THE KEY

A group of centrist House Democrats that usually aims for bipartisanship is coming out swinging against Senate Majority Leader Mitch McConnell (R-Ky.) and other Republicans for blocking election security legislation.

Members of the Democrats’ Blue Dog Coalition, which includes the conservative wing of the party, charged Republican senators with endangering the country's democratic process for not forcing a vote on election security legislation during a press briefing. And they leveled their most pointed criticism at McConnell, who has steadfastly refused to allow major election security bills to get a vote on the Senate floor.

“The underlying trust of our citizens in their electoral system and who they choose to elect is at the base of this whole process,” Rep. Tom O’Halleran (D-Ariz.) said. “The question should be put day in and day out to Mr. McConnell: ‘Why are you not wanting to protect the electoral system in this nation?’”

Rep. Stephanie Murphy (D-Fla.) said that “McConnell is more comfortable having Russia engage in our elections than he is in having the federal government work with the states to protect them.” 

The blistering attacks from lawmakers, who often align with Republicans on national security issues, shows how fiercely partisan the election security fight has become. The Blue Dogs are trying to pressure Senate Republicans – many of whom pushed for election security reforms before the midterms but have backed off the topic since McConnell’s opposition hardened this year.

The group is pushing for a slew of bills that would mandate that states use paper ballots and conduct post-election audits, ramp up sanctions on Russia and prevent foreign actors from buying TV political ads among other reforms.

Murphy declined to say if she personally urged Florida Sens. Marco Rubio (R) and Rick Scott (R) to support election security bills but warned that Florida citizens would punish them if they didn’t. The issue is particularly pressing in Florida, she noted, because the report from Special Counsel Robert S. Mueller III revealed that networks in at least one Florida county were breached by Russian hackers in advance of the 2016 election. Murphy learned at least one other Florida county was penetrated after she demanded an FBI briefing following the Mueller report. 

“They're really not doing their jobs in not pressing for more action,” she said.

Rep. Anthony Brindisi (D-N.Y.) accused McConnell and other Republicans of running away from election security because they fear it will anger President Trump who has cast doubt on U.S. intelligence agencies’ conclusion that Russia interfered in the 2016 election to help his campaign and to hurt his opponent Hillary Clinton.

“The message has to be delivered to those Republican senators who are up for election in 2020…How does that Republican senator go back to their voters and say, ‘well my leader didn't want to [vote on election security] because he didn't want to make the president mad?’” Brindisi said.

Murphy and Rep. Michael Waltz (R-Fla.) are also pushing legislation that would require the FBI to swiftly inform voters anytime their election systems are infiltrated, which she touted in a Post op ed earlier this month.

Here’s more from the Blue Dog Coalition on Twitter:

PINGED, PATCHED, PWNED

PINGED: The top-polling 10 Democratic presidential candidates faced off on the debate stage last night but they totally ignored cybersecurity concerns – including that Russian hackers could undermine the 2020 contest.

Former Vice President Joe Biden, Sen. Kamala Harris (D-Calif.) and entrepreneur Andrew Yang did denounce China stealing U.S. companies’ intellectual property – much of which has been done by Chinese government-linked hackers. Their primary focus, though was on how to manage U.S.-China trade negotiations and a raft of tariffs imposed by President Trump.

Cybersecurity concerns played more heavily during some of the earlier debates, but were often pushed by lower-polling candidates, including New York Mayor Bill de Blasio.

Here’s a takeaway from the Wall Street Journal’s Dustin Volz:

And from Politico’s Tim Starks:

PATCHED: A Russian hack that briefly took out Ukraine's power grid in 2016 may have been a failed ploy to inflict longer-lasting damage, Andy Greenberg at Wired reports

By analyzing the data logs of Ukraine's national grid, researchers at the cybersecurity company Dragos were able to show that hackers had planned on using a powerful blackout malware to destroy some portions of the grid and take it offline for weeks or months on end, Andy reports. Researchers don't know for sure why that portion of the attack failed. 

Dragos director of threat intelligence Sergio Caltagirone called the attack plan "destructive and potentially life-threatening.”

There have only been two other known cases of malware being used to trigger physical sabotage against large-scale industrial systems -- the Stuxnet worm that damaged Iran’s nuclear program in 2009 and 2010 and is often attributed to the United States and a 2017 attack linked to Moscow that shut down a Saudi power plant. But much more damaging malware could have been developed in the interim, Caltagirone points out.

PWNED: Baltimore's information technology department permanently lost some data in a May ransomware attack, the city auditor Josh Pasch disclosed in a meeting with city officials on Wednesday, Ian Duncan at the Baltimore Sun reports.

The revelation is another sign of lasting damage from the attack that crippled the city’s computer systems for more than a month this spring. The city estimates it will take at least $18.2 million dollars to fully recover from the damage.

Pasch is now recommending that the city institute a backup system for all its files so similar losses don't happen in the future.

PUBLIC KEY

— Cybersecurity news from the public sector:

The United States has raised its concerns with Gulf allies over a possible security risk in using Huawei’s technology for their 5G mobile infrastructure, U.S. officials said on Thursday.
Reuters
Lawmakers on both sides of the aisle are mulling how to address the spate of ransomware attacks that have brought some state and local governments to their knees over the past few months.
The Hill
In an interview with NPR about his memoir, Permanent Record, former NSA contractor Edward Snowden denies any cooperation with Russian intelligence and says he would return if guaranteed a fair trial.
NPR
President Trump confirmed that he spoke with his secretary of state about also serving as national security adviser, and they ruled it out. But the discussion underscored Mr. Pompeo’s clout.
The New York Times
PRIVATE KEY

Reports of a new attack that allows hackers to take over mobile phones with just a text message could represent a huge advancement in the way hackers are spying on phone networks, researchers at mobile security firm AdaptiveMobile Security report.  Hackers have used the attack, dubbed "Simjacker," against victims in "multiple countries for the purposes of surveillance," the firm says.

Simjacker seems to work on nearly all types of mobile devices and the researchers estimate that as many as 1 billion phones might be at risk worldwide.

Unlike some other mobile attacks, which use text messages to deliver a link that has malicious software, Simjacker's malware is contained within the message itself -- potentially the first known instance of this kind of attack. Researchers wouldn't disclose who was behind the hacks, but say they're "quite confident that this exploit has been developed by a specific private company that works with governments to monitor individuals." 

Most U.S. phones seem to be secure, though. T-Mobile, Sprint, AT&T, and Verizon all told Motherboard's Joseph Cox they did not use the SIM technology vulnerable to the attack.

— More cybersecurity news from the private sector:

A researcher exposed private user account details and phone numbers by combining two separate security exploits.
Forbes
A member of a sophisticated international hacking group that authorities say targeted businesses to steal credit and debit card records has pleaded guilty to hacking and wire fraud charges
Associated Press
Companies are coming under increasing pressure to release details about how hackers infiltrate their systems and steal sensitive information.
Wall Street Journal
THE NEW WILD WEST

— Cybersecurity news from abroad:

Over the next five years, the New Zealand government will support Pacific countries as they secure their infrastructure and data, enhance online safety, and implement new cyber crime laws.
ZDNet
ZERO DAYBOOK
  • The U.S. Department of Homeland Security Cybersecurity and Infrastructure Security Agency will host its second annual National Cybersecurity Summit September 18-20 in National Harbor, Maryland.