How the theft of 40M UK voter register information was totally preventable

A cyberattack on the U.Okay. Electoral Fee that resulted within the knowledge breach of voter register information on 40 million individuals was totally preventable had the group used primary safety measures, in accordance with the findings from a damning report by the U.Okay.’s knowledge safety watchdog printed this week.

The report printed by the U.Okay.’s Data Commissioner’s Workplace on Monday blamed the Electoral Fee, which maintains copies of the U.Okay. register of residents eligible to vote in elections, for a sequence of safety failings that led to the mass theft of voter info starting August 2021.

The Electoral Fee didn’t uncover the compromise of its methods till greater than a yr later in October 2022 and took till August 2023 to publicly disclose the year-long knowledge breach.

The Fee stated on the time of public disclosure that the hackers broke into servers containing its e mail and stole, amongst different issues, copies of the U.Okay. electoral registers. These registers retailer info on voters who registered between 2014 and 2022, and embody names, postal addresses, telephone numbers and nonpublic voter info.

The U.Okay. authorities later attributed the intrusion to China, with senior officers warning that the stolen knowledge may very well be used for “large-scale espionage and transnational repression of perceived dissidents and critics within the U.Okay.” China denied involvement within the breach.

The ICO issued its formal rebuke of the Electoral Fee on Monday for violating U.Okay. knowledge safety legal guidelines, including: “If the Electoral Fee had taken primary steps to guard its methods, similar to efficient safety patching and password administration, it’s extremely seemingly that this knowledge breach wouldn’t have occurred.” 

For its half, the Electoral Fee conceded in a quick assertion following the report’s publication that “adequate protections weren’t in place to stop the cyber-attack on the Fee.” 

Till the ICO’s report, it wasn’t clear precisely what led to the compromise of tens of tens of millions of U.Okay. voters’ info — or what might have been performed in a different way.

Now we all know that the ICO particularly blamed the Fee for not patching “recognized software program vulnerabilities” in its e mail server, which was the preliminary level of intrusion for the hackers who made off with reams of voter knowledge. The report additionally confirms a element as reported by TechCrunch in 2023 that the Fee’s e mail was a self-hosted Microsoft Alternate server.

In its report, the ICO confirmed that at the least two teams of malicious hackers broke into the Fee’s self-hosted Alternate server throughout 2021 and 2022 utilizing a series of three vulnerabilities collectively known as ProxyShell, which allowed the hackers to interrupt in, take management, and plant malicious code on the server. 

Microsoft launched patches for ProxyShell a number of months earlier in April and Might 2021, however the Fee had not put in them.

By August 2021, U.S. cybersecurity company CISA started sounding the alarm that malicious hackers have been actively exploiting ProxyShell, at which level any group that had an efficient safety patching course of in place had already rolled out fixes months in the past and have been already protected. The Electoral Fee was not a kind of organizations.

“The Electoral Fee didn’t have an applicable patching regime in place on the time of the incident,” learn the ICO’s report. “This failing is a primary measure.”

Among the many different notable safety points found in the course of the ICO’s investigation, the Electoral Fee allowed passwords that have been “extremely inclined” to have been guessed, and that the Fee confirmed it was “conscious” that components of its infrastructure have been outdated.

ICO deputy commissioner Stephen Bonner stated in an announcement on the ICO’s report and reprimand: “If the Electoral Fee had taken primary steps to guard its methods, similar to efficient safety patching and password administration, it’s extremely seemingly that this knowledge breach wouldn’t have occurred.” 

Why didn’t the ICO high-quality the Electoral Fee?

A wholly preventable cyberattack that uncovered the non-public knowledge of 40 million U.Okay. voters would possibly sound like a severe sufficient breach for the Electoral Fee to be penalized with a high-quality, not only a reprimand. But, the ICO has solely issued a public dressing-down for the sloppy safety. 

Public sector our bodies have confronted penalties for breaking knowledge safety guidelines prior to now. However in June 2022 below the prior conservative authorities, the ICO introduced it could trial a revised method to enforcement on public our bodies. 

The regulator stated the coverage change meant public authorities could be unlikely to see massive fines imposed for breaches for the subsequent two years, even because the ICO steered incidents would nonetheless be completely investigated. However the sector was advised to anticipate elevated use of reprimands and different enforcement powers, moderately than fines. 

In an open letter explaining the transfer on the time, info commissioner John Edwards wrote: “I’m not satisfied massive fines on their very own are as efficient a deterrent inside the public sector. They don’t impression shareholders or particular person administrators in the identical approach as they do within the non-public sector however come immediately from the finances for the supply of providers. The impression of a public sector high-quality can be usually visited upon the victims of the breach, within the type of decreased budgets for important providers, not the perpetrators. In impact, individuals affected by a breach get punished twice.”

At a look, it’d appear like the Electoral Fee had the great fortune to find its breach inside the ICO’s two-year trial of a softer method to sectoral enforcement.

In live performance with the ICO saying it could take a look at fewer sanctions for public sector knowledge breaches, Edwards stated the regulator would undertake a extra proactive workflow of outreach to senior leaders at public authorities to attempt to increase requirements and drive knowledge safety compliance throughout authorities our bodies via a harm-prevention method.

Nevertheless, when Edwards revealed the plan to check combining softer enforcement with proactive outreach, he conceded it could require effort at each ends, writing: “[W]e can not do that on our personal. There should be accountability to ship these enhancements on all sides.”

The Electoral Fee breach would possibly due to this fact increase wider questions over the success of the ICO’s trial, together with whether or not public sector authorities have held up their aspect of a discount that was imagined to justify the softer enforcement. 

Definitely it doesn’t seem that the Electoral Fee was adequately proactive in assessing breach dangers within the early months of the ICO trial — that’s, earlier than it found the intrusion in October 2022. The ICO’s reprimand dubbing the Fee’s failure to patch recognized software program flaw as a “primary measure,” for instance, sounds just like the definition of an avoidable knowledge breach the regulator had stated it wished its public sector coverage shift to purge. 

On this case, nonetheless, the ICO claims it didn’t apply the softer public sector enforcement coverage on this case. 

Responding to questions on why it didn’t impose a penalty on the Electoral Fee, ICO spokeswoman Lucy Milburn advised TechCrunch: “Following a radical investigation, a high-quality was not thought of for this case. Regardless of the variety of individuals impacted, the non-public knowledge concerned was restricted to primarily names and addresses contained within the Electoral Register. Our investigation didn’t discover any proof that private knowledge was misused, or that any direct hurt has been brought on by this breach.”

“The Electoral Fee has now taken the required steps we’d anticipate to enhance its safety within the aftermath, together with implementing a plan to modernise their infrastructure, in addition to password coverage controls and multi-factor authentication for all customers,” the spokesperson added. 

Because the regulator tells it, no high-quality was issued as a result of no knowledge was misused, or moderately, the ICO didn’t discover any proof of misuse. Merely exposing the data of 40 million voters didn’t meet the ICO’s bar. 

One would possibly marvel how a lot of the regulator’s investigation was targeted on determining how voter info may need been misused? 

Returning to the ICO’s public sector enforcement trial in late June, because the experiment approached the two-year mark, the regulator issued an announcement saying it could evaluation the coverage earlier than making a choice on the way forward for its sectoral method within the fall. 

Whether or not the coverage sticks or there’s a shift to fewer reprimands and extra fines for public sector knowledge breaches stays to be seen. Regardless, the Electoral Fee breach case exhibits the ICO is reluctant to sanction the general public sector — until exposing individuals’s knowledge could be linked to demonstrable hurt. 

It’s not clear how a regulatory method that’s lax on deterrence by design will assist drive up knowledge safety requirements throughout authorities.

Leave a Reply

Your email address will not be published. Required fields are marked *