{"id":10833,"date":"2018-08-27T10:46:38","date_gmt":"2018-08-27T10:46:38","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more\/"},"modified":"2018-08-27T10:46:38","modified_gmt":"2018-08-27T10:46:38","slug":"voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more\/","title":{"rendered":"Voting machine maker vows to step up security, Fortnite bribes players to do 2FA \u2013 and more"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2018\/05\/29\/vote_button_shutterstock.jpg?x=1200&amp;y=794\" class=\"ff-og-image-inserted\"\/><\/div>\n<p><strong class=\"trailer\">Roundup<\/strong> Summer rolls on, <em>Reg<\/em> vultures are making the most of their hols before the September rush hits, and in the past week, we saw <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/08\/23\/lazarus_apple_macs\/\">Lazarus malware<\/a> targeting Macs, <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/08\/23\/adobe_photoshop_critical_patch\/\">Adobe scrambling<\/a> to get an emergency patch out, and Democrats <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/08\/23\/dnc_voter_database_phishing\/\">losing their minds<\/a> over a simple training exercise.<\/p>\n<p>Here&#8217;s what else went down&#8230;<\/p>\n<h3 class=\"crosshead\"><span>SOLEO mission<\/span><\/h3>\n<p>Researchers at Project Insecurity have <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/insecurity.sh\/assets\/reports\/soleo.pdf\">detailed<\/a> a vulnerability in SOLEO&#8217;s IP relay technology that disclosed sensitive files on affected installations. For example, the following HTTPS request to a vulnerable service&#8230;<\/p>\n<pre>\n\/IPRelayApp\/servlet\/IPRelay?page=..\/..\/..\/..\/..\/..\/..\/etc\/passwd?\n<\/pre>\n<p>&#8230;would potentially return the hashed password file for the system. The bug was fixed by SOLEO on August 10, and pushed out to ISPs and other communications providers using the technology. We&#8217;re told by Project Insecurity that &#8220;essentially every internet service provider in Canada uses Soleo\u2019s IP Relay service,&#8221; which means \u2013 it is claimed \u2013 tens of millions of Canadians were at risk until it was patched.<\/p>\n<h3 class=\"crosshead\"><span>Slapped in the face with a Triout<\/span><\/h3>\n<p>Security researchers have unearthed a toolkit, dubbed Triout, for building extensive spying capabilities into seemingly benign Android applications.<\/p>\n<p>A seemingly innocuous app was found repackaged using Triout to hide the presence of malicious code on a device, record phone calls as a media file, log incoming text messages, record videos, copy all photos taken by the front and rear cameras, and collect GPS coordinates. Harvested information was transmitted back to a miscreant-controlled command-and-control server.<\/p>\n<p>Researchers at Bitdefender this month <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/labs.bitdefender.com\/2018\/08\/triout-spyware-framework-for-android-with-extensive-surveillance-capabilities\/\">identified and described in detail<\/a> the Triout code.<\/p>\n<h3 class=\"crosshead\"><span>Blast from the past<\/span><\/h3>\n<p>This is not strictly security related, other than involving an operating system wasn&#8217;t considered particularly secure: Windows 95 has showed up <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/github.com\/felixrieseberg\/windows95\">as an Electron app<\/a> for Linux, macOS, and Windows. It uses the x86 virtualization JavaScript tech dubbed <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/github.com\/copy\/v86\/\">v86<\/a> to run the OS. You can also, by the way, <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/bellard.org\/jslinux\/\">boot Windows 2000<\/a> in a browser window, using JavaScript, as well as Linux and FreeDOS, thanks to Qemu supremo Fabrice Bellard.<\/p>\n<h3 class=\"crosshead\"><span>ES&amp;S ticks ballot for better security<\/span><\/h3>\n<p>A voting machine maker previously <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/07\/17\/voting_systems_security\/\">called out<\/a> for its weak security is kicking off a campaign to harden its products from hackers.<\/p>\n<p>ES&amp;S <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.essvote.com\/blog\/127\/\">announced<\/a> it was expanding its work with the US government&#8217;s Homeland Security and the Information Sharing and Analysis Centers (ISAC) to improve its security protections. The effort includes the installation of advanced threat monitoring and network security monitoring for ES&amp;S products and services as well as membership in a threat-sharing network that will allow the company to both send and receive alerts on new attacks.<\/p>\n<p>One could ask why the manufacturer waited this long to improve the security protections in its stuff, but hey\u2026 better late than never. Also, it came a day after it was <a target=\"_blank\" href=\"https:\/\/www.harris.senate.gov\/news\/press-releases\/bipartisan-group-of-intelligence-committee-senators-urge-election-systems-vendor-to-commit-to-independent-equipment-testing\">leaned on by US politicians<\/a>, so there&#8217;s that.