DNC tech chief tests staff with simulated phishing attack

The Democratic National Committee’s new chief technology officer is launching a series of simulated phishing attacks on DNC staff in an effort to prevent another cybersecurity breach. 

Raffi Krikorian, who joined the DNC in June, told Wired that he is planning a series of simulated phishing attacks to test DNC staffers’ preparedness.

The simulated attack is among several steps being taken by Krikorian to tighten the DNC’s cybersecurity to avoid a repeat of the massive breach last year that led to thousands of internal emails being posted on WikiLeaks.

Phishing refers to the practice by which cyberattackers seek to solicit personal information via email by posing as a reputable source. 

Former FBI Director James Comey revealed at a congressional hearing in March that the DNC took 10 months to provide a forensic analysis of the breach after it was notified of the attack. 

Since joining the DNC, Krikorian, who most recently led Uber’s Advanced Technologies Center, has pushed staffers to use messaging apps that offer end-to-end encryption, as well as to enable two-factor verification for login credentials.

He told Wired that he even got DNC Chairman Tom Perez to require staffers to contact him via Signal, an encrypted messaging app. 

“This is important. The nation’s future is at play here. It’s about getting people to think that way,” he said. “Even in the next few days we’re going to do a series of simulated phishing attacks on the entire DNC staff.”

 

Leave a Reply

Your email address will not be published. Required fields are marked *

*

six + fourteen =