{"id":7173,"date":"2016-05-12T08:35:43","date_gmt":"2016-05-12T12:35:43","guid":{"rendered":"https:\/\/kasperskydaily.com\/uk\/?p=7173"},"modified":"2019-11-22T10:10:28","modified_gmt":"2019-11-22T10:10:28","slug":"2016-usa-election","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/2016-usa-election\/7173\/","title":{"rendered":"US election season brings political hijinks"},"content":{"rendered":"<p>In the United States, the political season is heating up as the country is preparing\u00a0for their presidential election for the successor to Barrack Obama. The whole process of political theatre is almost starting to resemble <i>Real World<\/i>-style reality TV.<\/p>\n<p>This event is not only being watched by citizens of the USA (and political wonks around the globe), but this spectacle is something that has cyber-criminals looking for exploits. Much like sporting events like <a href=\"https:\/\/securelist.com\/blog\/spam-test\/74489\/spammers-all-geared-up-for-euro-2016\/\" target=\"_blank\" rel=\"noopener noreferrer\">Euro 2016<\/a>, the <a href=\"https:\/\/www.kaspersky.com\/blog\/laremy-tunsil-twitter-hack\/11989\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">NFL Draft<\/a> or <a href=\"https:\/\/www.kaspersky.co.uk\/blog\/world-cup-streaming-scams\/4246\/\" target=\"_blank\" rel=\"noopener noreferrer\">World Cup<\/a>, criminals know that there is the chance that they can dupe unsuspecting victims acting out of blind passion. Fans of Bernie Sanders or Donald Trump may not really focus on where a link is really leading to if they can \u201cClick Now\u201d to show their support.<\/p>\n<p>With that in mind, we wanted to call your attention to the fact that you should be on the lookout for scams and threats that could be tied to the election.<\/p>\n<h3>What does free actually cost?<\/h3>\n<p>As of time of writing this post, it looks like the election will pit Democrat Hilary Clinton against Donald Trump from the Republican Party. Both candidates have drawn up some ire from the other side of the aisle and even a slew of free apps where you can mock them or follow along with their campaigns.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-7176\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2016\/05\/05193813\/political-madness-android.png\" alt=\"political-madness-android\" width=\"1024\" height=\"559\"><\/p>\n<p>While it might let out some stress dropping poop on Trump\u2019s head or turning Clinton into a version of Flappy Bird, there is no such thing as a free lunch. We\u2019ve written on the data we give over for free things in the past, but for example, one of the free apps in the Play Store has access to:<\/p>\n<p><b>In-app purchases<\/b><br>\nAllows the user to make purchases from within this app<\/p>\n<p><b>Device &amp; app history<\/b><br>\nAllows the app to view one or more of: information about activity on the device, which apps are running, browsing history and bookmarks<\/p>\n<p><b>Identity<\/b><br>\nUses one or more of: accounts on the device, profile data<\/p>\n<p><b>Location<\/b><br>\nUses the device\u2019s location<\/p>\n<p><b>Photos\/Media\/Files<\/b><br>\nUses one or more of: files on the device such as images, videos, or audio, the device\u2019s external storage<\/p>\n<p><b>Wi-Fi connection information<\/b><br>\nAllows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and names of connected Wi-Fi devices<\/p>\n<p><b>Device ID &amp; call information<\/b><br>\nAllows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call<\/p>\n<p><b>Other<\/b><br>\nReceive data from Internet<\/p>\n<p>The majority of the developers creating the apps within the Play Store are also not verified as a \u201cTop Developer,\u201d while iTunes has ones being created by individuals. It\u2019s up to you to determine if giving up your data is a good trade for you, but seems like a lot to me.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-7175\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2016\/05\/05193815\/political-madness-ios.png\" alt=\"political-madness-ios\" width=\"1024\" height=\"565\"><\/p>\n<h3>Even Official apps have issues<\/h3>\n<p>Speaking of private data\u2026 Earlier in the election cycle the official mobile apps of Republican candidates Senator Ted Cruz and Governor John Kasich were found to have some <a href=\"http:\/\/www.deccanchronicle.com\/technology\/in-other-news\/280416\/the-dark-link-between-elections-apps-and-your-personal-data.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">security flaws<\/a> that potentially <a href=\"http:\/\/www.usnews.com\/news\/politics\/articles\/2016-03-11\/cruz-campaign-updates-smartphone-app-to-fix-security-flaws\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">could have leaked personal information of their supporters<\/a>. While both have since stopped their campaigns, the threats were nonetheless real for the tens of thousands of users who downloaded and voluntarily shared their personal information.<\/p>\n<p>Veracode, who conducted the audit of the Cruz app, noted that the poor coding practices \u201ccould lead to leaked information, or even exploitation.\u201d The exploits to the app were patched after the Associated Press shared the company\u2019s findings with the campaign team.<\/p>\n<h3>You\u2019ve got mail<\/h3>\n<p>We talk a lot about the dangers of phishing emails. In the article about the app security, the authors noted that a member of staff\u00a0on the Cruz campaign clicked on a phishing email that in-turn sent out emails trying to lure people to click on a link that would turn over login credentials to the hacker.