The same US official said that cyber operations against foreign actors, across the whole spectrum of offensive and defensive measures, began ahead of the election and will continue after the final ballot is cast.
This expansion of Cyber Command’s “hunt forward” operations ahead of Election Day, which built on an effort that began in 2018 to identify foreign hackers and tactics, was first reported by The New York Times.
And while a senior election security official from the Cybersecurity and Infrastructure Security Agency told reporters Tuesday that “it has been quiet” as far as foreign interference and malicious cyber activity are concerned, they also cautioned that “we’re not out of the woods yet” — making it clear relevant agencies remain on high alert.
“This is just the time where polls start closing, where numbers, early unofficial results start going off on election night reporting sites, where we would start seeing the ‘three Ds’ … disruptions due to demand, defacement or denial of service attacks,” the official said.
“There could be disruptions, but those election night reporting websites do not tie back to the official count or the certification process. They’re wholly separate,” they added.
Federal officials will remain in that posture over the next several weeks, the senior CISA official told reporters when asked to compare the level of foreign activity to what was observed in 2018.
“The attack surface particularly for disinformation and foreign interference extends well into the next month or two,” the senior CISA official said. “So there is no spiking the football here. We are acutely focused on the mission at hand.”
This content was originally published here.