An apparent hacking attempt on the Democratic National Committee’s voter database was a false alarm, the organization has said.
CNN and the Associated Press reported on Wednesday, citing an unnamed party official, that the political organization was warned of an attempt on its systems. DNC officials contacted the FBI after Lookout, a security firm, detected and reported a phishing page that replicated a login page for NGP VAN, a technology provider for Democratic campaigns.
But the party’s security chief quickly reversed its position Thursday, confirming that the phishing page was “simulated.”
“The test, which mimicked several attributes of actual attacks on the Democratic party’s voter file, was not authorized by the DNC… or any of our vendors,” said Bob Lord, DNC’s chief security officer, in a statement.
Just a day earlier, he briefed Democratic officials on the apparent incident in Chicago on Wednesday.
It’s believed that the Michigan Democratic Party asked a third party to conduct the test without clearance or authorization from the DNC, according to one reporter.
In the case of phishing attacks, hackers attempt to obtain the username and password for sensitive internal systems by tricking staff into entering their credentials on spoofed sites. Hackers can then reuse those credentials to log in themselves.
Mike Murray, Lookout’s vice president of security intelligence who originally informed the DNC of the phishing page, said in a tweet that, “you don’t know that they’re false until you’ve showed up to investigate.”
It’s not uncommon for political parties to store vast amounts of information on voters. Political parties and national committees often use the data to target voters with political messaging.
Earlier this week, Microsoft said it thwarted an attempt by a Russian-backed advanced persistent threat group known as Fancy Bear (or APT28) to steal data from political organizations.
Updated on August 23: with new information from the DNC. This story and its headline have been updated.