Results 1 to 10 of 10

Thread: Defcon hackers find it’s very easy to break voting machines

  1. #1

    Defcon hackers find it’s very easy to break voting machines

    When the password for a voting machine is "abcde" and can't be changed, the integrity of our democracy might be in trouble.
    The Advanced Voting Solutions WinVote machine, dubbed "America's worst voting machine," came equipped with this simple password even as it was used in some of the country's most important elections. AVS went out of business in 2007, but Virginia used its insecure machines until 2015 before dropping them for scrap metal. That means this vulnerable hunk of technology was used in three presidential elections, starting with George W. Bush's re-election in 2004 to Barack Obama's in 2012.
    In addition to Virginia, Pennsylvania and Mississippi used the WinVote without knowing all the ways it could be hacked. Unlike other technology -- your phone, your laptop, connected cars -- security wasn't really a focus.
    Google and Apple invite hackers to find flaws in their code and offer hefty rewards to those who find them. It's a common practice in the industry. The government's done it too, with programs like "Hack the Pentagon."

    But opportunities to test how secure our voting machines are from hackers have been rare. Manufacturers like to keep the details of voting machines secret. And they don't often provide machines for people to test.
    That's why hackers swarmed to the Voter Hacking Village at Defcon in Las Vegas. The massive hacker convention is split into "villages" based on themes such as lock picking, encryption, social engineering and, for the first time, voter machine hacking.
    Defcon received more than 30 voting machines to play with, providing a rare opportunity for hackers to find the flaws in our democracy's technology. (The organizers didn't specify how many models the 30 units represented.) Voting technology was elevated into the political spotlight in 2016 as lawmakers raised concerns about Russian hacking and President Donald Trump's road to the White House.
    To be clear, there's no evidence any votes were hacked during the 2016 presidential election. But there hasn't been much research on the voting machines to see if it's possible.
    "The exposure of those devices to the people who do bug bounties or actually look at these kind of devices has been fairly limited," said Brian Knopf, an internet of things security researcher for Neustar, a security analysis company. "And so Defcon is a great opportunity for those of us who hack hardware and firmware to look to these kind of devices and really answer that question, 'Are they hackable?'"
    After just about an hour and a half, the answer was an emphatic "yes."
    In the time it takes to sit through "The Emoji Movie," you could break into the WinVote machine through its Wi-Fi system, like DemTech's investigator Carsten Schürmann did on Friday. DemTech is a research project that's been looking at voting technology in Denmark.

    He used a Windows XP exploit from 2003, which the voting machine never patched, and got remote access. That meant he could change the votes from anywhere.


    Synack, a security platform based in San Francisco, had its hands on the WinVote machine months ahead of Defcon. It discovered a host of serious flaws with the system.
    While many people at the Voter Hacking Village zeroed in on the weak mechanical lock covering access to the machine's USB port, Synack worked on two open USB ports right on the back. No lock picking was necessary.
    The team plugged in a mouse and a keyboard -- which didn't require authentication -- and got out of the voting software to standard Windows XP just by pressing "control-alt-delete." The same thing you do to force close a program can be used to hack an election.
    "It's really just a matter of plugging your USB drive in for five seconds and the thing's completely compromised at that point," Synack co-founder Jay Kaplan said. "To the point where you can get remote access. It's very simple."
    Synack's team was able to access the voting machine from a mobile app by installing a remote desktop program on it.
    Once you're out of the voting program on the machine, it's just like any old Windows XP computer, Synack found. In one case study, the company found a poll worker in Virginia had hacked the machine so she could play Minesweeper on it.
    When you're in the machine, changing votes is as simple as updating an Office document.
    It's like an Excel file in which "you would just change the number and upload it back," said Anne-Marie Hwang, an intern at Synack, who demonstrated the vote changes.

    More at: https://www.cnet.com/news/defcon-hac...ting-machines/
    Never attempt to teach a pig to sing; it wastes your time and annoys the pig.

    Robert Heinlein

    Give a man an inch and right away he thinks he's a ruler

    Groucho Marx

    I love mankind…it’s people I can’t stand.

    Linus, from the Peanuts comic

    You cannot have liberty without morality and morality without faith

    Alexis de Torqueville

    Those who fail to learn from the past are condemned to repeat it.
    Those who learn from the past are condemned to watch everybody else repeat it

    A Zero Hedge comment



  2. Remove this section of ads by registering.
  3. #2


    Hosted by technology non-profit R00tz Asylum, the competition was held on the sidelines of the annual Def Con hacking conference in Las Vegas, where RT reports that children between the ages of 8 and 17 were tasked with hacking into replica election office websites in key “battleground” states where the upcoming US midterm elections in November are expected to be tight.

    Of the 39 contestants who entered, 35 were successful in breaking into the sites with the fastest being 11-year old Audrey Jones.

