Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Privacy

2020 Presidential Candidate Campaign Websites Fail On User Privacy

Despite everything that has happened over the last four years, the security posture of the 2020 presidential candidates’ campaign websites is little better and often worse than it was in 2016.

Despite everything that has happened over the last four years, the security posture of the 2020 presidential candidates’ campaign websites is little better and often worse than it was in 2016.

An Online Trust Audit, from the Online Trust Alliance (OTA — part of the Internet Society), examined the visible privacy, website security and consumer protection postures of the current 23 candidates’ campaign sites. Only seven candidates achieved the OTA Honor Roll (that is, with no failures in any of the three areas), but none with flying colors. These seven include Donald Trump and Bernie Sanders, but current Democratic frontrunners Elizabeth Warren and Joe Biden both fail.

Interestingly, the OTA forewarned all the candidates about the publication of this audit, giving them seven days to update their sites. Only one candidate site took up this option — but the update was insufficient to alter its ‘fail’ result.

One worrying aspect of the survey is the extent to which the candidates, treated as a ‘sector’, lag behind a similar 2018 audit of other industry sectors — by a ratio of more than 2:1 in achieving the Honor Roll. For example, 91% of the federal sector and 73% of the financial sector gained the Honor Roll; compared to just 30% of the candidates sector.

The biggest area of failure was in user privacy. Every one of the candidates that did not achieve the Honor Roll failed here. Putting this in context, the average score was 56 with a failure bar set at 60. In the 2018 audit of other sectors, the average score was 70.

The three primary areas of concern over privacy were the lack of a privacy statement (five campaigns had no discoverable statement); an inadequate statement; and too freely sharing user data.

Only one of the sites explicitly said it does not share visitor data with other parties. Many, notes the OTA, said they could share data “…with candidates, organizations, campaigns, groups or causes that we believe have similar political viewpoints, principles or objectives.” This effectively means that the candidates feel able to share visitor data with anyone. This is compounded with a low score on any statement regarding data retention (just 13% of the sites have one) and a zero score on any indication that third parties receiving the data are held to any specific privacy requirement.

The best area was in website security, with no failures. In this area, the candidates outscored (93) all other sectors other than the federal score (94). The financial sector scored 89. This better posture is likely down to the nature of the sites being only recently developed and using providers with the latest technology. So, for example, 100% of the campaigns use AOSSL, while 58% of the campaigns use the latest TLS 1.3 (more than five times the rate of any other sector.

Advertisement. Scroll to continue reading.

Nevertheless, despite there being no outright failures in this category, there is still room for improvement. Only 58% of the sites have implemented a web application firewall. “Given that these sites are new, adoption should be higher,” comments the Internet Society. None of the sites provide a means for reporting vulnerabilities, which makes it harder for security researchers to help improve the sites’ security.

Nine percent of the candidates failed in consumer protection. Given the nature and purpose of presidential campaign websites, this really should be none. There is a high adoption of SPF (87%) and DKIM (91%); but two of the websites provide no email authentication at all.

Sixty-one percent of the campaigns have a DMARC record, but only 30% employ ‘enforcement’ (the policy that rejects or quarantines messages that fail authentication). While this compares favorably with other sectors, the simplicity of campaign websites, their recent development, and the nature of their function (collecting funds) means that all should be employing every means possible to protect users from phishing attacks.

The results of this survey should concern everyone. “The number of campaigns that failed to pass the 2020 Presidential Campaign Trust Audit is alarming given the increased attention to privacy and security issues over the last four years,” commented Jeff Wilbur, technical director of the Internet Society’s Online Trust Alliance. “The campaigns should make proper handling of their visitors’ information a priority.”

Campaign websites collect personal data from many millions of visitors. Visiting a particular campaign is likely to provide an indication of political affiliation. The combination of personal information and political intentions makes the content of the campaign websites valuable to any party wishing or intending to interfere in the 2020 elections — and that is likely to include a range of nation states.

“One should not underestimate the sophistication of nation-state hacking actors,” said Ilia Kolochenko, CEO of web security firm ImmuniWeb, about the analysis. “They will likely leverage a wide spectrum of attack vectors, including getting the data via careless third-party providers and negligent vendors.” Probably, he added, “attackers have already implemented continuous monitoring of [these] presidential websites to get instant alerts once a software or its component becomes vulnerable… Unfortunately, attackers frequently act faster than security teams and manage to get in within minutes after a security flaw is publicly disclosed or sold on the Dark Web.”

There is another potential concern for the candidates. Many of the sites are likely to be in contravention of the California Consumer Protection Act (CCPA) coming into force in January 2020.

Related: Internet Society Publishes Privacy Code of Conduct 

Related: Top Websites Fail to Prevent Email Spoofing 

Related: Securing the 2020 Elections From Multifarious Threats 

Related: Eight Steps to Data Privacy Regulation Readiness 

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Privacy

Many in the United States see TikTok, the highly popular video-sharing app owned by Beijing-based ByteDance, as a threat to national security.The following is...

Privacy

Employees of Chinese tech giant ByteDance improperly accessed data from social media platform TikTok to track journalists in a bid to identify the source...

Application Security

Open banking can be described as a perfect storm for cybersecurity. At one end, small startups with financial acumen but little or no security...

Government

The proposed UK Online Safety Bill is the enactment of two long held government desires: the removal of harmful internet content, and visibility into...

Mobile & Wireless

As smartphone manufacturers are improving the ear speakers in their devices, it can become easier for malicious actors to leverage a particular side-channel for...

Cloud Security

AWS has announced that server-side encryption (SSE-S3) is now enabled by default for all Simple Storage Service (S3) buckets.