Hackers at Def Con's voting machine village made quick work of showing just how vulnerable 'secure' voting machines really are Credit: Thinkstock At Def Con’s hacker voting machine village, where 30 pieces of election equipment sat waiting, hackers were given a deliciously wicked goal. John Hopkins computer scientist Matt Blaze said, “We encourage you to do stuff that if you did on election day they would probably arrest you.”And they did. Most of the voting machines were purchased via eBay, but some did come from government auctions. Despite the various different manufacturers of the voting equipment boxes, there was a common theme—they are “horribly insecure.”Granted, come election day, officials would likely notice if hackers were physically taking apart the machines. Tinkering with an external USB port on a computerized voting box and using it to upload malicious software may or may not get noticed. Yet those are not the only ways hackers could potentially influence votes and an election’s outcome; there’s the sneaky way of remotely accessing the machine from a laptop.Hacking WinVote machinesAs journalist Robert McMillan pointed out, it took less than two minutes for one participant to get remote access to a voting machine. He tweeted: “Greetings from the Defcon voting village where it took 1:40 for Carsten Schurmann to get remote access to this WinVote machine.” WINVote boxes have horrific security, according to Victor Gevers. The WINvote machines run Windows XP, have autorun enabled and include a hard-coded WEP Wi-Fi password.Can you imagine trying to vote and instead being rickrolled? Yes, hackers were able to load the infamous Rick Astley video onto a WINVote box. Thankfully, WINVote machines are no longer being used. That doesn’t mean all vulnerable voting boxes have been put out to pasture, though.Hackers “also penetrated the hardware and firmware of a kind of touch-screen voting machine used in hundreds of jurisdictions across the country, and could attack a simulated county voter registration network, like the networks in 21 states that were compromised by attackers last year,” McMillan reported in a Wall Street Journal article.Preventing voting machine hacks“All of these touch-screen machines are unauditable,” said election technology security specialist Harri Hursti. “You should have paper ballots, and there should be an audit process.”Barbara Simons, president of Verified Voting, hopes the hacking village helps provide the “momentum for repairing our broken voting systems. There is a solution, and it’s not rocket science.”“One of the things we want to drive home is that these things are ultimately software-based systems, and we know software-based systems have vulnerabilities. That just comes with the territory,” Blaze told Forbes. “We want to make the problems public, so they can be fixed, so the public will know what the problems are and will be able to demand their systems be improved.”Jake Braun, one of the organizers of the event, told Reuters, “There’s been a lot of claims that our election system is unhackable. That’s BS. Only a fool or liar would try to claim that their database or machine was unhackable.” “The scary thing,” Braun told The Register, “is we also know that our foreign adversaries—including Russia, North Korea, Iran—possess the capabilities to hack them, too, in the process undermining principles of democracy and threatening our national security.”Blaze pointed out, “The stakeholders for voting machines are everyone in the country. So it’s important the problems get fixed.” Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe