Powered by MOMENTUM MEDIA
cyber daily logo

Breaking news and updates daily. Subscribe to our Newsletter

Breaking news and updates daily. Subscribe to our Newsletter X facebook linkedin Instagram Instagram

UK Electoral Commission hid cyber attack affecting 40m for 10 months

A major cyber attack on the UK’s electoral regulator affecting 40 million voters has brought voter trust in the agency into question after it was revealed that the attack had been hidden for some time following its discovery.

user icon Daniel Croft
Wed, 09 Aug 2023
UK Electoral Commission hid cyber attack affecting 40m for 10 months
expand image

The UK Electoral Commission announced that the attack was undetected for an entire year, starting as far back as August 2021, and that the public was not informed for another 10 months after it was discovered.

Attacks on the democratic process are widely considered to be as damaging as attacks can get, due to their potential to influence decisions that could change a nation and the world.

When the attack was first discovered in October, it was reported to the Information Commissioner’s Office (ICO) and the National Crime Agency within 72 hours, but only now has the public been informed that their data as registered voters could have been compromised.

============
============

The threat actors, according to a release issued by the Electoral Commission, said that the hackers gained access to reference copies of the electoral registers, which it said it was holding for research purposes “and to enable permissibility checks on political donations”.

These copies included those who had chosen to opt out of having their details kept available on the public register.

This data included the “name and address of anyone in the UK who registered to vote between 2014 and 2022, as well as the names of those registered as overseas voters”.

“The registers did not include the details of those registered anonymously,” it said.

While the Electoral Commission can identify which files were accessible, it is unable to conclude which ones were specifically accessed by threat actors.

It has also said that the breach is not considered high risk, despite the personal data affected by the incident, which includes:

  • full name
  • email address
  • home address
  • contact telephone
  • content of the webform and email that may contain personal data
  • and any personal images that were sent to the commission.

In addition, the Electoral Commission has said its email servers were also left vulnerable in the attack.

The commission has not released significant details on this, just saying that it is “also unlikely to present a high risk to individuals unless someone has sent us sensitive or personal information in the body of an email, as an attachment or via a form on our website, such information may include medical conditions, gender, sexuality, or personal financial details”.

“Information related to donations and/or loans to registered political parties and non-party campaigners is held in a system not affected by this incident,” it said.

Concerns have been raised as to why the commission withheld news of the breach for such a long period, to which commission chair John Pullinger said was to protect its systems from further threats.

“If you go public on a vulnerability before you have sealed it off, then you are risking more vulnerabilities,” Pullinger said.

Pullinger called the attack “very sophisticated”, adding that the threat actors had used software in an effort to evade system security.

The commission has said it has worked with security experts to secure its systems and investigate the breach and that individuals do not need to take any immediate action. Anyone registered to vote between 2014 and 2022 has been advised to remain vigilant and contact the commission’s data protection officer if there are any concerns over personal data security.

The implications of a cyber attack that could affect a nation’s democracy are dire. While the commission has said that this attack did not affect voting or democracy, the fact that the hackers were able to access systems from as early as August 2021 shows that they were not a small group looking for money, but a highly sophisticated operation.

The threat group, which is currently unknown, could be looking for weaknesses in the UK’s democratic process for future attacks.

The entire incident has further bolstered the argument of not moving to an e-voting system, and sticking to traditional paper ballots.

Daniel Croft

Daniel Croft

Born in the heart of Western Sydney, Daniel Croft is a passionate journalist with an understanding for and experience writing in the technology space. Having studied at Macquarie University, he joined Momentum Media in 2022, writing across a number of publications including Australian Aviation, Cyber Security Connect and Defence Connect. Outside of writing, Daniel has a keen interest in music, and spends his time playing in bands around Sydney.

cd intro podcast

Introducing Cyber Daily, the new name for Cyber Security Connect

Click here to learn all about it
newsletter
cyber daily subscribe
Be the first to hear the latest developments in the cyber industry.