dark web, Government security, identity theft, Information Security, Law & order, midterm elections, pii, Privacy, Security threats, Top News, voter records

35 million US voter records up for sale on the dark web

With the mid-term US elections only a few weeks away, a known dark web vendor has put up for sale previously undisclosed, current voter registration records for an estimated 35 million US voters hailing from 19 states.

He or she is selling the databases by state. Kansas’s voter database, a top pick in a crowdfunded campaign by members of the dark web forum to purchase the data, has already been sold and published.

The sale was first spotted by Anomali Labs researchers, who’ve been working with cybercrime intelligence provider Intel 471.

Anomali says that next up on the list is Oregon: as of Monday, the crowdfunding campaign to purchase and disseminate the 2018 Oregon voter registration list had met 20.7% of its funding goal. One of the crowdfunding campaigners claims that if they purchase the records they will publish them freely on the hacking forum, with campaign donors receiving early access to the data.

Anomali emphasized that the sale – although it involves valuable personally identifiable information (PII) that could be used for identity fraud, as well as voting records – doesn’t point to voting systems having been hacked.

Many people are surprised to hear that basic voter registration lists are generally considered public. But such information is actually made generally available to the public “for legitimate uses,” Anomali Labs said in its report. “Legitimate” use doesn’t include being sold or disseminated, though:

Generally speaking, voter lists are not permitted to be used for commercial purposes or allowed to be republished online. The discovery of 19 US state voter lists from 2018 on Deep and Dark Web forums and marketplaces illustrate the potential ease of unauthorized entities circumventing established state rules and procedures to obtain and profit from voter data. When these lists are combined with other breached data containing sensitive information, e.g., social security number and driver’s license, on underground forums it provides malicious actors with key data points for creating a target profile of the US electorate.

This is far from the first breach of voter records that we’ve seen. Others include:

This latest exposure includes 23 million records for just three of the 19 states affected. No record counts were provided for the remaining 16 states, but the list does include prices for each state. Based on what’s been advertised, researchers have estimated that the entire number of registered voters affected by the disclosure could exceed 35 million records.

Anomali says that researchers have reviewed a sample of the database records and determined the data to be valid “with a high degree of confidence.”

The records purportedly contain voters’ full names, phone numbers, physical addresses, voting history, and other unspecified voting data. Depending on the state, and perhaps on how many records each database contain and/or how much trouble the vendor had to go through to get a particular database, sales prices range from $150 to $12,500 USD.

The vendor is promising to provide customers with regular database updates at the start of each week.

What leads Anomali/Intel 471 researchers to suspect that the current dark web voter data sales likely aren’t linked to a technical compromise is that the seller requires that for certain states, buyers have to physically show up in-state to buy the updated voter information. The Anomali researchers concluded

… that he or she may have persistent database access and/or contact with government officials from each state.

These types of unauthorized information disclosures increasing the threat of possible disruptive attacks against the U.S. electoral process such as voter identity fraud and voter suppression.


Source : Naked Security

Previous ArticleNext Article
Founder and Editor-in-Chief of 'Professional Hackers India'. Technology Evangelist, Security Analyst, Cyber Security Expert, PHP Developer and Part time hacker.

Send this to a friend