Hacked Iraqi Voter Information Found For Sale Online

Hacked Iraqi Voter Information Found For Sale Online

February 20, 2024 at 11:49AM

Researchers uncovered voter data sale following a breach against Iraq’s Independent High Electoral Commission. The 21.58 GB database contains Iraqi voter info and a custom software client. Election cyber threats surged to 26% in 2022, jeopardizing democratic processes worldwide. Resecurity confirmed the leak and highlighted election threats from various actors globally. Vigilance and securing IT supply chain are vital.

Summary of Meeting Notes:

1. Resecurity uncovered the sale of voter data stolen in a hack against Iraq’s Independent High Electoral Commission (IHEC), indicating an increased pattern of malicious activity targeting elections in the Middle East and beyond.

2. A 21.58 GB database containing Iraqi voter cards and personally identifiable information was discovered, along with a customized software client designed for IHEC’s “Operations & Data Management Department.”

3. Election cyber threats have surged, jeopardizing the integrity of democratic processes worldwide. Threats include leaks of voter data, influence campaigns, and attacks on election systems.

4. Resecurity confirmed the leak occurred around 2019 and that the latest data acquired is valid and contains accurate information, validated with law enforcement partners in Iraq.

5. It is believed the breach may have resulted from an IT supply chain compromise or an insider with access to IHEC infrastructure.

6. Potential suspects in the attack include nation-state actors interested in destabilizing Iraq or domestic actors involved in protest activity, with evidence pointing to Iran and dissident Kurd nationalists as the most likely suspects.

7. Leaked voter data has been exploited in various countries, including the US, Iraq, Indonesia, Israel, Turkey, and African nations, for cyber threats ranging from attacks on election infrastructure to influence campaigns.

8. Resecurity advises organizations and individuals to monitor their Dark Web data footprint and secure the IT supply chain of elections.

Please let me know if you need further details or if there are specific actions I should take based on these meeting notes.

Full Article