<\/p>\n<p>The member of staff\u00a0noted that a lapse in concentration led to him clicking on a bad link. As we\u2019ve said in the past, you need to be careful whenever clicking a link.<\/p>\n<p>Email has also been a hot topic on the Democratic side of the ticket. For the duration of her campaign, Mrs. Clinton\u2019s email has been a virtual lighting rod. In March of 2015, it was uncovered that she used <a href=\"https:\/\/en.wikipedia.org\/wiki\/Hillary_Clinton_email_controversy\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">her family\u2019s private email server<\/a> to conduct official communications, including ones marked classified by the State Department.<\/p>\n<p>The story of email has continued into this month where a hacker known as \u201cGuccifer\u201d has said that he <a href=\"http:\/\/www.foxnews.com\/politics\/2016\/05\/04\/romanian-hacker-guccifer-breached-clinton-server-it-was-easy.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">breached the email server<\/a> of the Clinton\u2019s back in 2013 \u2014 and that it was easy. This account has not been verified, but what can be is that the FBI is investigating whether classified or Top Secret emails flowed through that server <a href=\"http:\/\/fortune.com\/2016\/05\/05\/guccifer-clinton-hack\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">while she served as Secretary of State<\/a>.<\/p>\n<h3>Not just federal local too<\/h3>\n<p>While much of the focus lies on the race for the White House, Americans will also vote on for local political seats in the general election coming this November. Local-level politics are not as well funded as the federal races, but can be none-the-less vicious. Like their federal counterparts, they are also not immune to security holes.<\/p>\n<p>In February, the Florida Department of Law Enforcement arrested David Levin, who disclosed vulnerabilities that would reveal admin credentials for the Lee County state elections website.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/38rsseDeFYQ?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>While <a href=\"http:\/\/www.news-press.com\/story\/news\/crime\/2016\/05\/04\/estero-man-arrested-hacking-into-state-lee-elections-website-david-levin-dan-sinclair\/83921672\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Levine thought he was doing the right thing<\/a>, the law saw it a different way. He is facing <a href=\"http:\/\/www.theregister.co.uk\/2016\/05\/09\/researcher_arrested_after_reporting_pwnage_hole_in_elections_site\/?mt=1462794719197\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">three third-degree felony counts of property crime<\/a>.<\/p>\n<h3>Not just America<\/h3>\n<p>America is not alone in the risk of hacking on the political landscape. A recent article from Bloomberg takes a deep dive into the work of <a href=\"http:\/\/www.bloomberg.com\/features\/2016-how-to-hack-an-election\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Andres Sepulveda<\/a> and his alleged hacking work to rig elections spanning nearly a decade. It is a good read for those fascinated with corruption, politics or hacking.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">How to hack an election <a href=\"https:\/\/t.co\/miFcbj1E9W\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/miFcbj1E9W<\/a> <a href=\"https:\/\/t.co\/dR7n4dbHzr\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/dR7n4dbHzr<\/a><\/p>\n<p>\u2014 Bloomberg Politics (@bpolitics) <a href=\"https:\/\/twitter.com\/bpolitics\/status\/716649146493612032?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 3, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Much like winter in Game of Thrones, the American Election is coming and with it, we\u2019ll see criminals trying to snare\u00a0unsuspecting victims.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Politics are not immune to cyber hijinks and hackers.<\/p>\n","protected":false},"author":636,"featured_media":7174,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2026],"tags":[975,1463,1464,82,1462,76,97,619],"class_list":{"0":"post-7173","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-app-security","10":"tag-bernie-sanders","11":"tag-donald-trump","12":"tag-hacking","13":"tag-hillary-clinton","14":"tag-phishing","15":"tag-security-2","16":"tag-vulnerability"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/2016-usa-election\/7173\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/2016-usa-election\/7133\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/2016-usa-election\/7101\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/2016-usa-election\/8310\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/2016-usa-election\/8152\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/2016-usa-election\/12079\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/2016-usa-election\/7675\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/2016-usa-election\/11347\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/2016-usa-election\/12079\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/2016-usa-election\/12079\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/app-security\/","name":"app security"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/7173","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=7173"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/7173\/revisions"}],"predecessor-version":[{"id":17728,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/7173\/revisions\/17728"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/7174"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=7173"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=7173"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=7173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}