Thursday, January 30, 2025
HomeCyber Security NewsFBI & CISA Warns of Tactics Used by Hackers Targeting 2024 U.S....

FBI & CISA Warns of Tactics Used by Hackers Targeting 2024 U.S. General Election

Published on

SIEM as a Service

Follow Us on Google News

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have issued a joint public service announcement (PSA) warning of sophisticated tactics foreign actors are employing to spread disinformation ahead of the 2024 U.S. general election.

The announcement, titled “Just So You Know: Foreign Threat Actors Likely to Use a Variety of Tactics to Develop and Spread Disinformation During the 2024 U.S. General Election Cycle,” is the final part of a four-part series aimed at raising public awareness.

Join ANY.RUN's FREE webinar on How to Improve Threat Investigations on Oct 23 - Register Here 

FBI & CISA Warns

The PSA highlights several tactics used by foreign adversaries, particularly Russia and Iran, to manipulate public opinion and undermine faith in the democratic process:

  • Mimicking national media outlets like the Washington Post and Fox News
  • Creating inauthentic news sites posing as legitimate media organizations
  • Utilizing paid influencers to conceal their involvement
  • Leveraging generative artificial intelligence (AI) to create and disseminate misleading content

CISA Senior Advisor Cait Conley emphasized the importance of election security, stating, “Our foreign adversaries are looking to attack our democratic process to further their objectives, and we need the help of all Americans in ensuring they are not successful.”

Conley reassured the public, saying, “Americans should be confident that their votes will be counted as cast.

They should also know that our foreign adversaries will try to make them believe otherwise.

Both agencies work closely with federal, state, and local partners to safeguard the electoral process.

The FBI investigates election crimes, foreign influence operations, and malicious cyber activities.

At the same time, CISA supports critical infrastructure owners and operators in ensuring the security and resilience of election systems.

How to Choose an ultimate Managed SIEM solution for Your Security Team -> Download Free Guide (PDF)

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...