Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers Target Voter Information Databases to Steal Personal Data

Hackers Target Voter Information Databases to Steal Personal Data

Hackers are always getting their hands into sticky situations, but one of the hot topics in world politics--the 2016 United States presidential election--is one of the nastier ones in recent years. In the past few months alone, hackers have reportedly breached not only the Democratic National Committee, but have also infiltrated at least two state election databases.

The two databases in question housed the voter registration information for the states of Illinois and Arizona. In regards to Illinois, personal data for 200,000 voters was stolen over the course of 10 days. The Arizona attack was unsuccessful, and no voter data was stolen. What’s unclear is whether or not these hacking attacks are connected to the recent influx of hacking attacks against political groups.

As reported by CIO: “According to the FBI’s alert, ‘an unknown actor’ attacked a state election database by using widely available penetration testing tools, including Acunetix, SQLMap, and DirBuster. The hackers then found an SQL injection vulnerability -- a common attack point in websites -- and exploited it to steal the data. The FBI has traced the attacks to eight IP addresses, which appear to be hosted from companies based in Bulgaria, the Netherlands, and Russia.”

This election season is proving to be quite the center of controversy, as there have been claims of election fraud pouring in from all over the United States. There have been reports of supposed “voter fraud,” in which voters had their registrations altered prior to their state primary elections. However, with the hack of the DNC, there are hushed whispers and many outspoken “professionals” on social media that hackers may influence this year’s presidential election. In fact, the United States has recently pointed the finger at Russia as the perpetrator of the DNC hack.

However, Homeland Security Secretary Jeh Johnson issued a statement regarding these fears: Homeland Security was not aware of “specific or credible cybersecurity threats” that could affect the election. Yet, these reassurances do little to mitigate the fact that these systems were infiltrated and accessed.

These events just go to show that even big targets don’t have the systems put into place to protect their infrastructures from cyber threats. If major political entities and systems that could assist with determining the future of an entire country can fall victim to a cyber attack, what does that say about your business’s infrastructure? What we’re saying shouldn’t be news; even the smallest targets hold information that could potentially be very valuable to any hacker.

To learn how you can protect your small business from hackers of all shapes and sizes, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 28 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Backup Small Business Microsoft Productivity Quick Tips Managed Service Saving Money Passwords Communication Cybersecurity Smartphone Data Backup Android Upgrade AI Disaster Recovery Data Recovery VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Information Facebook Holiday Miscellaneous Automation Cloud Computing Covid-19 Training Gadgets Managed Service Provider Remote Work Server Compliance Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Windows 10 Office Business Continuity Government Data Management Bandwidth Windows 10 Blockchain Virtualization Business Technology Wi-Fi Data Security Vendor Apps Two-factor Authentication Mobile Office Chrome Mobile Device Management Budget Gmail Apple BYOD WiFi App Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Networking How To BDR HIPAA Applications Access Control Computing Information Technology Conferencing Hacker Avoiding Downtime Office 365 Marketing Augmented Reality Storage Password Bring Your Own Device Router Virtual Private Network Big Data Health Operating System 2FA Help Desk Risk Management Computers Retail Healthcare Analytics Website Office Tips Managed IT Services Cooperation Free Resource Project Management Windows 7 Patch Management Firewall Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions The Internet of Things Physical Security Display Printer Social Going Green Paperless Office Windows 11 Infrastructure Monitoring Cybercrime Excel Document Management Customer Service Remote Workers Telephone Scam Data loss Money Data Privacy Humor Word Images 101 Telephone System Multi-Factor Authentication Robot Mobility Sports Cost Management Mouse Safety Administration IT Management VPN Employees Meetings Integration User Tip Modem Processor Computer Repair Mobile Security Holidays Settings Wireless Printing Content Filtering Data Storage Smart Technology Supply Chain Customer Relationship Management YouTube Video Conferencing Machine Learning Managed Services Provider Saving Time Virtual Machines Cryptocurrency Professional Services Hacking Presentation Managed IT Service Virtual Desktop Maintenance Antivirus Data storage LiFi Downloads Wireless Technology iPhone Licensing Outlook Entertainment Vulnerabilities Alert Hard Drives Trends Supply Chain Management Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Google Apps Domains Scary Stories Data Analysis Star Wars IT Assessment Hacks How To Microsoft Excel IT Maintenance Notifications Staff Value Business Intelligence Refrigeration Fun Gamification Flexibility Organization Travel Social Networking Deep Learning Legislation Shortcuts Public Speaking Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Lithium-ion battery Wearable Technology Memory Vendors Education Entrepreneur Content Remote Working Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Unified Threat Management Directions Videos Assessment Electronic Health Records Mobile Computing Permissions Workforce Wasting Time Threats Undo Search Trend Micro Best Practice Network Congestion Specifications Security Cameras Workplace Strategies Buisness User Error Microchip Internet Exlporer Software as a Service Fraud Meta Legal Managing Costs Amazon IT solutions Username Point of Sale eCommerce Business Growth Black Friday SSID Application Database Surveillance Virtual Assistant Outsource IT Tech Support IT Technicians Virtual Machine Environment Media Cortana Network Management Proxy Server Reviews Cookies Alt Codes Monitors Cyber Monday Medical IT IBM Downtime Tactics Development Hotspot Transportation Small Businesses Websites Mirgation Hypervisor Displays Hosted Solution Shopping Nanotechnology Optimization Typing PowerPoint SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Google Drive Chatbots Navigation Competition Knowledge Management PCI DSS Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace 5G Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Google Docs Private Cloud Identity Unified Communications Evernote Paperless Experience Server Management Regulations Compliance User Superfish Bookmark Identity Theft Smart Tech Memes Bitcoin Co-managed IT Running Cable Download Net Neutrality Google Wallet Twitter Alerts SQL Server Technology Care Financial Data Error History Business Communications Browsers Smartwatch Connectivity IT Windows 8 Social Engineering Break Fix Scams IP Address Laptop Remote Computing Azure Hybrid Work Upload Procurement Drones Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Recovery CES Tablet IoT Communitications Dark Web Cables Halloween

Blog Archive