How the theft of 40M UK voter register data was fully preventable


A cyberattack on the U.Okay. Electoral Fee that resulted within the knowledge breach of voter register data on 40 million folks was fully preventable had the group used fundamental safety measures, in response to the findings from a damning report by the U.Okay.’s knowledge safety watchdog printed this week.

The report printed by the U.Okay.’s Info Commissioner’s Workplace on Monday blamed the Electoral Fee, which maintains copies of the U.Okay. register of residents eligible to vote in elections, for a sequence of safety failings that led to the mass theft of voter info starting August 2021.

The Electoral Fee didn’t uncover the compromise of its techniques till greater than a yr later in October 2022 and took till August 2023 to publicly disclose the year-long knowledge breach.

The Fee mentioned on the time of public disclosure that the hackers broke into servers containing its e mail and stole, amongst different issues, copies of the U.Okay. electoral registers. These registers retailer info on voters who registered between 2014 and 2022, and embrace names, postal addresses, cellphone numbers and nonpublic voter info.

The U.Okay. authorities later attributed the intrusion to China, with senior officers warning that the stolen knowledge could possibly be used for “large-scale espionage and transnational repression of perceived dissidents and critics within the U.Okay.” China denied involvement within the breach.

The ICO issued its formal rebuke of the Electoral Fee on Monday for violating U.Okay. knowledge safety legal guidelines, including: “If the Electoral Fee had taken fundamental steps to guard its techniques, corresponding to efficient safety patching and password administration, it’s extremely possible that this knowledge breach wouldn’t have occurred.” 

For its half, the Electoral Fee conceded in a short assertion following the report’s publication that “enough protections weren’t in place to stop the cyber-attack on the Fee.” 

Till the ICO’s report, it wasn’t clear precisely what led to the compromise of tens of thousands and thousands of U.Okay. voters’ info — or what may have been performed in another way.

Now we all know that the ICO particularly blamed the Fee for not patching “identified software program vulnerabilities” in its e mail server, which was the preliminary level of intrusion for the hackers who made off with reams of voter knowledge. The report additionally confirms a element as reported by TechCrunch in 2023 that the Fee’s e mail was a self-hosted Microsoft Alternate server.

In its report, the ICO confirmed that not less than two teams of malicious hackers broke into the Fee’s self-hosted Alternate server throughout 2021 and 2022 utilizing a sequence of three vulnerabilities collectively known as ProxyShell, which allowed the hackers to interrupt in, take management, and plant malicious code on the server. 

Microsoft launched patches for ProxyShell a number of months earlier in April and Might 2021, however the Fee had not put in them.

By August 2021, U.S. cybersecurity company CISA started sounding the alarm that malicious hackers had been actively exploiting ProxyShell, at which level any group that had an efficient safety patching course of in place had already rolled out fixes months in the past and had been already protected. The Electoral Fee was not a type of organizations.

“The Electoral Fee didn’t have an applicable patching regime in place on the time of the incident,” learn the ICO’s report. “This failing is a fundamental measure.”

Among the many different notable safety points found throughout the ICO’s investigation, the Electoral Fee allowed passwords that had been “extremely vulnerable” to have been guessed, and that the Fee confirmed it was “conscious” that elements of its infrastructure had been old-fashioned.

ICO deputy commissioner Stephen Bonner mentioned in a press release on the ICO’s report and reprimand: “If the Electoral Fee had taken fundamental steps to guard its techniques, corresponding to efficient safety patching and password administration, it’s extremely possible that this knowledge breach wouldn’t have occurred.” 

Why didn’t the ICO superb the Electoral Fee?

A completely preventable cyberattack that uncovered the private knowledge of 40 million U.Okay. voters would possibly sound like a critical sufficient breach for the Electoral Fee to be penalized with a superb, not only a reprimand. But, the ICO has solely issued a public dressing-down for the sloppy safety. 

