Hackers can take control of voting machines in the US in less than 2 hours
Over the weekend, hackers from all over the world gathered and displayed their talents at the Defcon conference held in Las Vegas, USA. They had a rare opportunity to unlock the voting system and the results did not disappoint.
Here, Carsten Schürmann, an associate professor of Copenhagen University of Technology successfully penetrated a server that voted, Advanced Voting Solutions' 2000 WinVote, via a WiFi system after nearly an hour and a half. After exploiting a security vulnerability on Windows XP operating system since 2003, Carsten Schürmann was able to control this voting system remotely.
After the Russian hackers attacked several states in the 2016 Presidential election, managers began to care about election technology in the United States. In order to serve the Defcon conference, about 30 votes were cast (the numbers of those machines were not disclosed).
Months before the conference, many serious vulnerabilities in WinVote were discovered by Synack, a security company in San Francisco. This group simply plugs the mouse and keyboard into the machine and clicks the "control-alt-delete" key combination that can pass the voting software.
Jay Kaplan, co-founder of Synack, said they only need to plug in the USB and perform a simple operation for 3 seconds to cause the system to be compromised, even hijacking and controlling the remote computer.
Synack also used a mobile application to crack the device by installing a remote control program inside the device. Even, Synack once installed and played Minesweeper (mine detection) game on the voting machine.
According to Anne-Marie Hwang, an intern at Synack, changing votes is as easy as updating documents on Microsoft Excel.
With the findings at this conference, security experts hope to make the government care and offer solutions for voting machines that are too old.
See more:
- In prison, hackers can still steal more than $ 200,000 through a tablet without an Internet connection
- Hackers took control of 18,000 Huawei router devices in just one day
- Hacker successfully installs malware on your computer in less than 5 minutes
You should read it
- 50 million Facebook accounts are stolen, this is the biggest leak of information in social network history
- Just released iOS 12 has been successfully hacked by Chinese hackers on the iPhone Xs
- What will a top hacker do with a hotel computer?
- Revealed the hacker attacking email Mrs. Palin
- Instructions for installing and using Office 2016
- White-haired 'monsters'
- Apple does not support iPhone 6s, 7 and SE 2016 to update iOS 16
- Chinese hackers use fingerprints on glass to crack smartphones
May be interested
- How to use universal air conditioner remote control for all types of machinesis your air conditioner remote control broken or lost? buying a genuine remote control is too expensive, not to mention old models are no longer available or hard to find? at this time, a universal air conditioner remote control is the best option. but how to use a universal air conditioner remote control?
- Microsoft has just 'lowered' the way hackers use to control computersupdating in the office 2016 suite gives enterprise administrators the right to block the process of running macros in files.
- The new vulnerability on Intel allows hackers to take control of your computer within 30 secondswhile intel's meltdown and specter vulnerabilities have not been completely overcome, the world faces a new security vulnerability that allows hackers to take complete control of the user's device and attack time within 30 seconds.
- Detecting vulnerabilities in BitTorrent applications allows hackers to control user computersa serious flaw in the bittorrent application of transmission was discovered by tavis ormandy, a leading security expert at google. if successfully exploited, hackers can take full control of computers running linux or windows.
- The configuration guide features the Quiet Hours on Windows 10if you are having a headache because the popup notifications window appears under the corner of the screen, especially while you are focusing on working these notifications will make you feel uncomfortable and annoying.
- Hacker successfully stole 100,000 photos from border control databasethe us customs and border protection department officially released a statement on monday that the database of one of their subcontractors was 'visited' by hackers in a malicious cyberattack.
- Detecting zero-day vulnerabilities in Internet Explorer helps hackers gain control of the computerthe research team from qihoo 360's security unit discovered a zero-day vulnerability (the term refers to unpublished or unresolved vulnerabilities) on internet explorer.
- New company of billionaire Elon Musk is studying technology to use the human brain to control machinesaccording to the journal of wall street today, elon musk, billionaire, inventor, entrepreneur and ceo of tesla and space x recently founded a new company with the goal of connecting. human brain with computer.
- Hackers took control of the city's entire computer system, demanding a ransom of $ 600,000 bitcoinon monday, the riviera beach city council agreed to pay a $ 600,000 ransom to convert into bitcoin for hackers in control of the city computer system to recover data. important data has been interfered.
- The 17-year-old Hacker 'devastated' the Twitter networkpearce delphin (@zzap) is believed to be the 'bait' for other hackers to attack twitter and cripple for more than five hours.