<\/p>\n<h3 class=\"crosshead\"><span>Uncle Sam puts out a call for supply-chain security<\/span><\/h3>\n<p>Speaking of Homeland Security, the agency is looking to bring in outside vendors who have fresh ideas on securing IoT devices and supply chains.<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.nextgov.com\/cybersecurity\/2018\/08\/dhs-asks-industrys-help-major-supply-chain-security-upgrade\/150640\/\">Nextgov spotted<\/a> a request from the department for proposals from IT suppliers who can help it make sure that foreign governments aren&#8217;t tampering with the individual components that get sold to organizations who, in turn, sell to government agencies.<\/p>\n<p>As the report notes, this comes as the government has slapped bans on Chinese electronics vendors over fears that those companies were working a bit too closely with the government of their home country.<\/p>\n<h3 class=\"crosshead\"><span>More industrial controllers left wide open to attacks<\/span><\/h3>\n<p>A team of researchers with Positive Technologies have <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.ptsecurity.com\/ww-en\/about\/news\/294214\/\">disclosed<\/a> a set of four exploitable security flaws in programmable logic controllers (PLCs) made by Schneider Electronics and sold to heavy industries such as power plants, water departments, and oil refineries.<\/p>\n<p>The four vulnerabilities would allow for things like authentication bypass, arbitrary code execution from web servers, and denial of service attacks. The flaws were disclosed in March, but are only now being detailed by Positive.<\/p>\n<p>According to the researchers, the flaws would not be particularly difficult for an attacker to exploit, and could be used as a gateway to larger attacks, or just to cause general chaos at the targeted facility.<\/p>\n<p>There is one saving grace here: the industrial controllers in question are all in the range of 20 years old. It&#8217;s not unheard of for embedded tech to stay in the field that long, but any device containing these bugs could probably do with a replacement, or at least a good update that includes new security protections.<\/p>\n<h3 class=\"crosshead\"><span>Fortnite bribes kids to turn on 2FA<\/span><\/h3>\n<p>Runaway hit build&#8217;n&#8217;shoot game Fortnite has found a novel way to get players to make their accounts more secure. Developer Epic Games <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.epicgames.com\/fortnite\/en-US\/news\/2fa\">says that<\/a> players who turn on two-factor authentication for their accounts will get access to a new dance move.<\/p>\n<p>Adding the option for a verification code on your account now lets players perform an emote called &#8220;boogiedown&#8221; that, as its name implies, involves\u2026 erm\u2026 boogying down.<\/p>\n<p><em>El Reg<\/em> ran this by one of our Fortnite playing Vultures and, apparently, yes, an in-game dance move is something that the yoofs these days value enough to go through the hassle of two-factor login. Good work, Epic.<\/p>\n<p>Speaking of Fortnite, Googlers have discovered that the game&#8217;s Android app \u2013 which famously <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/08\/03\/fortnite_security_fears\/\">sidestepped<\/a> Google&#8217;s official Play Store \u2013 <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/issuetracker.google.com\/issues\/112630336\">can be hijacked by malicious software<\/a> on a device to install further dodgy code.<\/p>\n<h3 class=\"crosshead\"><span>Darkness Falls on darknet drug-pushers<\/span><\/h3>\n<p>The FBI <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.justice.gov\/opa\/pr\/operation-darkness-falls-results-arrest-one-most-prolific-dark-net-fentanyl-vendors-world\">says it has nabbed<\/a> a suspected dealer as part of a dark-web market takedown.<\/p>\n<p>This time, it&#8217;s a Cleveland-based person they say was the largest online fentanyl dealer in the US, and the fourth-largest in the world. The alleged dealer, going by the handle MH4Life, was actually couple Matthew and Holley Roberts, both 35, it is claimed.<\/p>\n<p>The pair were charged with using accounts on Silk Road, Dream Market, Aplhabay, and others to deal drugs from 2011 to 2018. The arrest was the headline of the FBI&#8217;s Operation Darkness Falls, a drug takedown focusing on dark net dealers.<\/p>\n<h3 class=\"crosshead\"><span>OpenSSH clears up &#8216;enumeration&#8217; bug<\/span><\/h3>\n<p>The OpenSSH project has patched a vulnerability that could potentially allow an attacker to, without any authentication, work out the usernames of user accounts on a server.<\/p>\n<p>The flaw, designated CVE-2018-15473, is an information-disclosure bug stemming from the way OpenSSH servers handle failures during login attempts. If you break a connection between a client and a server in a particular way while attempting a login, the response from the server differs depending on whether you were attempting to login as a user that exists in the system, or an unknown username. Thus, an attacker could in theory work their way through all the possible usernames on a system, keeping a note of the ones that exist. This information can be leveraged to pull off other attacks, social engineering tricks, and so on.<\/p>\n<p>It&#8217;s not exactly a critical bug, and OpenSSH decided to quietly patch it without making a big deal out of the whole thing.