Election Fraud, an Open Secret for Years

While the national media decries, ‘wide-spread voter fraud,’ and presses the issue that President Trump is a sore loser and former Vice-president Biden is the President-elect, only six places: Clark County, NV, Maricopa County, AZ, Milwaukee, Detroit, Atlanta, and Philadelphia, were actually targeted for election fraud on Nov. 3, 2020.

Setting that aside, documentation shows how Dominion provided administrators with privileges that include bypassing security measures; affidavits describing voters’ and workers’ experiences, and statistical data like strings of thousands of sequential Biden votes occurring with quadrillion-to-1 improbability, ballot processing velocity spikes that are physically impossible for the equipment and that coincide with windows of intimidation/interference with observers. Also there is the fact that in each of several swing states Biden achieved a come-from-behind victory with a margin in the tens-of-thousands of votes.

Further, Dominion’s network attached storage (NAS) servers are knowingly infected with QSnatch malware, which allows for the misappropriation of an administrator’s credentials once they’ve logged-in. So, not only can administrators override, with no audit trail, election security in a precinct, so can anyone who steals those credentials.

And if this weren’t enough, Dominion sends out software patches that continuously and deliberately allows QSnatch to beat their patches. This according to an article published by several business technology news sites in July 2020.

The United States Cybersecurity and Infrastructure Security Agency (CISA) posted alerts in July that attacks using the QSnatch malware, also tracked under the name of Derek, had been traced back to 2014. The alert goes on to say that these attacks had intensified between Oct. 2019 and mid-June 2020, while the number of reported infections grew to about 7,600 devices.

This may be the deeper reason why Christopher Krebs, the agency’s first director, was fired in November.

QSnatch comes with a CGI password logger, which installs a fake version of the device admin login page, logging successful authentications and passing them to the legitimate login page; a Credential scraper; an SSH backdoor, allowing for the input of arbitrary code; Exfiltration, that steals files, including system configurations and log files, which are encrypted with the attackers public key, then sent to the attacker’s infrastructure over HTTPS; and a web shell functionality for remote access. Once the attacker gains a foothold, the QSnatch malware is injected into the NAS firmware and takes full control of the device, blocking future updates to the firmware, including patching the infection.

These were all ‘knowns,’ but never properly addressed.

Comments

Leave a comment