UPDATED 23:28 EST / OCTOBER 29 2020

SECURITY

$2.3M stolen from Wisconsin Republicans in phishing attack

Hackers have stolen $2.3 million form the Republican Party of Wisconsin following a phishing attack.

The phishing attack was detected Oct. 22 and involved those behind the hack obtaining the funds through doctored invoices under the name of Wisconsin GOP vendors. The hackers altered invoices so that when they were paid, the money did not go to the vendors but to the hackers instead.

The U.S. Federal Bureau of Investigation was contacted Friday, Oct. 23, and has launched an investigation into the theft of the funds.

The Associated Press reported Wednesday that the funds stolen were meant to be used to reelect President Donald Trump. The President won the state by fewer than 23,000 votes in 2016, with polls showing a tight race in the state for the forthcoming election.

Whether the theft of funds was politically motivated or simply opportunistic is unknown at this stage.

“It may be partisan in that the cybercriminals behind this attack may prefer one party over the other (though it’s not clear which party is advantaged here) and we can be sure it will get twisted to partisan ends,” Tom Pendergast, chief learning officer at cybersecurity education firm MediaPro Holdings LLC, told SiliconANGLE. “However, the way we respond to it should not be partisan. Making voting and email and digital transactions and the internet safe for everyone should be an issue we can all get behind. No one gains from cybercrime and no one gains from election fraud if what we ultimately care about is a stable democracy.”

Hank Schless, senior manager, security solutions at mobile security solutions company Lookout Inc., noted that with Election Day drawing closer, campaign staffers are relying heavily on their smartphones and tablets.

“SMS, social media and third-party messaging platforms are three of the most popular platforms threat actors use to socially engineer targets into falling for phishing attempts,” he said. “It’s gone so far as the DNC warning campaign workers against social engineering through dating apps in a statement issued earlier this year.”

Ken Liao, vice president of cybersecurity strategy at email security platform provider Abnormal Security Corp. said political candidates, their staffs and the organizations they work with will always be targets for malicious actors.

“Email-based attacks – and more specifically attacks perpetrating invoice fraud – are one of the more common methods used by hackers to gain access to sensitive information,” Liao said. “As we get closer to the election, attackers will count on the fact that staffers will be busier and stretched thin, making it easier to induce a security lapse. All it takes is one errant click from a single member of a campaign’s staff.”

Photo: Jeff Brunton/Wikimedia Commons

A message from John Furrier, co-founder of SiliconANGLE:

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU