Phone : +91 95 8290 7788 | Email : sales@itmonteur.net

Register & Request Quote | Submit Support Ticket

Home » Cyber Security News » Trump campaign turns to secure hardware after hacking incident – ET CISO

Trump campaign turns to secure hardware after hacking incident – ET CISO

Trump campaign turns to secure hardware after hacking incident – ET CISO

https://etimg.etb2bimg.com/thumb/msid-114165352,imgsize-55794,width-1200,height=765,overlay-etciso/ot-security/trump-campaign-turns-to-secure-hardware-after-hacking-incident.jpg

Republican presidential candidate Donald Trump’s campaign is now using specialized, encrypted mobile phones and secure laptops in an effort to protect staff following a series of successful Iranian hacks and two attempts to assassinate the former president.

The campaign recently purchased a package of these devices from Santa Barbara, California-based Green Hills Software, the developer of a proprietary, security-focused operating system already used by multiple U.S. agencies, the company’s CEO told Reuters.

The company sells a customized Android phone that comes pre-installed with its own unique operating system, stripping it of most functions aside from phone calling and text messaging, while implementing additional security controls.

While Green Hills Software put out a press release on Oct. 1 about the deal with the campaign, the development has received virtually no press attention.

Company President and CEO Dan O’Dowd said he approached the campaign through shared contacts and offered his company’s technology. “Securing the integrity of the democratic process is paramount,” O’Dowd said in the release.

A Trump campaign spokesperson declined to comment. The top echelon of the campaign recently made significant security improvements to their hardware, said a person familiar with campaign matters who spoke on condition of anonymity, although they were unaware which vendor had been chosen.

When asked about IT security at the Harris campaign, spokesperson Morgan Finkelstein said, “Broadly, we have robust cybersecurity measures in place, and personnel are trained to be vigilant against potentially malicious content.”

The current plan to retool Trump campaign devices follows months of a targeted Iranian cyber espionage campaign, which stole internal communications and documents. The decision to upgrade security measures was also driven by physical threats to Trump, fearing that hackers or spies could surveil staff and use that information to personally target individuals, another person familiar with the matter said.

In an interview, O’Dowd explained that a core group of campaign staffers are already using the devices, which are more resistant to remote cyberattacks.

“No vulnerabilities have ever been published about our operating system,” he added. The phones function in an isolated channel, where only devices on the same plan can communicate with one another. The devices also use end-to-end encryption and two-factor authentication by default – two measures widely recommended by cybersecurity experts.

The Iranian hacking group responsible for compromising the campaign earlier this summer, dubbed APT42 in the security research community, is known for deploying sophisticated mobile phone malware that can record conversations and activate camera recording remotely. Notably, APT42 is also known to spy on targets that are then physically threatened by Iranian intelligence-related agents, Reuters previously reported, based on a series of attacks on Iranian dissidents.

O’Dowd declined to discuss how many devices were purchased by the campaign or the overall cost, explaining that pricing often depends on a variety of factors and can differ between clients.

The campaign also bought customized, stripped-down laptops which are inaccessible from the internet to outside attackers, he said. The laptops mirror the same approach as the mobile phones, with limited functionality, but also offer a way to access a shared set of files and logs so team members can remotely collaborate in a shared but isolated computer environment.

O’Dowd said the technology has been previously used by legal teams working on sensitive court cases, where they wanted to keep certain files for clients separate and secure.

Green Hills Software is a federal contractor, selling its operating system to multiple military branches, where it is integrated with a variety of platforms, including weapons systems, according to publicly accessible government procurement records.

O’Dowd said the company’s laptop product is also used by FBI field offices. (Reporting by Christopher Bing, Gram Slattery and Trevor Hunnicutt; editing by Chris Sanders and Jonathan Oatis)

  • Published On Oct 12, 2024 at 11:30 AM IST

Join the community of 2M+ industry professionals

Subscribe to our newsletter to get latest insights & analysis.

Download ETCISO App

  • Get Realtime updates
  • Save your favourite articles


Scan to download App

Information Security - InfoSec - Cyber Security - Firewall Providers Company in India

 

 

 

 

 

 

 

 

 

 

 

 

What is Firewall? A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet.

 

Secure your network at the gateway against threats such as intrusions, Viruses, Spyware, Worms, Trojans, Adware, Keyloggers, Malicious Mobile Code (MMC), and other dangerous applications for total protection in a convenient, affordable subscription-based service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services. Stateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols.

 

Firewall Firm is an IT Monteur Firewall Company provides Managed Firewall Support, Firewall providers , Firewall Security Service Provider, Network Security Services, Firewall Solutions India , New Delhi - India's capital territory , Mumbai - Bombay , Kolkata - Calcutta , Chennai - Madras , Bangaluru - Bangalore , Bhubaneswar, Ahmedabad, Hyderabad, Pune, Surat, Jaipur, Firewall Service Providers in India

Sales Number : +91 95 8290 7788 | Support Number : +91 94 8585 7788
Sales Email : sales@itmonteur.net | Support Email : support@itmonteur.net

Register & Request Quote | Submit Support Ticket