Skip to main content
banner image
venafi logo

Venafi Research: Is German Election Infrastructure Safe From Cyber Attackers?

Venafi Research: Is German Election Infrastructure Safe From Cyber Attackers?

German election cyber attackers hack
November 7, 2018 | Emil Hanscom

Last year, a group of German security researchers, the Chaos Computer Club (CCC), published an alarming audit on their nation’s election infrastructure.

According to a report from Wired:

“The hackers found they could corrupt the updates from the server controlling that software to re-tabulate votes at will, with potentially disastrous consequences for the country's October parliamentary election. The CCC says that VOTE-IT, the company behind the software, privately fixed the security flaws the group exposed while publicly refusing to acknowledge the vulnerabilities.”

“German security professionals uniquely understand the risks to free and accurate elections,” says Kevin Bocek, chief cyber security strategist for Venafi. “Last year, it was shown that German election infrastructure software could be easily hacked – leading to the possibility of tampered tabulation and transmission of results. Adversaries want to raise doubts about our democracies, thus they are concentrating on voting tabulations to raise doubts about our elections.”

So, are German IT professionals still apprehensive about the security of their election infrastructure? Venafi recently polled 305 German security stakeholders to find out.

According to Venafi’s study, 86% of security professionals are concerned about cyber attacks targeting election data or infrastructure. Plus, 84% believe cyber criminals are likely to target election data as it is transmitted from local polling stations to central aggregation points.

Additional findings from the study include:

  • Ninety-four percent believe election systems, including voting machines, software and back-end systems, should be considered critical infrastructure.
  • When asked which parts of their election infrastructure are most vulnerable to cyber attackers:
  • Sixty-one percent say voting machines that collect election data.
  • Sixty percent say back-end systems that aggregate election data.
  • Forty-one percent say communications between back-end election systems.

Fifty-seven percent believe the potential damage from cyber attacks targeting election systems is more serious than the potential damage from election tampering efforts that target social media.

“It’s no surprise to see nearly all German security professionals agree that voting infrastructure is under attack,” concludes Bocek. “Ultimately, the back-end systems that transmit, aggregate, tabulate, validate and store election data are as vulnerable to cyber attacks as voting machines.”

Do you think your election infrastructure is secure?

Related Posts:

Like this blog? We think you will love this.
Featured Blog

The (Nation) State of Cyber: 64% of Businesses Suspect They’ve Been Targeted or Impacted by Nation-State Attacks

82% believe geopolitics and cybersecurity are intrinsically linked

Read More
Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

Subscribe Now

See Popular Tags

You might also like

TLS Machine Identity Management for Dummies

TLS Machine Identity Management for Dummies

Certificate-Related Outages Continue to Plague Organizations
White Paper

CIO Study: Certificate-Related Outages Continue to Plague Organizations

About the author

Emil Hanscom
Emil Hanscom

Emil is the Public Relations Manager at Venafi. Passionate about educating the global marketplace about infosec and machine-identity issues, they have consistently grown Venafi's global news coverage year over year.

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more