Some Democrats Lead Trump in Campaign Domain-Security Efforts

  /     /     /  
Publicated : 23/11/2024   Category : security


Some Democrats Lead Trump in Campaign Domain-Security Efforts


Sanders and Trump campaigns lack proper DMARC security enforcement, study finds.



The 2020 Democratic presidential race remains wide open as all eyes are on New Hampshire this week, but some candidates have an edge when it comes to securing their campaigns from phishing and other attacks: About half of them have fully deployed technology to prevent the spoofing of their Internet domains.
Democratic presidential hopefuls Joe Biden (joebiden.com), Mike Bloomberg (mikebloomberg.com), Pete Buttigieg (peteforamerica.com), Tulsi Gabbard (tulsi2020.com), Amy Klobuchar (amyklobuchar.com), Tom Steyer (tomsteyer.com), Elizabeth Warren (elizabethwarren.com), and Andrew Yang (yang2020.com) all have implemented DMARC, the Domain-based Message Authentication, Reporting & Conformance protocol that protects organizations from domain-spoofing abuse.
Meanwhile, John Delaney (johndelaney.com), Deval Patrick (devalpatrick2020.com), and Bernie Sanders (berniesanders.com) — as well as President Donald Trump (donaldjtrump.com), the lone Republican candidate — each have adopted DMARC for their domains but only have it running in monitor-only mode, which could allow attackers to deliver emails spoofing the campaigns domain, a new study shows.
Campaigns with no DMARC protection for their domains at all are those of Democratic candidates Michael Bennet (michaelbennet.com) and Bill Weld (weld2020.com) and the former Republican challenger to Trump, Joe Walsh (joewalsh.org), who recently suspended his campaign, leaving their domains wide open for spoofing and abuse, according to security experts.
DMARC, which allows domain owners to control which users can send emails via their domain, is on the rise. According to Valimail, 80% of email inboxes worldwide perform authentication-checks on the sender domain, and the majority of consumer email accounts recognize the DMARC protocol, which currently is in the works as an Internet Engineering Task Force (IETF) standard. DMARC specifies and enforces which servers can send messages from a domain, and uses a digital signature validation process to ensure an email is legitimate.
On the recipient side of the equation, that information gets shared with the recipient as well as information on what to do with any unauthorized email. Microsoft Office 365, Google Gmail, and Yahoo all employ DMARC certification.
Seth Blank, director of industry initiatives at anti-phishing vendor Valimail, says email is the first likely step in an attack on election-related systems. Its easy and effective, he says. But the good news is that it looks like major presidential campaigns have started to get that message.
In May 2019, Valimail found that just three of 25 presidential campaigns had adopted DMARC. Blank says its likely the result of raised awareness in the wake of the 2016 presidential election, where breaches of the Democratic National Committee (DNC), Democratic Congressional Campaign Committee (DCCC), and of course, the personal email of John Podesta, former chair of then-Democratic presidential candidate Hillary Clintons campaign, served as a wake-up call for election security.
No DMARC Easy Button
Properly deploying DMARC is not exactly plug and play, however. It requires identifying who uses which services in an organization, which can be difficult in an ever-changing campaign staff scenario where hiring fluctuates. DMARC can be hard, Blank says. Campaigns are turning up email resources all the time, he adds, so setting the email security policy can be challenging for them.
Even DMARC-active domains can have configuration issues: take that of Michael Bloomberg. The DMARC record for mikebloomberg.com is configured with an enforcement policy, but there is a
problem with the underlying SPF record
that could cause problems with security, visibility, and deliverability: It exceeds the limit of 10 DNS lookups specified in the SPF standard, Dylan Tweney, vice president of research and communications for Valimail, explained in a
blog post
today about Valimails findings.
And while the federal government
recently mandated DMARC
for all nonmilitary agencies, campaigns are not required by law or regulation to adopt DMARC. Frankly, it needs to be a minimum standard. Its a known [attack] vector, and you can close it off, Blank notes.
But DMARC handles just one piece of email security. Its designed to thwart phishing that uses spoofed domains, which accounts for half to two-thirds of phishing attacks, Blank says. DMARC does not, however, detect a compromised user email account, nor a malicious insider.
The Mobile, Messaging, and Malware Anti-Abuse Working Group (M3AAWG) advises election officials to not only adopt DMARC but also multifactor authentication for user accounts. MFA should also be deployed across personal social and communications accounts to ensure that a compromise of a personal account could not be used in a social engineering effort to dupe a colleague in hopes of gaining further access to more sensitive and protected systems, M3AAWGs advisory says. Email messages also should be digitally signed and encrypted in transit, the organization says.
In October, Awake Security
found
that most of the Democratic candidates, as well as Trumps campaign, had not yet enabled DNSSEC, the protocol for protecting domains from DNS cache-poisoning and hijacking attacks.
Election Disruption Concerns
Blank worries most about a ransomware attack taking down a voter registration or other system this year at the absolute worst time, hampering voting or transmitting results, he says.
Even the organizers of the famed DEF CON Voting Village have said theyre more concerned about managing the risk to the election infrastructure: ensuring theres an audit trail with paper ballots; employing risk-limiting audits (manually checking paper ballots with electronic machine results); and proper security hygiene in voting equipment, systems, and applications.
Christopher Krebs, director of the US Department of Homeland Securitys Cybersecurity & Infrastructure Agency (CISA)
told Dark Reading
in an interview at DEF CON in August that he worried about the threat of disruptive attacks on the 2020 election that could shake trust in the election system. We need to have resilience in place, he said.
Even a small attack or disruption — or even appearance of one — could shake the confidence of the electorate.
Related Content:
How Can We Make Election Technology Secure?
5 Measures to Harden Election Technology
New Standards Set to Reshape Future of Email Security
Most US Presidential Campaign Websites Offer Little Privacy Protection
7 Ways SMBs Can Secure Their Websites
Check out
The Edge
, Dark Readings new section for features, threat data, and in-depth perspectives. Todays top story:
What Is a Privileged Access Workstation (PAW)?


Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Some Democrats Lead Trump in Campaign Domain-Security Efforts