Situation Room: A cyberattack is tricking users into installing malware themselves. Here’s what you need to know before it shows up.
Resource Library: Phishing is still a common way to become compromised. Phishing Threats: Essentials for Safeguarding Election Infrastructure provides the warning signs and habits to stop it.
Planning Desk: When an incident hits, improvising shouldn’t be the plan. This week’s step builds toward developing a response plan that can be applied to any disruption your office might face.
The "Fix This Now" Trick That Could Compromise Your Office
ClickFix is a social engineering technique that is catching even cautious users off guard. Unlike a traditional phishing attack, where the target clicks a malicious link or opens a dangerous attachment, ClickFix works by convincing the victim to do the damage themselves by following what appear to be completely reasonable instructions to fix a problem on their computer.
Here is how it works:
You visit a website, click a link in an email, or land on a page that suddenly displays what looks like a familiar error message from your browser or operating system.
The message says something has gone wrong and offers a simple fix: Just copy a command and paste it into a box on your computer, then press Enter.
The Situation Room focuses on real security incidents and threats in the news relevant to election security. To review previous issues, see thenewsletter archive.
The guide urges awareness, caution, and simple habits that can significantly reduce the risk of election officials falling prey to common phishing attacks. It covers:
Common phishing methods with variations that attackers are using to gain access.
Recognizing red flags to look for in a phishing email, such as an unknown sender or a generic greeting.
Methods to mitigate risk of falling victim to a phishing attempt.
Consider distributing the guide to your staff, or, if you’re a state official, to your local jurisdictions. Following up with a test phishing campaign can be a good way to assess whether staff and local officials are improving their ability to spot phishing attempts before taking the bait.
To explore how Artificial Intelligence is changing the phishing landscape in real time, see the National Cybersecurity Alliance’s interactive web-based tool AI and the Future of Phishing.
The Resource Library section of the newsletter spotlights election security resources. All highlighted resources are available online in the Resource Library.
Week E-29: Respond Smarter with All-Hazards Planning
Election security and resilience demands preparedness, and that includes understanding your responsibilities during an incident and taking action with confidence. Having an Incident Response Plan that defines those roles and steps can significantly limit the damage of and improve your recovery from a cyber, operational, or physical incident.
The incident response process boils down to four phases:
Preparation: Have a plan in place. Define who is in charge, and identify roles and responsibilities. No one can build an effective response plan in the middle of an emergency.
Detection and Analysis: Determine if an incident has occurred and what type (cyber, operational, or physical), and assess its ability to impact your operations.
Containment, Eradication, and Recovery: Stop the effects to prevent further damage, understand what caused the incident, clean up the cause, and then restore functions. While incredibly important for cyber events, this can apply to operational and physical events as well.
Post-Incident Activity: Improve security with a lessons-learned review after full recovery from an incident.
In the coming weeks, we’ll break down these phases into manageable, easy-to-understand steps. Today is the first step:
Rethink your approach to incident response planning.
Your plan should explain how to handle any kind of emergency, no matter what causes it. However, instead of being overwhelmed with creating a different set of steps for every possible incident, take the all-hazards approach. It prepares you to deal with ...READ MORE HERE.
The Planning Desk is a running timeline of key election security tasks. You can find prior editions in thenewsletter archive.
We include news on cyber, operational, and physical security alongside election-specific headlines because potential risks to elections often emerge from trends shaping the broader security landscape, and we’d rather you see them coming.