Potential ransomware attacks during the 2024 election cycle have been deemed unlikely to compromise vote-casting or counting security or accuracy.
The news comes from a public service announcement (PSA) issued on August 15 by the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA).
The announcement underscored that while ransomware attacks targeting state or local government networks could cause temporary, localized delays, they would not affect the integrity of voting systems.
So far, successful attacks on election infrastructure have reportedly been contained with minimal disruption to operations and no impact on the security or accuracy of ballot casting or tabulation processes. The PSA highlighted the effectiveness of a multi-layered approach to security, which includes a variety of technological, physical, and procedural controls to safeguard the election process.
Commenting on the news, FBI cyber division deputy assistant director Cynthia Kaiser emphasized that combating ransomware is a top priority, particularly during elections.
“While the FBI will continue to leverage its tools and partnerships to combat cybercriminals, the public should be aware that ransomware is extremely unlikely to affect the integrity of voting systems or the electoral process,” she said.
CISA Senior Advisor Cait Conley echoed this sentiment, stating that existing security measures are robust enough to ensure these incidents will not impact vote-casting or tabulation systems.
The PSA also cautioned the public to be wary of disinformation, particularly efforts by malicious actors to spread false claims about cyber incidents to undermine confidence in the electoral process. The FBI and CISA continue to collaborate with election officials and other partners to protect the integrity of US elections.
“We will continue to work tirelessly with our election infrastructure partners to uphold the American people’s confidence in 2024 elections and our democratic process,” Conley concluded.
Source: Click Here
Read More
- Cicada3301 Ransomware Targets Critical Sectors in US and UK
by Imran Rasheed
A new ransomware group, Cicada3301, has emerged as a significant threat since its discovery in June 2024. It targets businesses in critical sectors across the US and UK. In just three months, the group has reportedly published data from 30 companies on their dedicated leak sites, underscoring the severity of the threat. Multi-Platform Ransomware and…
Read more: Cicada3301 Ransomware Targets Critical Sectors in US and UK
- #CyberMonth: Software Updates, A Double-Edged Sword for Cybersecurity Professionals
by Imran Rasheed
Software updates are critical in protecting systems from cyber threats and providing new and improved functionality to software products. They are necessary to patch vulnerabilities that can be exploited by malicious actors, ensuring that systems remain secure. Software updates are one of the four pillars of the 2024 International Cybersecurity Awareness Month campaign. As part…
Read more: #CyberMonth: Software Updates, A Double-Edged Sword for Cybersecurity Professionals
- Universal Music Group Admits Data Breach
by Imran Rasheed
Universal Music Group (UMG), one of the world’s largest music corporations, disclosed a data breach in mid-July 2024. According to a filing with the Maine Attorney General’s Office, the breach may have exposed the personal information of 680 US residents. In the filing, UMG said it detected unauthorized activity in one of its internal applications on July 15,…
Read more: Universal Music Group Admits Data Breach
- Get Safe Online Launches New Scam Detector
by Imran Rasheed
Get Safe Online has launched a new tool that uses the power of AI technology to flag potential digital scams to users. Ask Silver is a smartphone-based tool that interacts with users via WhatsApp. Once they sign up, users receive a one-time email with a QR code to scan, which opens the WhatsApp chat. All…
Read more: Get Safe Online Launches New Scam Detector
- Sellafield Fined for Cybersecurity Failures at Nuclear Site
by Imran Rasheed
Sellafield Ltd. has been fined £332,500 ($437,440) for cybersecurity failures at the Sellafield nuclear facility in Cumbria, North-West England. Westminster Magistrates Court issued the fine following a prosecution brought by the Office for Nuclear Regulation (ONR), the UK’s independent nuclear regulator. Sellafield Ltd has also been ordered to pay prosecution costs of £53,253.20 ($70,060). The offences…
Read more: Sellafield Fined for Cybersecurity Failures at Nuclear Site