Whoops! One day after reports broke about a hacking attempt targeting the Democratic National Committee’s voter database,everybody needs a massage surfline drive erotice the DNC is admitting the whole incident was a false alarm.
SEE ALSO: 12 Russians indicted for DNC hack, officially placing foreign blame on 2016 email attackReported yesterday by CNN, the DNC reached out to the FBI for assistance after cybersecurity firm Lookout warned party officials of an extremely convincing fake login page it discovered that appeared to be part of a spear phishing operation. Lookout also reached out to the NGP Van, the DNC voter database management company and DigitalOcean, the web host that was hosting the fake site.
However, it turns out the alleged hacking attempt was just a test.
This Tweet is currently unavailable. It might be loading or has been removed.
DNC chief security officer Bob Lord released a statement explaining the situation. “We, along with the partners who reported the site, now believe it was built by a third party as part of a simulated phishing test on VoteBuilder,” said Lord. He also pointed out where the confusion on the fake login site came from. “The test, which mimicked several attributes of actual attacks on the Democratic party’s voter file, was not authorized by the DNC, VoteBuilder nor any of our vendors.”
It turns out that the Michigan Democratic Party had retained the services of a third-party in order to run a phishing simulation. The Michigan Dems never sought authorization from the DNC to conduct such a test.
“In an abundance of caution, our digital partners ran tests that followed extensive training. Despite our misstep and the alarms that were set off, it's most important that all of the security systems in place worked," Michigan Democratic Party chair Brandon Dillon said in a released statement.
While the false alarm may be a slight embarrassment for the party, Dillon’s assessment of the actual security measures certainly seem legit.
This Tweet is currently unavailable. It might be loading or has been removed.
In Mashable’s conversation with a Lookout spokesperson while reporting on the story yesterday, the cybersecurity firm pointed out how its AI detection system discovered a custom phishing kit on a domain meant to look like the VoteBuilder website, which is where the Democratic Party’s voter database login resides. The uniqueness of the phishing kit as well as how closely the site resembled the authentic login page are partially the reason the fake site was flagged.
Later in a blog post, the cybersecurity firm laid out its process for discovering the fake login page and shared the domain, verifyauth.com, the operation was hosted on.
A look at the Whois information shows the domain was registered no more than 24 hours prior to Lookout’s discovery of the site.
The type of spear phishing campaign this unauthorized simulation attempted to mimic are similar to the real things previously used to trick Democratic staffers into submitting their usernames and passwords, giving Russian hackers access to the DNC emails that were leaked during the 2016 election. Microsoft has reported on two separate incidents this summer where the company intervened to stop Russia-linked spear phishing attacks on U.S. political targets such as Congresspeople and think tanks.
Topics Cybersecurity Elections Politics
(Editor: {typename type="name"/})
Best laptop deal: Save $390.99 on the Lenovo IdeaPad 3i
Mongoose Coin was referenced as a joke, now it's real
Meta's VRChat clone, Horizon Worlds, launches for all adult users on Quest 2
It's spring cleaning season, so people are talking about kanso. What is it?
NRA's gun ban raises ire of Parkland shooting survivors
NASA's Perseverance rover beamed back beautiful landscape views of Mars
J.K. Rowling has apologised again for killing someone you loved in 'Harry Potter'
Wordle today: The answer and hints for January 23, 2025
Rivian R1T is first electric pickup to win MotorTrend's 'Truck of the Year' award
接受PR>=1、BR>=1,流量相当,内容相关类链接。