Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
United States Security Politics

National Guard Called In To Thwart Cyberattack in Louisiana Weeks Before Election (reuters.com) 31

The Louisiana National Guard was called in to stop a series of cyberattacks aimed at small government offices across the state in recent weeks, Reuters reported Friday, citing two people with knowledge of the events, highlighting the cyber threat facing local governments in the run up to the 2020 U.S. presidential election. From the report: The situation in Louisiana follows a similar case in Washington state, according to a cybersecurity consultant familiar with the matter, where hackers infected some government offices with a type of malware known for deploying ransomware, which locks up systems and demands payment to regain access. Senior U.S. security officials have warned here since at least 2019 that ransomware poses a risk to the U.S. election, namely that an attack against certain state government offices around the election could disrupt systems needed to administer aspects of the vote. It is unclear if the hackers sought to target systems tied to the election in Louisiana or were simply hoping for a payday. Yet the attacks raised alarms because of the potential harm it could have led to and due to evidence suggesting a sophisticated hacking group was involved. Experts investigating the Louisiana incidents found a tool used by the hackers that was previously linked to a group associated with the North Korean government, according to a person familiar with the investigation.
This discussion has been archived. No new comments can be posted.

National Guard Called In To Thwart Cyberattack in Louisiana Weeks Before Election

Comments Filter:
  • There are no pro-Democracy protestors to shoot, so there isn't much for them to do yet.
  • I'm sure the non-technical world has been wondering why we don't just put up some sandbags against those pesky cyberattacks. Somebody ought to *shoot* those damn hackers! Git 'em! Use those jackboots to stomp out all those bad packets. I'm sure calling the National Guard was the right move. It's not like we have parts of the gubmint that are specific for "cyber". You gotta call the experts. I mean, who else but the National Guard, right?
    • Pssst, the article is referring to the LA National Guard's Cyber Defense Incident Response Team. Who does your local government call when their IT infrastructure is attacked? Anyone?

      • Yeah man, my mistake. I mean we've all heard of the "LA National Guard's Cyber Defense Incident Response Team" I mean around the kitchen table we just refer to them as LANGDIRT. It must have just slipped my mind! Who does my local government call? Probably not the FBI, nah. Probably not a commercial consultant with experience, nah. Probably not anyone in intelligence (CIA, NSA, other DoD) who has a job dealing with foreign actors all the time, nah. I'm certain it wouldn't be the Internet Crime Complaint cen
      • Who ya gonna call?

        LAN Guard Cyber DIRT !

      • Being republicans - a priest to exercoise the demons from the wire.
  • Far down in the linked article is a short paragraph pointing out that Louisiana's election infrastructure is totally self-contained to the Secretary of State's network. No local government network touches a local Registrar of Voters office network or the Sec of State in any way.

    Once again some local parish employee simply clicked on something in an email they shouldn't have and got their PC encrypted.

    • by skids ( 119237 )

      Plus, while don't know how the local/state races are going, it's not like we don't already know how Louisiana is going to fall in the federal races. So just add this one to the pile of stories about under-trained employees in government offcies getting phished.

  • Most people are almost completely ignorant about computer technology, and don't want to educate themselves, in my experience.
    • > Most people are almost completely ignorant ... and don't want to educate themselves, in my experience.

      Are you thinking of Slashdotters, or people in general?
      Your comment applies to both, in my experience. :)

    • and vendors with best kickbacks get the contract.

  • by tiqui ( 1024021 ) on Friday October 23, 2020 @04:45PM (#60641432)

    each voter shows a photo ID and submits a paper ballot on a singular election day, or with a valid excuse does so in advance at the registrar.

    Stretching an election over multiple days opens windows for fraud and multiple voting.

    Going electronic opens windows for hacking & fraud & data loss.

    Not verifying voter identities, particularly when paired with multi-day voting, opens huge windows for fraud.

    • What fantasy are you living in, where voter ID is a solution to ransomware? Even if these attacks were for the purpose of influencing the election, nothing about this has the remotest relation to voter ID.

      Voter ID protects against one thing: in-person voter fraud. Something which happens vanishingly seldom.
    • The US Post Office is allowed to deliver documents classified as Secret. Businesses often use US mail as an authentication method, which is why documents are mailed to you sometimes instead of being emailed. It's been obvious for a decade or more that networked computers can not be completely secured, if only because the people themselves operating them are not secure, but also because every single app which uses a network connection running on a computer is a potential (and likely) host of network vulner
    • These are all valid potential factors, but given that half of the voters (who actually vote, not just eligible voters) already votes early (see the numbers for 2016 elections) apparently it is not a big deal for election officials.

      I was astonished when I learned that just recently while some news outlet reported current preliminary numbers that seemed huge, but apparently far behind this number right now (we still have time - 10 days until election, but it is entirely possible that the ultimate result, albe

  • >Senior U.S. security officials have warned here since at least 2019 that ransomware poses a risk to the U.S. election...

    I know election security is left up to the states, but this sentence is like a summary of security in the US. everybody issues warnings but no one does anything. Medicine warns that pandemics are a danger, but no one listens, and aren't the medical people the ones who should have been preparing? Government warns companies of the dangers of ransomware, but business chooses to ignore

Solutions are obvious if one only has the optical power to observe them over the horizon. -- K.A. Arsdall

Working...