not dissimilar to the case of hot tub hacking, another IoT calamity researched by Pen Test Partners earlier this year, or the Nokelock ‘smart’ padlock in May.

The problem with too many insecure IoT devices is that their creators treat them like dumb devices rather than computers. Too few stop to think through the consequences of putting those devices-that-have-become-computers in the hands of hackers with bad intentions, and so basic computer security concepts, like the principle of least privilege, are ignored.

Pen Test Partners doesn’t say what response it got when it disclosed the security issues to the maker of this product, but hopefully it shouldn’t be hard to fix by re-engineering the app. Our advice if you own this product is to look for an update (the most recent is currently dated June 2018).

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/cG2FvmXPc_k/

‘Member Ke3chang? They’re still at it, you know. Euro diplomats targeted by ‘China-based’ hacker crew

An old-school shadowy malware group believed to operate out of China has been targeting diplomats with what infosec researchers say is a previously undocumented backdoor.

The Ke3chang group, which has been active for a number of years, has long been observed to target diplomats and diplomatic gatherings. As we reported back in 2013, it is thought to have first targeted a G20 finance ministers’ meeting in 2011.

Nonetheless, the group is relatively elusive. Researchers from ESET spotted malware being deployed in European countries including Slovakia, Croatia, the Czech Republic and others – and in late 2016 came across a backdoor enabled by malware which it dubbed Okrum.

Analysing the malware used in these attacks, ESET researchers found that it was linked to malware previously attributed to Ke3chang, and dubbed these new versions Ketrican. They saw that Okrum was being used to drop a Ketrican backdoor.

“We started connecting the dots when we discovered that the Okrum backdoor was used to drop a Ketrican backdoor, compiled in 2017. On top of that, we found that some diplomatic entities that were affected by the Okrum malware and the 2015 Ketrican backdoors were also affected by 2017 Ketrican backdoors,” said Zuzana Hromcova, the ESET researcher who uncovered them.

“Besides the shared targets, Okrum has a similar modus operandi as previously documented Ke3chang malware. For example, Okrum is only equipped with basic backdoor commands and relies on manually typing shell commands and executing external tools for most of its malicious activity, which is a standard modus operandi of the Ke3chang group across its previously investigated campaigns,” said ESET in a statement.

The threat intel firm added that it had seen “detection evasion techniques” in the Okrum malware, which it said was still being used as recently as March this year.

It added (PDF) that the “payload starts only after the left (physical) mouse button has been pressed at least three times”…

A few years ago Ke3chang was spotted by Palo Alto Networks’ infosec bods as it used a Word vulnerability to target Indian embassies around the world. India shares a substantial land border with China, though the two powers enjoy largely peaceful relations.

The international element of malware campaigns is an ever-expanding component of international relations. China, Russia, Iran, North Korea and other countries all have highly specialised state-backed hacker crews whose brief is to target lucrative or politically useful targets. Ke3chang is just one of those. ®

Sponsored:
Balancing consumerization and corporate control

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/07/18/eset_ke3chang_diplomats_malware/

Microsoft demos end-to-end voting verification system ElectionGuard, code will be on GitHub

Microsoft has demonstrated its ElectionGuard electronic vote system at the Aspen Security Forum under way in Colorado and warned that nearly 10,000 of its customers have been targeted by nation-state attacks.

ElectionGuard aims to enable end-to-end verification of voting. Voters receive a tracking code and can check via a web portal that their vote has been counted, and, crucially, not altered. The portal does not show the content of the vote, protecting voter confidentiality. “It will not be possible to ‘hack’ the vote without detection,” said Microsoft’s Tom Burt, CVP of Customer Security and Trust, in a post about the company’s latest efforts to counter threats against democracy.

The system uses homomorphic encryption to allow data to be used in computation while still encrypted.

The demo uses a Microsoft Surface tablet with an optional Xbox Adaptive Controller, an accessible input device originally created for gaming. A standard printer outputs a printed version of the vote which can be dropped into a ballot box, showing how the system can be used in combination with paper ballots.

Microsoft will not be making ElectionGuard systems, but is waving it at voting technology vendors. Burt said the company will work with suppliers of “more than half of the voting systems used in the United States today”. It has now added two more to the list, Smartmatic and Clear Ballot.

The code for ElectionGuard will be open source and posted on GitHub later this summer.

While not directly related to voter fraud, Burt also said Microsoft’s Threat Intelligence Center had detected nation-state attacks on nearly 10,000 customers. “About 84 per cent of these attacks targeted our enterprise customers, and about 16 per cent targeted consumer personal email accounts,” he said.

Microsoft claims the majority of nation-state activity is from actors in Iran, North Korea and Russia, and has assigned codenames to them: Holmium and Mercury from Iran, Thallium from North Korea, and Yttrium and Strontium from Russia. The motives of these actors could be intelligence gathering as well as searching for ways to achieve political objectives.

The company also has a project called AccountGuard, which is designed to protect “customers in the political space”. This works in conjunction with Office 365 and offers extra security checks and notifications as well as best practice security guidelines and a direct line to support.

AccountGuard was specifically opened up to the UK on October 2018. In order to qualify, you have to be among “candidates running for office; the campaign organisations of all elected politicians; political parties; technology vendors who primarily serve campaigns and committees; and certain charity and non-governmental organisations, such as bodies that organise the electoral process, involved in the democratic process,” the post explained.

Tamper-proofing UK elections

Could ElectionGuard or something like it be taken up in the United Kingdom? We asked the Electoral Commission, which observed that any changes to the way elections are conducted have to be done through legislation – so don’t hold your breath. The commission also considers that electoral fraud in the UK uncommon. You can see its report on the 2018 local elections here.

There is a bigger issue, though, to do with the vulnerability of voters to manipulation via social media or other means. In this case, the vote is valid but may be based on false information. The extent of funding for political campaigns is another issue and you will find plenty of instances of breaches on the Electoral Commissions site – likely to be the tip of a large and ugly iceberg.

“No single company can tackle these issues, and the need to protect democracy is more important than corporate competition,” said Burt. Too right, but even with Microsoft’s laudable efforts there is little cause for optimism. ®

Sponsored:
Balancing consumerization and corporate control

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/07/18/microsoft_demos_electionguard_system_will_publish_code_on_github/