MCU-in-the-middle attack on Diebold voting machine
Computerized voting machine vulnerabilities are nothing new, but this video demonstrating a man-in-the-middle wireless attack on a Diebold voting machine takes a different tact than most others. A vulnerability assessment team at Argonne National Laboratories was able to compromise the security of the Diebold machine, rendering it vulnerable by using a homemade MCU board at a total parts cost of less than $12. Adding the remote wireless capability would increase total cost to around $26.
The technique requires initial physical access to the target voting machine in order to install the board on the bus between the touchscreen and the mainboard. (The difficulty of achieving this would be relative to the amount of physical security surrounding the machine.) Once installed, the added hardware can intercept data from the touchscreen and alter input according to a preprogrammed routine, or according to instructions from the remote.
The researchers in this video are simply remotely pressing buttons on the machine’s 0-9 password keypad. It would appear to us that in order to perform an effective, undetectable hack on an election would require additional detailed knowledge about the progression of screens, choices and options available to the voter. This could be more effectively performed if voter’s button presses were transmitted for viewing by the attacker on a remote screen. This would require additional coding and hardware on the remote side, but would really turn this into a killer hack!
We’d be interested in seeing the hardware/software details. Looks like a (very) Dangerous Prototype!
Via Brad Friedman at Salon.This entry was posted in hacks, Prototypes, techniques and tagged Diebold, hardware hacking, voting machine.