Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers Target Voter Information Databases to Steal Personal Data

Hackers Target Voter Information Databases to Steal Personal Data

Hackers are always getting their hands into sticky situations, but one of the hot topics in world politics--the 2016 United States presidential election--is one of the nastier ones in recent years. In the past few months alone, hackers have reportedly breached not only the Democratic National Committee, but have also infiltrated at least two state election databases.

The two databases in question housed the voter registration information for the states of Illinois and Arizona. In regards to Illinois, personal data for 200,000 voters was stolen over the course of 10 days. The Arizona attack was unsuccessful, and no voter data was stolen. What’s unclear is whether or not these hacking attacks are connected to the recent influx of hacking attacks against political groups.

As reported by CIO: “According to the FBI’s alert, ‘an unknown actor’ attacked a state election database by using widely available penetration testing tools, including Acunetix, SQLMap, and DirBuster. The hackers then found an SQL injection vulnerability -- a common attack point in websites -- and exploited it to steal the data. The FBI has traced the attacks to eight IP addresses, which appear to be hosted from companies based in Bulgaria, the Netherlands, and Russia.”

This election season is proving to be quite the center of controversy, as there have been claims of election fraud pouring in from all over the United States. There have been reports of supposed “voter fraud,” in which voters had their registrations altered prior to their state primary elections. However, with the hack of the DNC, there are hushed whispers and many outspoken “professionals” on social media that hackers may influence this year’s presidential election. In fact, the United States has recently pointed the finger at Russia as the perpetrator of the DNC hack.

However, Homeland Security Secretary Jeh Johnson issued a statement regarding these fears: Homeland Security was not aware of “specific or credible cybersecurity threats” that could affect the election. Yet, these reassurances do little to mitigate the fact that these systems were infiltrated and accessed.

These events just go to show that even big targets don’t have the systems put into place to protect their infrastructures from cyber threats. If major political entities and systems that could assist with determining the future of an entire country can fall victim to a cyber attack, what does that say about your business’s infrastructure? What we’re saying shouldn’t be news; even the smallest targets hold information that could potentially be very valuable to any hacker.

To learn how you can protect your small business from hackers of all shapes and sizes, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 28 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Computer Google Email Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Small Business Productivity Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Data Backup Smartphone Android AI Upgrade Disaster Recovery Data Recovery VoIP Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Gadgets Cloud Computing Training Covid-19 Server Managed Service Provider Remote Work Compliance IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Data Security Apps Vendor Two-factor Authentication Mobile Office Managed Services Voice over Internet Protocol App Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking How To BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Marketing Access Control Office 365 Conferencing Healthcare Operating System Computers Router Virtual Private Network Risk Management Website Health Help Desk Analytics Office Tips Augmented Reality Retail 2FA Storage Password Bring Your Own Device Managed IT Services Big Data Social Cooperation Remote Workers Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Free Resource Vendor Management Customer Service Project Management Cybercrime Windows 7 Physical Security Microsoft 365 Display Printer Solutions Paperless Office Infrastructure Monitoring Firewall Document Management Windows 11 Telephone The Internet of Things Scam Data loss Excel Robot Telephone System iPhone Cost Management Customer Relationship Management Settings Wireless Printing Vulnerabilities Data Privacy Content Filtering Hacking IT Management Images 101 Presentation VPN YouTube Meetings Cryptocurrency Multi-Factor Authentication Mobility Wireless Technology User Tip Modem Computer Repair Mobile Security Processor Virtual Desktop LiFi Data storage Employees Integration Smart Technology Word Outlook Machine Learning Money Saving Time Humor Holidays Managed IT Service Data Storage Maintenance Safety Antivirus Sports Supply Chain Downloads Mouse Video Conferencing Managed Services Provider Licensing Virtual Machines Professional Services Entertainment Administration Regulations Compliance Application Best Practice Trends Alert Evernote Paperless Managed IT Customer Resource management Memes Buisness File Sharing Regulations Co-managed IT Dark Data Google Calendar IT solutions Star Wars SQL Server Technology Care How To Microsoft Excel IBM Legal Data Analysis Net Neutrality Financial Data Business Growth Gamification History Notifications Staff Business Communications Legislation Smartwatch IT Travel Social Networking Scams Google Maps Azure Hybrid Work Cortana Techology Fileless Malware Procurement Telework Alt Codes Content Cyber security Wearable Technology Tech Human Resources Comparison CES Competition Health IT Communitications Downtime Unified Threat Management Motherboard Cables Hosted Solution Assessment Permissions Unified Threat Management Directions Supply Chain Management FinTech Typing Term Google Apps Network Congestion Specifications IT Assessment IT Maintenance Flexibility User Internet Exlporer Value Business Intelligence Knowledge Fraud Google Drive User Error Microchip Organization Username Shortcuts Ransmoware 5G Black Friday Digital Security Cameras Smart Devices Point of Sale Remote Working Unified Communications Database Memory Vendors Experience IP Address Google Docs Bitcoin Network Management Data Breach Running Cable Tech Support IT Technicians Google Play Be Proactive Workforce Monitors Cyber Monday Videos Google Wallet Proxy Server Electronic Health Records Cookies Recovery Tactics Wasting Time Threats Hotspot Hard Drives Windows 8 Trend Micro Laptop Websites Mirgation Security Cameras Workplace Strategies Meta Domains Drones Software as a Service Nanotechnology Addiction Managing Costs Amazon Electronic Medical Records Language SharePoint Refrigeration Management eCommerce Halloween Chatbots SSID Virtual Assistant Outsource IT Writing Distributed Denial of Service Public Speaking Lenovo Surveillance Screen Reader Service Level Agreement Virtual Machine Environment Virtual Reality Computing Infrastructure Media Lithium-ion battery Reviews Hacks Server Management Entrepreneur Scary Stories Private Cloud Identity Medical IT Transportation Small Businesses Fun Superfish Bookmark Development Identity Theft Smart Tech Deep Learning Download Hypervisor Displays Twitter Alerts Shopping Undo Optimization Error PowerPoint Employer/Employee Relationships Outsourcing Social Engineering Break Fix Browsers Education Connectivity PCI DSS Upload Remote Computing Navigation Gig Economy Mobile Computing Social Network Workplace Multi-Factor Security Teamwork Hiring/Firing Search Dark Web Internet Service Provider Tablet IoT

Blog Archive