Dominion Voting Systems Uses Firm That Enabled US Treasury Hack


    Dominion Voting Systems Uses Firm That Enabled US Treasury Hack Tyler Durden Mon, 12/14/2020 – 14:00 Authored by Zachary Stieber via The Epoch Times, A company that provides voting systems in 28 states uses an Internet technology firm that was hacked. Dominion Voting Systems uses SolarWinds software, according to a Dominion web page. SolarWinds does not list Dominion on its partial customer listing but says its products and services are used by more than 300,000 customers around the world, including all five branches of the U.S. military and more than 425 of the U.S. Fortune 500. President and CEO of Dominion Voting Systems John Poulos testifies to Congress in Washington on Jan. 9, 2020. (Alex Wong/Getty Images) The situation with SolarWinds software enabled hackers to gain access to the U.S. Commerce Department and, reportedly, the Treasury Department. This means the US SolarWinds product is 💯 compromised across the USG. Likely China w/ back doors to every dept, agency & activity in the USG. Not good. @realDonaldTrump this is a grave natl scty threat, esp at this moment. Demand answers ASAP! Know you will. — General Flynn (@GenFlynn) December 14, 2020 SolarWinds Orion products are currently being exploited by malicious actors, the Department of Homeland Security’s Cybersecurity & Infrastructure Agency (CISA) said. The tactic lets an attacker gain access to network traffic management systems. The only known mitigation measure currently available is to disconnect affected devices, according to the agency. SolarWinds recommended customers upgrade their Orion platform to a recent version. If customers aren’t able to upgrade immediately, they were urged to disable Internet access for the platform and limit ports and connections to only what is necessary. A patch is expected on Tuesday. Dominion didn’t respond to a request for comment, including whether it had followed the measures recommended by either CISA or SolarWinds. Dominion also didn’t return a voicemail. According to FireEye, a cybersecurity firm, the hackers inserted malicious code into legitimate software updates for the SolarWinds Orion software. The code enabled an attacker to gain remote access to the victim’s systems. A screenshot of Dominion Voting Systems’ website shows the use of SolarWinds software. (Screenshot/Dominion Voting Systems) The malware was designed in a way to not alert the victim to the intrusion, and attackers went to significant lengths to blend into normal activity. The breaches date back to the spring, according to the firm, which has been in touch with SolarWinds, the FBI, and other key partners. The activity is being probed by the FBI, the firm said. The bureau has told The Epoch Times that it doesn’t comment on ongoing investigations. Dominion has been under the spotlight in recent weeks because of how widespread its systems and machines are in the United States. Witnesses have come forward to say that Dominion products were connected to the Internet during the Nov. 3 election, raising concerns about security. Dominion machines were used in Antrim County, Michigan, where officials initially reported Democratic presidential nominee Joe Biden winning before saying President Donald Trump actually won. The change in votes was approximately 6,000. Michigan and Dominion officials have insisted that what happened was due to human error but a forensic audit showed that it was actually a software issue, an attorney pressing a case against the county said last week. A judge is slated to decide whether to approve an emergency motion seeking permission to make the audit public on Monday morning. Override Early Access On


    Please enter your comment!
    Please enter your name here