Secure Electronic Voting Through DNS

With the November 7 election looming, state and local governments are scrambling to secure their electoral systems.

Key Takeaways
  • Electronic voting ecosystems are increasingly vulnerable because peripheral systems that program, tally, report, and audit votes are connected to open networks, despite voting machines themselves often being offline.
  • Attackers commonly gain access to election infrastructure through indirect vectors such as phishing and advanced persistent threats, rather than direct brute-force attacks on voting machines.
  • Over 90% of malware leverages DNS, making DNS traffic a critical visibility point for detecting malicious activity targeting Election Management Systems (EMS) and related components.
  • DNS-based security can detect EMS-targeted reconnaissance by identifying suspicious DNS queries and blocking network traffic from unauthorized or compromised endpoints.
  • When ballots are uploaded or results are reported, DNS monitoring can identify and block attempts to access, exfiltrate, or manipulate election data at the network layer.
  • Given limited security staffing and funding in many election commissions, DNS-based controls provide a foundational capability for strengthening overall election network defense.

With the November 7 election looming, state and local governments are scrambling to secure their electoral systems.

Manipulation of electronic voting machines has always been a possibility. The only difference now is the relative ease of pulling it off. It took hackers at the recent DEFCON conference only 90 minutes to break into a voting machine.

The threat is no longer theoretical, either. Investigators recently found evidence of tampering with voting machines in 39 states, with reports suggesting that the problem may be even more widespread.

Many election officials are lulled into a false sense of security by the fact that voting machines are not usually connected directly to the internet. Unfortunately, that doesn’t account for the many network-enabled inputs into modern voting machines. The computers that program the ballots, tally votes, report results and audit voting, are all connected to open networks, making them just as vulnerable.

Those vulnerabilities are not usually the result of direct “brute force” hacking. They often find their way in through phishing emails or other subtle points of entry. Once these advanced persistent threats are inside a network, it is very difficult to find and eliminate them.

DNS Data Can Detect EMS Hack

This is where Domain Name System (DNS) can play a critical role in securing election infrastructure.  Over 90% of malware uses DNS – its pervasive nature an ideal mechanism for infiltrating a network.

In attacks on voting systems, malware will search for the Election Management System (EMS) that sets parameters and formatting for ballots – the single point of entry for disconnected voting machines. A client facing DNS-based security system can identify these searches and trace their source. When suspicious queries are identified, DNS-based behavior policy can block all traffic from unauthorized computers.

The same holds true for tabulating and reporting results. When ballots are uploaded to a connected system, DNS security systems can identify and block any attempts to access, exfiltrate, or manipulate the information.

The security of voting systems is vital to the future of democratic government, yet the IT resources of state and local election commissions are woefully underprepared and underfunded. Few have dedicated network security personnel, let alone a method for vetting the security of voting machines themselves.

DNS-based security can serve as a vital cornerstone for a network defense security strategy that our electoral systems desperately need.


Published in:


An avatar of the author

BlueCat provides core services and solutions that help our customers and their teams deliver change-ready networks. With BlueCat, organizations can build reliable, secure, and agile mission-critical networks that can support transformation initiatives such as cloud adoption and automation. BlueCat’s growing portfolio includes services and solutions for automated and unified DDI management, network security, multicloud management, and network observability and health.

Related content

Your journey to intelligent NetOps begins at Cisco Live

Visit BlueCat’s booth or book a meeting now to learn more about how our solutions can help you build a network that supports constant change.

Read more

Replace BIND and ISC with Micetro DNS/DHCP Server (MDDS)

Tired of patching and manually configuring BIND DNS and ISC DHCP? Discover how Micetro MDDS appliances can replace them for modern DDI.

Read more

Automate it all in Integrity with REST v2 API-first DDI management

Discover API-first DDI with Integrity X by using REST v2 to automate DNS, DHCP, and IPAM for scalable, secure network operations.

Read more

Agentic AI adoption in network observability propels NetOps teams

Network observability is crucial for today’s networks and even more capable with agentic AI, according to new Omdia and BlueCat research.

Read more

⏳ Cisco Live is almost here. Put BlueCat on your agenda for smarter, more secure networks.