    She cracked the site’s code in just 10 minutes.
    While R00tz Asylum’s mantra is “hacking for good,” it exposes glaring vulnerabilities to the cyber security of the US election system despite a whopping $380 million approved by Congress to improve cyber-security for elections in 2018 alone.

    But blaming Hillary's loss on an 11-year-old American girl doesn't have quite the same impact as the nefarious-sounding Russian hacking empire...

    More at: https://www.zerohedge.com/news/2018-...ns-childs-play
    Never attempt to teach a pig to sing; it wastes your time and annoys the pig.

    Robert Heinlein

    Give a man an inch and right away he thinks he's a ruler

    Groucho Marx

    I love mankind…it’s people I can’t stand.

    Linus, from the Peanuts comic

    You cannot have liberty without morality and morality without faith

    Alexis de Torqueville

    Those who fail to learn from the past are condemned to repeat it.
    Those who learn from the past are condemned to watch everybody else repeat it

    A Zero Hedge comment

  4. #3
    Not sure what the point of the RT story is. "Election office websites" have nothing to do with voting, vote aggregation or reporting of voting results to the County or Secretary of State. CNET story is almost exclusively about hacking a voting machine that is no longer being used. Doesn't really offer any insight into vulnerabilities in existing systems.

  5. #4
    Quote Originally Posted by Bern View Post
    Not sure what the point of the RT story is. "Election office websites" have nothing to do with voting, vote aggregation or reporting of voting results to the County or Secretary of State. CNET story is almost exclusively about hacking a voting machine that is no longer being used. Doesn't really offer any insight into vulnerabilities in existing systems.
    And they had to physically connect to each machine to hack each one.

    Synack worked on two open USB ports right on the back. No lock picking was necessary.
    The team plugged in a mouse and a keyboard -- which didn't require authentication -- and got out of the voting software to standard Windows XP just by pressing "control-alt-delete."


    It is not practical to try to hack an election one voting machine at a time. Even if it can in theory be done.
    Last edited by Zippyjuan; 08-14-2018 at 11:50 AM.

  6. #5
    Quote Originally Posted by Bern View Post
    Not sure what the point of the RT story is. "Election office websites" have nothing to do with voting, vote aggregation or reporting of voting results to the County or Secretary of State. CNET story is almost exclusively about hacking a voting machine that is no longer being used. Doesn't really offer any insight into vulnerabilities in existing systems.

  7. #6
    Quote Originally Posted by Zippyjuan View Post
    It is not practical to try to hack an election one voting machine at a time. Even if it can in theory be done.
    Thank you for your irrelevant input.

    A massive hack could be performed via software update.

  8. #7
    double
    Last edited by Zippyjuan; 08-14-2018 at 12:12 PM.

  9. #8
    Quote Originally Posted by timosman View Post
    Thank you for your irrelevant input.

    A massive hack could be performed via software update.
    No state used any of them in the last election- Virginia was the last state to have them- and they have gotten rid of those as of 2015. Mississippi used them in one county in the 2012 election. Only states with them since 2007. https://www.wired.com/2015/08/virgin...ting-machines/

    There won't be any "software updates". The company which made them is also out of business.
    Last edited by Zippyjuan; 08-14-2018 at 12:15 PM.



  10. Remove this section of ads by registering.
  11. #9
    Quote Originally Posted by Zippyjuan View Post
    No state used any of them in the last election- Virginia was the last state to have them- and they have gotten rid of those as of 2015. Mississippi used them in one county in the 2012 election. Only states with them since 2007. https://www.wired.com/2015/08/virgin...ting-machines/

    There won't be any "software updates". The company which made them is also out of business.
    What about the machines currently in use?

  12. #10
    Quote Originally Posted by Zippyjuan View Post
    And they had to physically connect to each machine to hack each one. ...
    That's not particularly important IMO as the greatest threat to tampering with votes, imo, is by someone in the chain of custody. We need a system that is completely and transparently auditable to ensure no shenanigans can go unnoticed. Supposedly, the tech already exists in Current machines, but it's not being used.

    http://blackboxvoting.org/ballot-images/



Similar Threads

  1. US Voting Machines Cracked In 90 Minutes At DEFCON
    By DamianTV in forum U.S. Political News
    Replies: 0
    Last Post: 07-29-2017, 10:09 PM
  2. Reporters use Google, find breach, get branded as “hackers”
    By Natural Citizen in forum U.S. Political News
    Replies: 1
    Last Post: 05-23-2013, 02:26 PM
  3. Computer Hackers: Break into Road Alert sign... ZOMBIES AHEAD
    By HOLLYWOOD in forum Science & Technology
    Replies: 3
    Last Post: 01-30-2009, 07:38 PM
  4. NJ Voting Machines Delay Governor From Voting
    By derdy in forum Grassroots Central
    Replies: 0
    Last Post: 02-05-2008, 11:39 AM
  5. Hackers bust CA's Diebold voting machines...
    By foofighter20x in forum U.S. Political News
    Replies: 0
    Last Post: 07-30-2007, 10:07 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •