fbpx
Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Penetration Testing

          Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Trump Lawsuit Site To Report ‘Rejected Votes’ Leaked Voter Data

Trump Lawsuit Site To Report ‘Rejected Votes’ Leaked Voter Data

The DontTouchTheGreenButton.com website just launched by the Trump campaign in relation to the recently filed Arizona “rejected votes” lawsuit was discovered to be leaking voter data.

The data included the voter name, address, and a unique identifier. However, reports have surfaced of users alleging the website has SQL Injection flaws that make it possible to collect a voter’s SSN and date of birth.

“Hastily” launched website leaks data

Over the weekend, President Trump’s re-election campaign and the Republican National Committee filed a lawsuit in Arizona alleging the polling officials in Maricopa County had incorrectly rejected in-person votes on Election Day, by misusing a mechanical feature (a green button) of the voting machines.

“Poll workers struggled to operate the new voting machines in Maricopa County, and improperly pressed and told voters to press a green button to override significant errors,” said Matt Morgan, Trump 2020 campaign general counsel.

“The result is that the voting machines disregarded votes cast by voters in person on Election Day in Maricopa County,” alleged Morgan. 

To collect anecdotal evidence from voters who may have observed such behavior at the polling stations which validates what the lawsuit alleges,  the campaign set up a website to collect sworn declarations from voters.

The website DontTouchTheGreenButton.com requests personal information from voters, such as their name and address, phone number, email address, date of birth, last 4 digits of social security number (SSN), and answers to multiple-choice questions.

Also Read: Website Ownership Laws: Your Rights And What These Protect

To limit the ability to submit declarations only to Maricopa County voters, the website lets users “search” for their name and auto-populate their address, as shown below:

trump arizona lawsuit auto populate field
The website lets a registered voter look their name up and auto-populate the address
Source: BleepingComputer

Given voter records are already public information, the ability for anyone to look up this information is hardly surprising—although an obvious privacy concern.

However, the website used an API  that may make it possible to scrape voter information in bulk.

From bulk data collection to alleged SQL Injections

Provided the website was launched fairly quickly after the lawsuit was filed, some users are calling it “hastily set-up” and ridden with data leaks and SQL Injection flaws.

BleepingComputer observed the data was being pulled from the server using Algolia REST API.

The exposed API key and Application ID in the request could let anyone programmatically run queries to scrape the voter data in bulk from the service.

algolia api trump key leak
Alogia API used by the website with the Application ID and API key exposed
Source: BleepingComputer
 

The JSON data returned by the REST API contains a list of 5 voter names and addresses by default, along with unique identifiers based on the search query (e.g. first few letters of the voter’s name).

In theory, one could make automated queries to download voter information by altering the hitsPerPage value shown above to a higher value, and do this repeatedly for different multi-letter combinations until they have crawled the entire data set.

Also Read: Computer Misuse Act Singapore: The Truth And Its Offenses

data returned by API
Data returned by API contains voter’s name, address, and unique identifiers
Source: BleepingComputer

This API used to retrieve voter information has since been removed from the DontTouchTheGreenButton.com site.

On Reddit, some users further alleged that the website was matching the name and address submitted against the last 4 digits of SSN entered by the user and exposing the partial SSN. 

Whereas, other users mentioned one could execute a SQL Injection attack against the website to obtain the SSN and Date of Birth information for voters.

BleepingComputer did not verify these additional allegations.

This event marks the second API leak incident this year concerning voter registration data.

Earlier this year, an API used by the Biden campaign’s Vote Joe app was found to be leaking voter data that should have remained confidential. 

When launching a mission-critical website such as DontTouchTheGreenButton.com it may be a good idea to conduct a thorough security assessment to safeguard user data and privacy.

Update 12:55 PM EST: API removed from site.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us