Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers Target Voter Information Databases to Steal Personal Data

Hackers Target Voter Information Databases to Steal Personal Data

Hackers are always getting their hands into sticky situations, but one of the hot topics in world politics--the 2016 United States presidential election--is one of the nastier ones in recent years. In the past few months alone, hackers have reportedly breached not only the Democratic National Committee, but have also infiltrated at least two state election databases.

The two databases in question housed the voter registration information for the states of Illinois and Arizona. In regards to Illinois, personal data for 200,000 voters was stolen over the course of 10 days. The Arizona attack was unsuccessful, and no voter data was stolen. What’s unclear is whether or not these hacking attacks are connected to the recent influx of hacking attacks against political groups.

As reported by CIO: “According to the FBI’s alert, ‘an unknown actor’ attacked a state election database by using widely available penetration testing tools, including Acunetix, SQLMap, and DirBuster. The hackers then found an SQL injection vulnerability -- a common attack point in websites -- and exploited it to steal the data. The FBI has traced the attacks to eight IP addresses, which appear to be hosted from companies based in Bulgaria, the Netherlands, and Russia.”

This election season is proving to be quite the center of controversy, as there have been claims of election fraud pouring in from all over the United States. There have been reports of supposed “voter fraud,” in which voters had their registrations altered prior to their state primary elections. However, with the hack of the DNC, there are hushed whispers and many outspoken “professionals” on social media that hackers may influence this year’s presidential election. In fact, the United States has recently pointed the finger at Russia as the perpetrator of the DNC hack.

However, Homeland Security Secretary Jeh Johnson issued a statement regarding these fears: Homeland Security was not aware of “specific or credible cybersecurity threats” that could affect the election. Yet, these reassurances do little to mitigate the fact that these systems were infiltrated and accessed.

These events just go to show that even big targets don’t have the systems put into place to protect their infrastructures from cyber threats. If major political entities and systems that could assist with determining the future of an entire country can fall victim to a cyber attack, what does that say about your business’s infrastructure? What we’re saying shouldn’t be news; even the smallest targets hold information that could potentially be very valuable to any hacker.

To learn how you can protect your small business from hackers of all shapes and sizes, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 05 February 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Workplace Strategy Users Small Business Ransomware Mobile Device Microsoft Backup Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Data Recovery Android AI VoIP Upgrade Disaster Recovery Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Holiday Facebook Miscellaneous Artificial Intelligence Automation Information Cloud Computing Training Gadgets Covid-19 Server Managed Service Provider Compliance Remote Work Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Government Data Management Business Continuity Wi-Fi Windows 10 Blockchain Virtualization Business Technology Bandwidth Data Security Mobile Office Two-factor Authentication Vendor Apps Networking App Managed Services Mobile Device Management Voice over Internet Protocol BYOD Gmail WiFi Chrome Budget Tip of the week Employer-Employee Relationship Apple Hacker Avoiding Downtime How To BDR Conferencing Marketing Computing Information Technology Office 365 Access Control HIPAA Applications Computers Help Desk Managed IT Services Website Operating System Healthcare Risk Management Virtual Private Network Analytics Office Tips Big Data Health Augmented Reality 2FA Router Storage Password Bring Your Own Device Retail Scam Monitoring Data loss Going Green Patch Management Cybercrime Save Money Telephone Remote Monitoring Vulnerability Remote Workers End of Support Firewall Vendor Management Cooperation Physical Security Display The Internet of Things Printer Free Resource Project Management Paperless Office Windows 11 Windows 7 Infrastructure Social Microsoft 365 Excel Document Management Solutions Customer Service Presentation Smart Technology Holidays Wireless Technology Saving Time Data Storage Data Privacy Settings Video Conferencing Wireless Managed Services Provider Printing Managed IT Service Content Filtering Virtual Machines Robot Professional Services Word Downloads YouTube Licensing Cryptocurrency Entertainment IT Management VPN Meetings iPhone Safety Virtual Desktop LiFi Vulnerabilities Data storage Telephone System Computer Repair Cost Management Images 101 Outlook Multi-Factor Authentication Mobility Money Supply Chain Humor Machine Learning User Tip Customer Relationship Management Modem Sports Employees Processor Mouse Mobile Security Integration Maintenance Hacking Antivirus Administration Mirgation Best Practice Surveillance Scams Social Engineering Virtual Assistant Virtual Machine Nanotechnology User Buisness Hybrid Work Remote Computing IT solutions Reviews Human Resources Medical IT Addiction Legal Language Chatbots Business Growth Tablet Development Cables Transportation Management Hypervisor IP Address Screen Reader Distributed Denial of Service Alert Shopping File Sharing Cortana Optimization Google Apps Dark Data PowerPoint Service Level Agreement Computing Infrastructure Managed IT Identity Alt Codes IT Maintenance How To Employer/Employee Relationships Bookmark Navigation Smart Tech Recovery Downtime PCI DSS Business Intelligence Notifications Hosted Solution Gig Economy Travel Shortcuts Download Hard Drives Alerts Domains Techology Typing Google Maps Internet Service Provider Ransmoware Teamwork Browsers Evernote Connectivity Break Fix Regulations Compliance Vendors Unified Threat Management Knowledge Memes Be Proactive Upload Refrigeration Google Drive Public Speaking Unified Threat Management Multi-Factor Security Net Neutrality Workforce SQL Server Social Network 5G History Lithium-ion battery IoT Dark Web Financial Data Threats Entrepreneur Unified Communications Smartwatch Experience IT Workplace Strategies Network Congestion Trends Google Docs Customer Resource management Regulations User Error Bitcoin Google Calendar Running Cable Procurement Meta Azure Cyber security Data Analysis Tech Star Wars Google Wallet Microsoft Excel Telework Amazon Staff CES Point of Sale Communitications Gamification Undo Social Networking Windows 8 Legislation Laptop Supply Chain Management Outsource IT Environment Tech Support Media Fileless Malware Term Drones Network Management FinTech Wearable Technology IT Assessment Monitors Content Health IT Motherboard Comparison Halloween Flexibility Small Businesses Value Organization Displays Websites Directions Assessment Application Permissions Digital Security Cameras Smart Devices Memory IBM SharePoint Hacks Specifications Scary Stories Remote Working Outsourcing Electronic Medical Records Fun Data Breach Microchip Google Play Internet Exlporer Fraud Lenovo Deep Learning Videos Electronic Health Records Workplace Writing Username Wasting Time Black Friday Hiring/Firing Virtual Reality Private Cloud Trend Micro Paperless Security Cameras Database Server Management Education IT Technicians Superfish Identity Theft Software as a Service Co-managed IT Competition Managing Costs Proxy Server Cookies Mobile Computing Cyber Monday Technology Care Twitter Error Search eCommerce Business Communications SSID Tactics Hotspot

Blog Archive