Security

CSO

UK Electoral Commission slapped for basic cybersecurity fails

It took 13 months to notice 40 million voters' data was compromised


The UK's Electoral Commission has received a formal slap on the wrist for a litany of security failings that led to the theft of personal data belonging to around 40 million voters.

Official documents from the Information Commissioner's Office (ICO) say the people responsible for the 2021 cyberattack on the Electoral Commission's Microsoft Exchange Server are unknown. However, the UK officially pinned these attacks on China earlier this year.

Among the failings that led to the attack, and the 13 months it took the Electoral Commission to detect any malicious activity, was an ineffective patching regime that failed to identify multiple vulnerabilities, including ProxyShell, which facilitated the data breach.

Defenders reading this will probably remember that Microsoft issued patches for ProxyShell in March and April 2021, months before the attack actually began.

The Commission was also found guilty of using default passwords and failing to deploy appropriate password management policies across the organization.

Following a post-incident audit of passwords at the body, 178 were cracked in "rapid" time because they were identical or similar to those issued when the accounts were created, the ICO's formal reprimand [PDF] states.

"This failing is a basic measure that we would expect to see implemented in any organization processing personal data – regardless of potential severity of risk or size of organization," it reads.

An ICO reprimand is a formal expression of the watchdog's disapproval of a given data protection practice. They are increasingly being favored when deciding punishments, especially for public sector organizations. It's the ICO's view that issuing the heavy fines that are often envisaged with the UK GDPR isn't the best course of action with organizations that are already strapped for cash.

The move to favor reprimands was brought in by Information Commissioner John Edwards in 2022 and these contain guidance on where organizations that fall foul of data protection law can improve.

Following the initial compromise of the Electoral Commission's Exchange server on August 24, 2021, the attackers deployed web shells for persistent remote control that were later accessed on a number of other occasions up until August 2, 2022.

Some key details included in the full reprimand are redacted, such as the names of individuals and organizations involved in the cleanup, and the name of a malware payload that was deployed in March 2022.

The key takeaways, however, are that Chinese state-sponsored attackers had access to around 40 million UK voters' names and home addresses for 13 months without being detected, and that's all due to insufficient basic security controls at the Electoral Commission.

Stephen Bonner, deputy commissioner at the ICO, said: "The Electoral Commission handles the personal information of millions of people, all of whom expect their data to be in safe hands.

"If the Electoral Commission had taken basic steps to protect its systems, such as effective security patching and password management, it is highly likely that this data breach would not have happened. By not installing the latest security updates promptly, its systems were left exposed and vulnerable to hackers.

"I know the headline figures of 40 million people affected caused considerable public alarm when news of this breach emerged last year. I want to reassure the public that while an unacceptably high number of people were impacted, we have no reason to believe any personal data was misused and we have found no evidence that any direct harm has been caused by this breach. The Electoral Commission has now taken the necessary steps to improve its security.

"This action should serve as a reminder to all organizations that you must take proactive and preventative measures to ensure your systems are secure. Do you know if your organization has installed the latest security updates? If not, then you jeopardize people's personal information and risk enforcement action, including fines."

Essential improvements

The ICO acknowledged that since the incident unfolded, the Electoral Commission has made remedial steps forward, bolstering its security measures in line with what's expected by UK legislation, and implementing an infrastructure modernization plan.

Asked for a response to the reprimand, the Electoral Commission also highlighted the improvements it made but fell short of actually apologizing for its flagrant shortcomings.

A spokesperson said: "We regret that sufficient protections were not in place to prevent the cyberattack on the Commission. As the ICO has noted and welcomed, since the attack we have made changes to our approach, systems, and processes to strengthen the security and resilience of our systems and will continue to invest in this area.

"Since the cyberattack, security, and data protection experts – including the ICO, National Cyber Security Centre, and third-party specialists – have carefully examined the security measures we have put in place and these measures command their confidence.

"We will continue to ensure our cybersecurity keeps pace with emerging threats, and remain vigilant to the risks facing our electoral processes and institutions. We will continue to work with the UK's governments and the wider electoral community to safeguard the safety of the system." ®

Send us news
25 Comments

Check your IP cameras: There's a new Mirai botnet on the rise

Also, US offering $2.5M for Belarusian hacker, Backpage kingpins jailed, additional MOVEit victims, and more

Brain Cipher claims attack on Olympic venue, promises 300 GB data leak

French police reckon financial system targeted during Summer Games

US sues Georgia Tech over alleged cybersecurity failings as a Pentagon contractor

Rap sheet spells out major no-nos after disgruntled staff blow whistle

RansomHub hits 210 victims in just 6 months

The ransomware gang recruits high-profile affiliates from LockBit and ALPHV

National Public Data tells officials 'only' 1.3M people affected by intrusion

Investigators previously said the number was much, much higher

Ransomware batters critical industries, but takedowns hint at relief

Whether attack slowdown continues downward trend is the million dollar question that security researchers can't answer

110K domains targeted in 'sophisticated' AWS cloud extortion campaign

If you needed yet another reminder of what happens when security basics go awry

The fingerpointing starts as cyber incident at London transport body continues

Network admins take a ride on the Fright Bus

Volt Typhoon suspected of exploiting Versa SD-WAN bug since June

The same Beijing-backed cyber spy crew the feds say burrowed into US critical infrastructure

Plane tracker app FlightAware admits user data exposed for years

Privacy blunder alert omits number of key details

Planned Parenthood confirms cyber-attack as RansomHub threatens to leak data

93GB of info feared pilfered in Montana by heartless crooks

White House seizes 32 domains, issues criminal charges in massive election-meddling crackdown

Russia has seemingly decided who it wants Putin the Oval Office