Advertisement

DNC says phishing incident was a false alarm

The Democratic National Party now says a phishing campaign against its voter database revealed Wednesday was in fact an unauthorized test by a third party and not the work of a malicious attacker.
Bob Lord
Bob Lord pictured at TechCrunch's Disrupt 17 conference. (Flickr / CC-BY-2.0 <a href="https://flic.kr/p/UCJJ3n">TechCrunch</a>)

The Democratic National Party now says a phishing campaign against its voter database revealed Wednesday was in fact an unauthorized test by a third party and not the work of a malicious attacker.

“We, along with the partners who reported the site, now believe it was built by a third party as part of a simulated phishing test on VoteBuilder,” DNC Chief Security Officer Bob Lord said in a statement. “The test, which mimicked several attributes of actual attacks on the Democratic party’s voter file, was not authorized by the DNC, VoteBuilder nor any of our vendors.”

Lord did not identify the unauthorized third party that had carried out the phishing test. But in a statement Thursday, Michigan Democratic Party Chairman Brandon Dillon said his organization had approved the simulation.

“In an abundance of caution, our digital partners ran tests that followed extensive training,” Dillon said. “Despite our misstep and the alarms that were set off, it’s most important that all of the security systems in place worked. Cybersecurity experts agree this kind of testing is critical to protecting an organization’s infrastructure, and we will continue to work with our partners, including the DNC, to protect our systems and our democracy.”

Advertisement

PCMag was first to report on the Michigan Democratic Party’s involvement in the test.

Spearphishing was devastatingly effective during the 2016 presidential campaign, as Russian hackers breached the DNC and other organizations to leak thousands of emails aimed at undermining the candidacy of Hillary Clinton. Those memories were revived Wednesday when the DNC said it had contacted the FBI after phishing activity surfaced. Cybersecurity company Lookout had discovered a phishing site replicating the login to NGP VAN, a tech provider for Democratic organizations, and notified the DNC.

A subsequent investigation revealed the phishing to be a false alarm.

“There are constant attempts to hack the DNC and our Democratic infrastructure, and while we are extremely relieved that this wasn’t an attempted intrusion by a foreign adversary, this incident is further proof that we need to continue to be vigilant in light of potential attacks,” Lord said. The DNC ensured that data important to candidates and state parties was not compromised because of the test, he said.

Lord, a former cybersecurity executive at Yahoo whom the DNC hired in January, also thanked private-sector security experts for examining the phishing incident.

Advertisement

Patrick Howell O’Neill contributed to this story. 

Sean Lyngaas

Written by Sean Lyngaas

Sean Lyngaas is CyberScoop’s Senior Reporter covering the Department of Homeland Security and Congress. He was previously a freelance journalist in West Africa, where he covered everything from a presidential election in Ghana to military mutinies in Ivory Coast for The New York Times. Lyngaas’ reporting also has appeared in The Washington Post, The Economist and the BBC, among other outlets. His investigation of cybersecurity issues in the nuclear sector, backed by a grant from the Pulitzer Center on Crisis Reporting, won plaudits from industrial security experts. He was previously a reporter with Federal Computer Week and, before that, with Smart Grid Today. Sean earned a B.A. in public policy from Duke University and an M.A. in International Relations from The Fletcher School of Law and Diplomacy at Tufts University.

Latest Podcasts