기본 콘텐츠로 건너뛰기

The ABCs of Hacking a Voting Machine


A hacker who successfully infiltrated a voting machine at last year's DEF CON will demonstrate at Black Hat USA how he did it, as well as what he later found stored on other decommissioned WinVote machines.
It took computer scientist Carsten Schuermann just minutes last year to hackinto one of the 30 pieces of voting equipment sitting in a cramped room in Caesar's Palace that housed DEF CON's maiden Voting Machine Village. He fired up his laptop, quickly spotted a WinVote voting machine on the Wi-Fi network using Wireshark, and then typed in a command that launched a Metasploit exploit.
"And, poof, that was it," Schuermann says. He was able to access the Windows XP-based voting machine using the Remote Desktop Protocol (RDP), exposing real election and voting data that was still stored in it. The voting machine's inherent weaknesses made it an easy mark: It ran XP (Service Pack 0), Wi-Fi and RDP were enabled by default, it employed the outdated WEP security protocol, and the majority of WinVote machines he had studied all used the same password: "abcde."  
"The only changes I did was turn off the machines remotely, and we added new files to the directories," he says. His exploit used an old buffer overrun flaw in XP, which apparently had not been patched on the voting machine.
Schuermann had been studying security weaknesses in the WinVote machine back at his home office at the IT University of Copenhagen in Denmark. He now has eight decommissioned WinVote machines that were used in previous elections – four from Virginia – that he's been dissecting and looking for clues of compromise and hacking attempts. He'll be back in Vegas in August at Black Hat USA, demonstrating just how he hacked the machine at DEF CON, as well as sharing some research findings from the WinVote machines he's been studying. 
"I'm going to bring a machine and show how easy it is to hack ... exploiting the same vulnerability" used in last year's DEF CON contest, he says. Schuermann, an academic expert in election security who has been studying election security for a decade, used a root shell script to control the machine, and says he can change data on the voting machines. The notoriously insecure WinVote machines – which don't include a paper-trail feature – were replaced in Virginia prior to the 2016 election, but some localities, including some in Pennsylvania, still use them.
"Since these machines all have the same access point they connect to, once you know how to get into that wireless network ... and use the 'abcde' password, then you have networking access to the machine and can deploy the exploit. Then you're in," he says. "The scary thing is you could make this automatic: You could drive by polling stations and make changes on all of the totals in the voting machines."
Schuermann has been conducting forensic investigations on the disks in the WinVote machines using the so-called Autopsy tool. "I was trying to understand if everything was OK with the machine or was it hacked," he says.
But because the machine's XP platform doesn't provide system logging, there's no way to track whether someone connected remotely to the machine. "There's no trail of who accessed it," Schuermann says. So the only way to spot a potential hack is the data on the disks.
So far, Schuermann has found traces of MP3 files on the disks of one of the WinVote machines, including a Chinese music file, he says. It appears the machine was used to record songs from CDs and play MP3s.
"But there's no evidence real hacking happened" on the machines so far, he says, and no signs of election-meddling in vote counts. 
Even so, Schuermann says hacking one of the machines would have been fairly simple. "If anyone really knows what they are doing, they could hack those machines in a minute. And once you've hacked one, you know [how] to hack [others]," he says.
The biggest risk overall, he says, is citizens losing trust in an election and the voting systems if hackers are able to break into them and alter or change results. "Now, with the Russia investigation and election interference, people are becoming more aware that this is not only possible but also likely someday. That's the scary part," he says. 
His message for the US midterm elections: "How important [a] paper [trail] is," he says.
Home Page Photo Credit: Monica M. Davey / Epa/Shutterstock  
Related Content:

Kelly Jackson Higgins / 7/25/2018 / 07:00 PM

댓글

이 블로그의 인기 게시물

지문 넘어 정맥·홍채로...4000억원 '생체인증' 선점경쟁

4000억원 규모 국내 생체인증 시장을 선점하기 위해 관련 업체 경쟁이 치열하다. 생체인증시스템이 현금자동입출금기( ATM )부터 공항 신분확인, 기업 출입관리까지 다양한 분야로 확대된다. 지문인증을 넘어 손바닥, 손가락 정맥(장정맥, 지정맥)과 안면, 홍채 등 다양한 신체 부위를 활용한 인증 솔루션이 각광 받는다. 25일 업계에 따르면  Sh 수협은행은 장정맥 기반 금융서비스를  ATM 에 먼저 적용한다. 자체 기기에 도입하는 데 그치지 않고, 장정맥 인증 확산을 위해 타행· GS 리테일과 제휴도 추진한다.  GS 25 편의점 내  ATM 에서 장정맥 인증으로 입·출금, 계좌이체 등이 가능해진다. 신협중앙회는 손가락 정맥패턴을 이용한 '지정맥' 인증 시스템을 고객 간편결제 서비스에 도입하는 방안을 검토한다. 지난해 시스템 통제와 임직원 확인용 지정맥 인증을 사내 도입했다. 생체인증은 금융권 중심으로  ATM 과 개인금고, 공항, 기업 출입 등 다양한 곳에 활용된다. 한국후지쯔는 신한은행 시작으로 국민은행, 우리은행,  NH 증권, 롯데카드, 케이뱅크 등에 장정맥 인증 서비스 '팜시큐어'를 공급했다. 제주·김포공항에 장정맥을 이용한 실명확인 시스템을 구축했다. 동서석유화학,  SK 텔링크 등 일반 기업도 도입했다. LG 히다찌는 지정맥 인증 서비스를 신협중앙회 사내통제시스템뿐 아니라  BNK 부산은행 스마트  ATM 에도 공급했다. 부산은행은  ATM 뿐 아니라 은행창구 등에도 지정맥을 활용한다.  LG 히다찌는 신한카드, 나이스정보통신 등과 업무협약을 맺고 오프라인 간편결제로 지정맥 활용 준비 작업에 나섰다. 계명대 동산의료원과도 업무협약을 맺고 병원 인증시스템 도입도 검토한다. 국내 스타트업 위닝아이는 카메라를 이용한 손바닥 인증 기술을 전북은행 '뉴스마트뱅킹', 한화손해보험 '스마트인슈', 신영증권 등에 공급했다. 현대모비스와 손잡고 차량용 인증 기술 개...

BLACK LABEL, An IoT Security and Platform Company, Signed An MOU of Developing Security Solution for WDF Cryptocurrency

On June 21, 2018, Black Label Gangnam signed an MOU for the development of an integrated security solution for electronic wallets, servers and shopping malls to be issued by (re) the WDF cryptocurrency by the World Distribution Federation.  (re) The World Trade Federation, under the umbrella of the United Nations, is building a global distribution platform with more than 80 member countries around the world. On this platform, we are developing cryptography for the payment of funds for distribution and for the payment of shopping malls, and have developed this security solution in conjunction with the black label and signed a working agreement for integration. We are going to issue an IC card with the black label's patented pattern-free personal identification code (RSA +, BLACK LABEL's Patent Technology) and apply it to individuals ' electronic wallets, company servers, and shopping mall payment security.  The biggest problem with cryptography is the physical security of...

BLACK LABEL IoT SECURITY SOLUTION, MUTUAL VERIFICATION SYSTEM

Black Label's security solution is a mutual verification system, which is a personal identification security solution through mutual verification between SIM and identity authentication server. Among existing wireless communication networks, a mobile communication network using a USIM, which is a personal identification device, is considered to be most secure against hacking. This is because the USIM card has a personal identification code, including the user's mobile communication number, so it sends and receives a telephone call or message after authentication. BLACK LABEL has developed a security solution called "Mutual Verification System" by utilizing the characteristics of SIM and enhancing the disadvantages of the personal identification process to enhance the personal identification security. The mutual verification system is a system that sends and receives personally identifiable information to the authentication server by infinitely changing the i...