This morning, a company called SecurityScorecard published a report on states' cyber postures.

It painted a grim picture, but several states told me it was wildly inaccurate. And while the company said it alerted states in advance, they say it didn't.

subscriber.politicopro.com/newsletter/202…
This situation highlights how security firms seize on cyber crises like election fears to raise their profile — sometimes in less-than-honest ways.

@POLITICOPro subscribers can get the full story in today's @MorningCybersec (link in prev tweet), but here are a few key tidbits...
SecurityScorecard's report gave 75% of states/territories a "C" or below, incl. 6 battleground states, 2 of which (IA+OH) got a "D."

The company scanned public-facing IT systems throughout state gov, not just elections, and scored factors from patching speed to network security.
States vehemently disputed the company's methodology and findings.

Iowa told me that the report described vulnerabilities that were fixed more than 15 years ago.

North Dakota said it looked mostly at IP addresses on guest Wi-Fi networks and other largely segmented systems.
"Honestly, I’ve seen my third grader do a deeper, more thoughtful analysis than these guys,” Jon Keeling, a spokesman for Ohio's secretary of state, told me. “It’s a joke.”

ND CISO Kevin Ford said SecurityScorecard "didn’t validate their findings."
State officials unanimously blasted SecurityScorecard for hyping supposed vulnerabilities weeks before the election.

Kevin Hall, a spokesman for Iowa's secretary of state, said they were “looking to generate publicity and revenue without doing their homework and fact-finding.”
Then there's the issue of notification.

The company's outside PR rep said it notified state IT offices.

Multiple IT offices said they'd never heard of this report before.

The company's GC said it shared w/ MS-ISAC.

MS-ISAC spox said it only got summary, not detailed findings.
SecurityScorecard says it just wanted states to use the free services it's offering through @DefendCampaigns and it hoped to raise awareness of IT underfunding so Congress will help states.

But state officials have good reason to suspect otherwise. propublica.org/article/report…
.@CISAgov isn't happy with the report, either.

A spokesperson told me that SecurityScorecard's strategy of promoting its report without fully consulting states is "unfortunate."

"While this might make for good headlines, it doesn’t make for good security."
There's an inherent tension in the cybersecurity vendor community. They make money from fixing problems and offering protections, so they have to highlight problems to demonstrate their worth.

But as this incident shows, how they handle that pitch makes a big difference.
Addendum:

I forgot to mention that I went back and forth with SecurityScorecard several times trying to get answers to basic Qs. They offered a general defense of their methodology but did not address specific criticisms or notification issue.

I gave them ample opportunities.
So after my writeup and tweets yesterday, SecurityScorecard asked for a conversation and I chatted with them.

They recognize that they made some mistakes but think it's more important to focus on the future, and on helping states improve.

subscriber.politicopro.com/newsletter/202…
“Our intent was not to feed into the narrative that states are not able to conduct a fair and safe election,” Sachin Bansal, their GC, told me, noting that the report went beyond elections. “We intended to start a dialogue. ... We certainly did not intend to create any chaos.”
While the report's rollout "ruffled some feathers," said Monika Hathaway, who works for the company's PR firm, "I think we got to our end goal, which is engaging states."
As of our conversation yesterday, 9 states had signed up for SecurityScorecard's services, including Iowa, which told me on Wednesday that it hadn't heard back from the company after requesting a copy of the report.

SecurityScorecard said it has also talked to orgs like NASED.
The company reps were reluctant to dwell on states' frustrations when I asked about the miscommunication and the false claims of notifications.

They said they went to the MS-ISAC with this report because previous efforts to reach individual states didn't work out.
As far as timing, SecurityScorecard said states could still fix some problems pre-election — including one you probably heard about recently.

“There are active Trickbot infections in Florida and Georgia," their GC said, "and these can be cleaned up in the next couple of weeks."
SecurityScorecard's main goal seemed to be convincing the public that they're not some fly-by-night firm hoping to make a buck off of security fears.

"This is not a hit job," said Mike Wilkes, their CISO. "This is the beginning of a serious effort to work on improving security."
Another addendum (we're having fun here!): SecurityScorecard told me yesterday that Iowa had joined their platform, but the company admitted to me today that that wasn't true. They shared their full findings with Iowa this afternoon after I went back and forth with both parties.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Eric Geller

Eric Geller Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @ericgeller

10 Oct
Missed this last night, but apparently U.S. Cyber Command was behind the recent temporary disruption in the massive Trickbot botnet, which officials worry could be used to lock up election offices with ransomware. washingtonpost.com/national-secur… Image
Microsoft has won a court order giving it control of domain names associated with the Trickbot ransomware. The company has disabled the servers that let the malware's operators infect new computers. blogs.microsoft.com/on-the-issues/…
Ransomware affecting election systems is one of U.S. officials' biggest concerns right now.

Microsoft execs told NYT that "they had carefully timed their operations to put Russian cybercriminals on their heels weeks before the election."

nytimes.com/2020/10/12/us/…
Read 5 tweets
9 Sep
This extraordinary allegation fits with a pattern of Trump officials like AG Barr distorting the IC's findings about evergreen Chinese and Iranian propaganda to distract from Russia's aggressive election interference efforts.
The acting (and, per GAO, illegally appointed) deputy DHS secretary allegedly ordered a subordinate to water down a warning about white supremacist terrorism.

Why doesn't Ken Cuccinelli (allegedly) want the government to understand the threat of white supremacist terrorists?
O'Brien has been one of the most aggressively dishonest officials re: election interference, constantly pushing falsehood that China is the biggest threat.

reuters.com/article/us-usa…

wsj.com/articles/u-s-n…
Read 5 tweets
22 Jul
Mobile voting vendor Voatz is trumpeting a test lab's report saying that its service meets the latest federal standards.

Experts say the report is meaningless, since those standards are hopelessly outdated and Voatz helped decide what/how to test.

subscriber.politicopro.com/article/2020/0…
The test lab, Pro V&V, used VVSG 1.1, which @EACgov approved in 2015. Experts call the security reqs in 1.1 laughably anemic. (VVSG 2 is in the works.)

@jhalderm said the report “illustrates why VVSG 1.1 certification is inadequate to establish the security of a voting system.”
.@mspecter, who co-wrote a report exposing serious vulns in Voatz's system, told me that Pro V&V's report "says little-to-nothing."

For one thing, it doesn't even address flaws that MIT & @trailofbits identified in their reports.

internetpolicy.mit.edu/wp-content/upl…
blog.trailofbits.com/2020/03/13/our…
Read 13 tweets
21 Jul
BREAKING: U.S. charges two Chinese hackers with breaching hundreds of companies, NGOs, & dissidents + trying to hack 3 U.S. firms researching coronavirus. The men sometimes worked in partnership with a Chinese MSS officer.

Indictment: justice.gov/opa/press-rele…
Since September 2009, the defendants have allegedly hacked into medical device makers, industrial engineering firms, gaming and education software firms, pharma companies, and defense contractors.

Victims in U.S., Australia, Germany, Japan, U.K., and 6 other countries.
The hackers tried to breach the networks of Maryland, Massachusetts and California firms researching coronavirus vaccines and treatments.

They also targeted a CA firm making testing kits.
Read 17 tweets
15 Jul
Prominent Twitter accounts are being hacked for a Bitcoin scam. Just saw Biden's account get hit. What a time to be alive!
The Obama tweet just disappeared. Here's an archive: archive.is/BH05o
Kind of amazing that a company as big and important as Twitter can't immediately find the common weak link that's powering this mass hack.
Read 10 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!