Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Expert: Georgia Election Server Showed Signs of Tampering

A computer security expert says he found that a forensic image of the election server central to a legal battle over the integrity of Georgia elections showed signs that the original server was hacked.

A computer security expert says he found that a forensic image of the election server central to a legal battle over the integrity of Georgia elections showed signs that the original server was hacked.

The server was left exposed to the open internet for at least six months, a problem the same expert discovered in August 2016. It was subsequently wiped clean in mid-2017 with no notice, just days after election integrity activists filed a lawsuit seeking an overhaul of what they called the state’s unreliable and negligently run election system.

In late December 2019, the plaintiffs were finally able to obtain a copy of the server’s contents that the FBI made in March 2017 and retained — after the state allegedly dragged its feet in securing the image.

State officials have said they’ve seen no evidence that any election-related data was compromised. But they also long refused to submit the server image for an independent examination.

Logan Lamb, a security expert for the plaintiffs, said in an affidavit filed in Atlanta federal court on Thursday that he found evidence suggesting the server was compromised in December 2014. Lamb said the evidence suggests an attacker exploited a bug that provided full control of the server.

Lamb also said he determined that computer logs — which would have been critical to understanding what might have been altered on or stolen from the server — only go back to Nov. 10, 2016 — two days after Donald Trump was elected U.S. president. Two years later, Brian Kemp won the Georgia governor’s race by a narrow margin over Democrat Stacey Abrams.

Kemp oversaw Georgia’s elections during both races as secretary of state. Election administration was handled at Kennesaw State University by an outfit that Kemp’s office dismantled after the server-wiping incident.

Additionally, Lamb found evidence that election-related files were deleted from the server on March 2, 2017, just after a colleague of his alerted KSU officials that the election server remained vulnerable to hackers.

Advertisement. Scroll to continue reading.

It was Lamb who initially alerted Merle King, director of the elections center at KSU, in August 2016 of a gaping security hole that left the server vulnerable to tampering.

The fact that the access logs were deleted suggests possible foul play, Lamb wrote.

“I can think of no legitimate reason why records from that critical period of time should have been deleted,” he said in his sworn statement.

The plaintiffs have accused state election officials of repeatedly and intentionally destroying evidence that could show unauthorized access to state election infrastructure and the potential manipulation of election results.

A protective order prevented Lamb from speaking to a reporter about his findings. A spokesman for Georgia’s secretary of state, Brad Raffensperger, had no immediate comment and attorneys for the defendants did not respond to emailed questions and a telephone message.

In his original and less methodical examination of the server after he discovered it exposed online, Lamb said he found personal data for Georgia’s 6.7 million voters as well as passwords used by county officials to access election-staging files.

For the 2020 election, Georgia officials are replacing antiquated touchscreen voting machines that have long been discredited by computer scientists. But the Coalition for Good Governance, one of the plaintiffs in the case, rejects the computerized ballot-marking devices the state has purchased to replace them.

It maintains, paralleling the findings last year of a National Academies of Sciences report, that the only secure voting solution are hand-marked ballots processed by scanners that leave a human-readable paper trail that can be audited later. Most U.S. voters will use systems with a voter-verifiable paper trail in November.

“The defendants have since day one tried to do everything possible to obstruct the public, the plaintiffs and the court from seeing the shambles of what they had in an incredibly compromised election system,” said the coalition’s Executive Director Marilyn Marks.

Now, she said, state officials argue that because of their new system, problems with the old system aren’t relevant anymore.

“Of course, that’s not true,” she added. “This was the hub of their entire elections structure.”

U.S. District Judge Amy Totenberg, who is presiding over the case, has expressed grave concerns about the vulnerability of Georgia’s election system and has scolded state officials for being slow to remedy serious vulnerabilities.

Lamb, a former Oak Ridge National Laboratory researcher, said he found evidence in examining the server image that software running on the voting machines being phased out in Georgia were vulnerable to known attacks.

He also said that in the December 12, 2014, intrusion he detected, the attacker patched the Drupal server vulnerability 20 minutes after the break in. That’s typical of a seasoned hacker who wants to prevent others from similarly gaining entry to a compromised machine.

The FBI obtained the server image as part of an investigation into the security researchers who alerted KSU to the server’s security hole. Those researchers were never accused of any wrongdoing. It is not clear, however, if the FBI ever examined the image to try to determine whether it had been compromised, a significant question given federal findings of interference by Russian military intelligence agents in the 2016 election.

An FBI spokesman in Atlanta, Kevin Rowson, declined to comment on the matter.

Documents obtained by an independent researcher from the FBI in a Freedom of Information Act request and shared with The Associated Press provide no indication that the bureau ever examined the KSU server image for evidence of tampering by malicious outsiders. The investigation apparently was limited to Lamb and his associate. An FBI document dated Oct. 23, 2017, said the matter would be shelved once the hard drive containing the image was placed in a case file. It said no investigative activity had been conducted in the case for two months.

Related: Hacking Elections: Georgia’s Midterm Electronic Voting in the Dock

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.