Russia Appeared To Target Wisconsin’s Elections Body Via A Banner Or Popup Ad

View of a waste recycling site piled with scrapped home appliances in Guiyang city, southwest China's Guizhou province, 12 September 2017. China is arguably the world's second largest generator of e-waste. It genera... View of a waste recycling site piled with scrapped home appliances in Guiyang city, southwest China's Guizhou province, 12 September 2017. China is arguably the world's second largest generator of e-waste. It generates 2.3 million tons of such waste every year. A United Nations Environment Programme report says computer waste in China will increase by 400 percent from 2007 to 2020. But perhaps more worrying than the mounting e-waste is the absence of effective recycling channels and a comprehensive e-waste management system in China. MORE LESS
Start your day with TPM.
Sign up for the Morning Memo newsletter

It appears Russia didn’t attempt to disrupt the 2016 election through ads only on social media.

Nearly lost amid the deluge of reports about Kremlin-run Facebook and Twitter campaigns designed to influence the American electorate, the Department of Homeland Security last week messily notified 21 states, including Wisconsin, that Russia had targeted their election systems. The Wisconsin Elections Commission (WEC) then quietly issued a press release describing an unsuccessful August 2016 cyberattack that took the form of neither a targeted phishing attack nor an attempt to crack a password, but an ad.

The elections commission said that the state IT division’s protective measures had “blocked an advertisement embedded in a publicly available website from being displayed on a WEC computer.” When the state Department of Enterprise Technology provided the IP address it had blocked to DHS, the agency identified that address as “connected to Russian government cyber actors,” according to the release.

Steve Michels, the DET’s communications director, told TPM that the ad his department’s firewall identified and blocked was consistent with run-of-the-mill website advertising. Such filtering “commonly occurs in conjunction with an internet advertising pop-up or banner,” he said. While Michels said he couldn’t confirm what site the ad originated with, neither Facebook nor Twitter serves pop-up or banner ads.

“This attempt was blocked by our web content filtering tool and no data was exfiltrated,” Michels told TPM. “This blocked content request came on an elections commission network, likely a desktop computer.”

Toni Gidwani, director of research operations for respected cybersecurity firm ThreatConnect, told TPM that such “malvertising”—malicious advertising—” is a pretty common attack vector.” Gidwani, who cautioned that ThreatConnect couldn’t independently verify DHS’s claim of Russian targeting of Wisconsin without the actual IP address, which Michels declined to disclose, said the tactic is often used on general-interest sites where advertisers don’t exercise broad control over their audiences.

“If the website was something really specific to elections and/or something that WEC workers specifically would navigate to more consistently than other targets, that would be notable,” she told TPM. “If the website was something really general, then it might be hard to make the case that the activity was targeting the WEC. ”

The first kind of attack to which Gidwani referred is sometimes called a “watering hole,” a trap set for a particular set of users at a website they seem likely to visit; it’s not clear that the WEC employee who set off the ad was targeted that way. But it does appear that Russian cyberactors were able to participate in the broader digital ad ecosystem, with its self-applied regulations and well-documented vulnerability to malicious activity, in addition to their use of Facebook and Twitter ads.

It’s not clear what the 2016 attack was intended to accomplish, but tools designed for ad fraud—usually used to inflate the records of successfully completed ads, which determine how much an advertiser pays—have been repurposed in the service of Russian propaganda efforts before. In 2015, someone used a network of bots designed for malvertising to redirect users to pro-Russian videos on Dailymotion.

Jonathan Albright, research director at the Two Center for Digital Journalism who was mapping ecosystems of online disinformation as far back as November 2016, told TPM that many of the websites spreading that disinformation contained malicious code.

“There were definitely suspicious resources (i.e., content and code) in the batch of propaganda/disinfo/hoax sites I looked at back in November 2016,” Albright said. “If I remember, I believe 3 of the 116 sites were pre-emptively blocked by my browser as I scraped the ad tech. Lots of redirects to weird IPs, external insecure image/graphics loading, etc.”

Targeting a body like the Wisconsin Elections Commission would not be a particularly difficult or sophisticated operation, Albright said.

“It’s absolutely possible to target a business, and based on what I’ve seen, even more likely that an individual government office or bureau/department would be targeted,” he told TPM. “I think a directed story or topical hoax piece could be written to bring in a specific audience and then used as a vector to compromise individual computers and/or ranges of IP addresses.”

Wisconsin blocks tens of thousands of attempts to game its web applications and more than half a million attempts to crack passwords annually, Michels said. He was emphatic that the ad served to the WEC computer was one small attack in a sea of similar attempts, and that it was thwarted.

Regardless, experts already suspected that Russian government operators had used malvertising elsewhere; now DHS has confirmed they used it in the 2016 elections, too.

Latest Muckraker
37
Show Comments

Notable Replies

  1. Well, Fox News, right wing talk radio, RT are all malware in one form or another, used to combat reality’s built-in liberal bias.

  2. @samt, nice article, minor correction,

    Jonathan Albright, research director at the Tow Center for Digital Journalism…

  3. “Big Nothing Burger! U.S.A, U.S.A.!!!”

  4. Sadly, it is devolving into nothing now that the mustard man is presidenting. Actually not nothing. More like a big mess. 2018 cant come soon enough. That will show how serious people are about making america geat again. Now that in less than 9 months all the gop have done is break it again, and again .

  5. Avatar for fgs fgs says:

    Right here on TPM, I’ve seen at least 3 different 7-time lottery winners trying to tell me I play wrong. I’ve been through 27 sports cars of athletes and musicians, but I still haven’t been sickened by Malia Obama’s hot new ride. The same “free” book about vitamins and herbs (if I just cover shipping and handling) still hasn’t destroyed Obama’s legacy at 0:33, and still hasn’t enlightened me why doctors in the know don’t prescribe metformin.

    I guess I don’t mind clicking an ad to shoot $0.003 TPM’s way, or whatever they get paid. But I think I want to know more about who’s behind the false advertising.

Continue the discussion at forums.talkingpointsmemo.com

31 more replies

Participants

Avatar for system1 Avatar for fgs Avatar for richardinjax Avatar for littlegirlblue Avatar for tomconoley Avatar for mattinpa Avatar for bobatkinson Avatar for thebigragu Avatar for murgatroid Avatar for tomanjeri Avatar for bob Avatar for maxaroo Avatar for darcy Avatar for bboerner Avatar for khaaannn Avatar for upstateny13027 Avatar for tena Avatar for jonney_5 Avatar for tsp Avatar for clare Avatar for drtv Avatar for mhreynolds Avatar for texastoast Avatar for ohcomeonnow

Continue Discussion
Masthead Masthead
Founder & Editor-in-Chief:
Executive Editor:
Managing Editor:
Deputy Editor:
Editor at Large:
General Counsel:
Publisher:
Head of Product:
Director of Technology:
Associate Publisher:
Front End Developer:
Senior Designer: