Rechercher
Fermer ce champ de recherche.

Vous êtes victime d’un incident de sécurité ? Contactez notre CERT

29/04/2024

CTI

Elections: a year of threats – Episode 2

The second episode of our elections serie is out!

Cyberspace is currently heavily used to target state powers. This week, we focus on the last Russian election to explore the different stakes surrounding this event and introduce you to the concept of foreign interference. It is a complex operation that can leverage multiple sorts of influence to change the course of the political future of a country. We’ll see that these operations are nothing new and serve specific goals set by governments. 

The Russian election: at the crossroad of doubtful practices
The recent Russian election is the opportunity to highlight important issues such as governments will to invest in entire teams interfering in foreign elections to serve their interests. Starting through the lens of a non-Western country, we are also going to put actions targeting Russia in perspective with similar campaigns.

Voluntarism and technical means: the perfect mix

Foreign governments’ interferences in elections are a recurring theme in the media and Russia is often singled out as one of the main users of this technique. However, the United States has long attempted to destabilise regimes deemed hostile, a practice it reportedly abandoned in the late 2010s before Moscow suspected it of destabilising the 2024 presidential election. About 90,000 cyberattacks were performed on Russia’s election through three main vectors: web portals, online voting, the Central Election Commission.

Lower levels of influence

Beyond the known fraudulent actions performed by the Russian government, private actors are also willing to play a part in their own way. The staff of the Russian embassy in Washington DC received various pressures surrounding the elections. Those ranged from verbal to physical violence.

Not so black and white

Russia has also been suspected of trying to influence the course of elections in the US, Europe, but also in Indonesia and many African countries in the recent years.

This type of intervention serves geopolitical purposes to fulfil the current government’s objectives in terms of foreign policy as well as destabilising powers promoting opposite values.

Breaking down interference: the game of the powerful?

Interference is not always a reciprocal game

Interference is first and foremost a matter of resources. Some states always put substantial efforts, but they are not all equal.

Depending on the political context of their targets, governments will implement a tailored strategy. For example, when targeting Africa, Russia uses three main influence vectors:

  • Disinformation,
  • Support candidates close to Moscow,
  • Support circumvention of term limits.

What’s at stake?

The government’s credibility

Maintaining national sovereignty

Gain the upper hand

Operations les by the United States since the 2000s

Voir les derniers Cybersecurity Insights

25 novembre 2024
Avec une souche éprouvée, des outils bien choisis et des cibles stratégiques, 8Base se distingue comme une menace particulièrement redoutable. […]
12 novembre 2024
L'IA est devenue un facilitateur de la conduite des affaires cybercriminelles. La résilience exigée au sein de diverses organisations pour […]
29 octobre 2024
L'usurpation d'identité vous effraie ? De l'arnaque corporate jusqu'aux manipulations à l'échelle globale, l'essor des deepakes incarnant des personnalités publiques […]
28 octobre 2024
2024 is the year of elections. But how does it impact the threat landscape? Almond would like to share a […]
22 octobre 2024
Les interfaces que vous utilisez chaque jour subissent de multiples assauts, et leur manipulation met en danger de nombreuses entreprises […]
2 octobre 2024
Le Moyen Orient attire tous les regards après l'attaque sur la chaine d'approvisionnement des bippers et de talkies-walkies. L'Iran, acteur […]
25 juillet 2024
On July 19, Crowdstrike published an update on the sensors deployed on customer’s endpoints that caused a production incident on […]
17 juillet 2024
CWATCH vous invite au travers de cet article à vous interroger sur l’écosystème d’attribution actuel et les impacts de celui-ci […]
26 juin 2024
À l'approche des Jeux olympiques de Paris, la communauté de la cybersécurité a déjà observé une augmentation des activités malveillantes.
20 juin 2024
Ce Cybersecurity Insights a pour but de naviguer entre l’intérêt, le fonctionnement et l’étendue du marché des scanners de vulnérabilités. 

Jour 2 | Quel est l’artefact forensique qui permet de prouver une exécution d’un programme sous Windows ?

  • Réponse 1 : JumpList

  • Réponse 2 : ShimCache

  • Réponse 3 : $MFT

  • Réponse 4 : Prefetch

Jour 1 | Quel texte européen permettra qu’à partir de fin 2027, tous les produits vendus dans l’UE et comprenant des composants numériques seront exempts de vulnérabilités et maintenus pendant tout leur cycle de vie ? #DigitalTrust

  • Réponse 1 : Le Cyber Security Act
  • Réponse 2 : Le Cyber Resilience Act
  • Réponse 3 : La Directive REC
  • Réponse 4 : La Directive NIS2