All Posts
Cyber Threat Intelligence
Research
1
min read

Threatscape of the US Election

This report discusses the current state of election risk and concerns amongst security researchers regarding the security of the US election infrastructure and the plethora of threats posed to it.
Published on
November 5, 2018
Table of Contents

Cyber attacks and political elections within the US are frequently heard together in the same sentence following the 2016 presidential election. Media outlets are ramping up their efforts to cover the 2018 midterm elections for the 115th Congress, often including online mediums such as social media. This can create an information overload for voters. Threat actors can exploit this abundance of information to create and disseminate disinformation in an effort to influence the outcome of the elections. Alternatively, they can use news headlines to add a sense of legitimacy to phishing emails. This style of attack is utilized by some of the most sophisticated Advanced Persistent Threat (APT) groups that have been publicly documented.

In addition to disinformation attacks, other targets such as the candidates themselves, voter information databases, and voting machines are also at risk. Politically-motivated threat groups are likely already conducting reconnaissance and attempting to launch attacks against political and election-related organizations and individuals.

The objective of this report is to discuss the current state of election risk and the concerns amongst security researchers regarding the security of the US election infrastructure and the plethora of threats posed to it. Candidates and their associated states and websites will also be examined to ascertain the relative security against malicious activity mentioned above. In addition, various groups who have been known to attack election infrastructure or may have the intent to do so will also be explored.

The full report is available for download here.

FEATURED RESOURCES

February 17, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Zero-Click Affects Claude, SolarWinds Vulnerabilities for Velociraptor and more

Zero-Click Remote Code Execution Flaw Affects Claude Desktop Extensions. Threat Actors Exploit SolarWinds Web Help Desk Vulnerabilities to Deploy Velociraptor. Fake 7-Zip Site Distributes Trojanized Installer Converting Systems to Proxy Nodes. ZeroDayRAT Commercial Mobile Spyware Targets Android and iOS. And more..
Read More
February 10, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Notepad++ Attack, RAT Uses Hugging Face, Microsoft Office Flaw and more

Notepad++ Supply Chain Attack Delivers Chrysalis Backdoor. Android RAT Uses Hugging Face Platform to Host Malicious Payloads. Fancy Bear Exploits Microsoft Office Flaw in Ukraine. Nitrogen Ransomware Decryptor Fails Due to Coding Error. And more...
Read More
February 16, 2026
IT Operations
Security Operations

Data Hygiene for AI Security: Stop Ingesting Everything, Start Engineering Signal

Read More
Explore All