<\/p>\n<p>&#8220;We have and will continue to fix bugs like this when we are made aware of them and when the costs of doing so aren&#8217;t too high,&#8221; <a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.openwall.com\/lists\/oss-security\/2018\/08\/24\/1\">explained<\/a> developer Damien Miller, &#8220;but we aren&#8217;t going to get excited about them enough to apply for CVEs or do security releases to fix them.&#8221;<\/p>\n<h3 class=\"crosshead\"><span>And finally&#8230;<\/span><\/h3>\n<p>Sales terminals in some Cheddar\u2019s Scratch Kitchen restaurants may well have been <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/investor.darden.com\/investors\/press-releases\/press-release-details\/2018\/Notice-of-Unauthorized-Access-to-Cheddars-Scratch-Kitchen-Guest-Data\/default.aspx\">hacked<\/a> in 23 US states to steal payment card information between November 3, 2017, and January 2, 2018. A technique to steal crypto-keys from electromagnetic radiation from a very nearby device <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.usenix.org\/system\/files\/conference\/usenixsecurity18\/sec18-alam.pdf\">has been detailed here<\/a>. The described attack targeted OpenSSL, which was patched in May to thwart the snooping. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1787\/-6625\/following-bottomlines-journey-to-the-hybrid-cloud?td=wptl1787\">Following Bottomline\u2019s journey to the Hybrid Cloud<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2018\/08\/27\/security_roundup\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Plus: Feds break up another &#8216;dark-net drugs op&#8217; Roundup\u00a0 Summer rolls on, Reg vultures are making the most of their hols before the September rush hits, and in the past week, we saw Lazarus malware targeting Macs, Adobe scrambling to get an emergency patch out, and Democrats losing their minds over a simple training exercise.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":10834,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-10833","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Voting machine maker vows to step up security, Fortnite bribes players to do 2FA \u2013 and more 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Voting machine maker vows to step up security, Fortnite bribes players to do 2FA \u2013 and more 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-27T10:46:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"794\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Voting machine maker vows to step up security, Fortnite bribes players to do 2FA \u2013 and more\",\"datePublished\":\"2018-08-27T10:46:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more\\\/\"},\"wordCount\":1300,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more\\\/\",\"name\":\"Voting machine maker vows to step up security, Fortnite bribes players to do 2FA \u2013 and more 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more.jpg\",\"datePublished\":\"2018-08-27T10:46:38+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more.jpg\",\"width\":1200,\"height\":794},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Voting machine maker vows to step up security, Fortnite bribes players to do 2FA \u2013 and more\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Voting machine maker vows to step up security, Fortnite bribes players to do 2FA \u2013 and more 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more\/","og_locale":"en_US","og_type":"article","og_title":"Voting machine maker vows to step up security, Fortnite bribes players to do 2FA \u2013 and more 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-08-27T10:46:38+00:00","og_image":[{"width":1200,"height":794,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Voting machine maker vows to step up security, Fortnite bribes players to do 2FA \u2013 and more","datePublished":"2018-08-27T10:46:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more\/"},"wordCount":1300,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more\/","url":"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more\/","name":"Voting machine maker vows to step up security, Fortnite bribes players to do 2FA \u2013 and more 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more.jpg","datePublished":"2018-08-27T10:46:38+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more.jpg","width":1200,"height":794},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/voting-machine-maker-vows-to-step-up-security-fortnite-bribes-players-to-do-2fa-and-more\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Voting machine maker vows to step up security, Fortnite bribes players to do 2FA \u2013 and more"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/10833","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=10833"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/10833\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/10834"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=10833"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=10833"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=10833"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}