Public sector our bodies have confronted penalties for breaking knowledge safety guidelines previously. However in June 2022 beneath the prior conservative authorities, the ICO introduced it will trial a revised strategy to enforcement on public our bodies. 

The regulator mentioned the coverage change meant public authorities can be unlikely to see giant fines imposed for breaches for the subsequent two years, even because the ICO recommended incidents would nonetheless be totally investigated. However the sector was informed to anticipate elevated use of reprimands and different enforcement powers, fairly than fines. 

In an open letter explaining the transfer on the time, info commissioner John Edwards wrote: “I’m not satisfied giant fines on their very own are as efficient a deterrent inside the public sector. They don’t impression shareholders or particular person administrators in the identical manner as they do within the personal sector however come instantly from the funds for the availability of providers. The impression of a public sector superb can be typically visited upon the victims of the breach, within the type of decreased budgets for important providers, not the perpetrators. In impact, folks affected by a breach get punished twice.”

At a look, it’d appear like the Electoral Fee had the nice fortune to find its breach inside the ICO’s two-year trial of a softer strategy to sectoral enforcement.

In live performance with the ICO saying it will take a look at fewer sanctions for public sector knowledge breaches, Edwards mentioned the regulator would undertake a extra proactive workflow of outreach to senior leaders at public authorities to attempt to elevate requirements and drive knowledge safety compliance throughout authorities our bodies by way of a harm-prevention strategy.

Nevertheless, when Edwards revealed the plan to check combining softer enforcement with proactive outreach, he conceded it will require effort at each ends, writing: “[W]e can not do that on our personal. There have to be accountability to ship these enhancements on all sides.”

The Electoral Fee breach would possibly due to this fact elevate wider questions over the success of the ICO’s trial, together with whether or not public sector authorities have held up their aspect of a discount that was alleged to justify the softer enforcement. 

Definitely it doesn’t seem that the Electoral Fee was adequately proactive in assessing breach dangers within the early months of the ICO trial — that’s, earlier than it found the intrusion in October 2022. The ICO’s reprimand dubbing the Fee’s failure to patch identified software program flaw as a “fundamental measure,” for instance, sounds just like the definition of an avoidable knowledge breach the regulator had mentioned it needed its public sector coverage shift to purge. 

On this case, nonetheless, the ICO claims it didn’t apply the softer public sector enforcement coverage on this case. 

Responding to questions on why it didn’t impose a penalty on the Electoral Fee, ICO spokeswoman Lucy Milburn informed TechCrunch: “Following an intensive investigation, a superb was not thought-about for this case. Regardless of the variety of folks impacted, the private knowledge concerned was restricted to primarily names and addresses contained within the Electoral Register. Our investigation didn’t discover any proof that private knowledge was misused, or that any direct hurt has been brought on by this breach.”

“The Electoral Fee has now taken the mandatory steps we might anticipate to enhance its safety within the aftermath, together with implementing a plan to modernise their infrastructure, in addition to password coverage controls and multi-factor authentication for all customers,” the spokesperson added. 

Because the regulator tells it, no superb was issued as a result of no knowledge was misused, or fairly, the ICO didn’t discover any proof of misuse. Merely exposing the knowledge of 40 million voters didn’t meet the ICO’s bar. 

One would possibly marvel how a lot of the regulator’s investigation was targeted on determining how voter info may need been misused? 

Returning to the ICO’s public sector enforcement trial in late June, because the experiment approached the two-year mark, the regulator issued a press release saying it will assessment the coverage earlier than making a call on the way forward for its sectoral strategy within the fall. 

Whether or not the coverage sticks or there’s a shift to fewer reprimands and extra fines for public sector knowledge breaches stays to be seen. Regardless, the Electoral Fee breach case reveals the ICO is reluctant to sanction the general public sector — except exposing folks’s knowledge might be linked to demonstrable hurt. 

It’s not clear how a regulatory strategy that’s lax on deterrence by design will assist drive up knowledge safety requirements throughout authorities.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles