The expansion of mobile technology in recent years has come with several amenities. It has also generated popular slogans like “there is an app for that.” These two notions have produced the idea of using mobile applications to complete practical activities such as voting.
Anything that can get hacked, will get hacked. This is why voting security experts have warned that paper ballots are the only secure method to vote.
After a recent MIT investigation, it appears as though this holds true. MIT Researchers discovered that the voting app, ‘VOATZ,’ had vulnerabilities that could permit a hacker to change a person’s vote once they remotely accessed the device. Additionally, if a threat actor hacked the voting server, which investigators found was shockingly easy, they could also discover the user's vote and stop the connection before it is cast. To make matters worse, a hacker exploiting this vulnerability can remain fully undetected and thus easily sway the voting system. Unfortunately, this discovery came after VOATZ was already used in some states’ elections (West Virginia, Denver, Oregon, and Utah).
What stands out about this disclosure is that the initial investigation was not on the app itself, but the connected app used post voting. The MIT research team would have never launched an investigation had inconsistencies not existed in the app that tracked results of the Democrat caucuses in Iowa. If the Target breach taught us anything, it is that organizations must consider the security practices of accompanying vendors. This very concern was proved when investigators found the 3rd party app did not use the security protocol to verify legitimate votes on the backend of the application. Furthermore, an ISP or anyone sniffing an unencrypted network could determine the way someone voted. In a topic of such sensitivity and with modern security controls, how was this possible? There are a few gaps to highlight that allowed this vulnerability to successfully execute:
Conclusively, even though advocates of the VOATZ app were aware of the risks associated with mobile voting, they believed there were more benefits to using the technology. This mindset has led several organizations to rapidly push out applications before considering the ramifications. Consequences like losing individual trust starts when a system one uses becomes exposed as not secure. Discovery of the voting app vulnerability is about more than just weak programming practices, instead, it brings to light the importance of following standards like NIST and SDLC when developing critical apps. Additionally, when an app follows a thorough development framework, minor issues can be caught early on.
Fortunately, increasing and maintaining user trust is possible by applying high technical and operational security standards before deploying a system or app. Silent Sector operates using only top tier standards. Our goal is to help organizations establish a clear understanding of their security posture and provide the resources to enhance their system security. Our Web Application Penetration tests can provide your organization with a detailed look into the risks associated with exposed applications and connected entities.