Poor security let hackers access 40 million votersâ details

Personal details of millions of UK voters were left âvulnerable to hackersâ because passwords were not changed and software not updated, the UKâs data privacy watchdog has found.
The Electoral Commission, which oversees UK elections, has been formally reprimanded by the Information Commissioners Office (ICO) over the security lapse.
Beginning in August 2021 cyber-attackers were able to access computers containing the Electoral Registers, which hold details of voters including millions of those not available publicly.
The Electoral Commission said it regretted that sufficient protections were not in place to prevent the cyber-attack.
âAs the ICO has noted and welcomed, since the attack we have made changes to our approach, systems, and processes to strengthen the security and resilience of our systems and will continue to invest in this area,â it said in a statement.
The investigation did not find any evidence that personal data was misused, or that any direct harm has been caused by the attack.
The ICO said hackers had access to the Electoral Commissionsâ systems for over a year.
It was only spotted when an employee reported that spam emails were being sent from the commissionâs own email server.
The hackers were eventually booted out in 2022.
The UK government has formally accused China of being behind the attack on the commission, claims the Chinese embassy rejected as âmalicious slanderâ.
âBasic stepsâ
The ICOâs investigation found the Electoral Commission did not have appropriate security measures in place to protect the personal information it held.
To carry out the attack, hackers impersonated a legitimate user account and exploited a number of publicly known security weaknesses in software used by the commission.
Software updates which fixed these security holes had been available for months before the attack, but the Electoral Commission had failed to apply them.
The commission also did not have an âappropriateâ policy in place to ensure employees were using secure passwords.
Investigators found 178 active email accounts were still using passwords identical or similar to those set by the organisationâs IT service desk when an account was created or reset.
ICO deputy commissioner Stephen Bonner said if the Electoral Commission had âtaken basic stepsâ to protect its systems, it was âhighly likelyâ the data breach would not have happened.
âBy not installing the latest security updates promptly, its systems were left exposed and vulnerable to hackers,â he said.