
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Thu, 16 Apr 2026 21:25:12 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Exploring Internet traffic shifts and cyber attacks during the 2024 US election]]></title>
            <link>https://blog.cloudflare.com/exploring-internet-traffic-shifts-and-cyber-attacks-during-the-2024-us-election/</link>
            <pubDate>Wed, 06 Nov 2024 08:00:00 GMT</pubDate>
            <description><![CDATA[ Election Day 2024 in the US saw a surge in cyber activity. Cloudflare blocked several DDoS attacks on political and election sites, ensuring no impact. In this post, we analyze these attacks, as well ]]></description>
            <content:encoded><![CDATA[ <p>Elections are not just a matter of casting ballots. They depend on citizens being able to register to vote and accessing information about candidates and the election process, which in turn depend on the strength and security of the Internet. Despite the risks posed by potential cyberattacks aimed to disrupt democracy, Cloudflare did not observe any significant disruptions to campaigns or local government websites from cyberattack.</p><p>Tuesday, November 5, 2024 was <a href="https://en.wikipedia.org/wiki/2024_United_States_presidential_election"><u>Election Day in the United States</u></a>. It not only decided the next president and vice president but also included elections for the US Senate, House of Representatives, state governorships, and state legislatures. Results confirm that Republican Donald Trump won the presidential election.</p><p>In this blog post, we examine online attacks against election-related sites — some of which were notable but none were disruptive — and how initial election results impacted Internet traffic across the US at both national and state levels, with increases in traffic as much as 15% nationwide. We’ll also explore email phishing trends and general DNS data around news interest, the candidates, and election-related activity.</p><p>We’ve been tracking 2024 elections globally through our <a href="https://blog.cloudflare.com/tag/election-security/"><u>blog</u></a> and <a href="https://radar.cloudflare.com/reports/elections-2024"><u>election report on Cloudflare Radar</u></a>, covering some of the more than 60 national elections around the globe this year. At Cloudflare, we support many of these efforts to ensure a secure and trustworthy election process. We worked closely with election officials, government agencies, and civil society groups across the country to ensure that groups working in the election space had the tools they needed to stay online. </p><p>Regarding the US elections, we have previously reported on trends surrounding the first <a href="https://blog.cloudflare.com/how-the-first-2024-us-presidential-debate-influenced-internet-traffic-and-security-trends"><u>Biden vs. Trump debate</u></a>, the <a href="https://blog.cloudflare.com/exploring-internet-traffic-during-the-2024-us-republican-national-convention"><u>attempted assassination of Trump and the Republican National Convention</u></a>, the <a href="https://blog.cloudflare.com/internet-security-trends-2024-us-democratic-convention"><u>Democratic National Convention</u></a>, and the <a href="https://blog.cloudflare.com/how-the-harris-trump-us-presidential-debate-influenced-internet-traffic"><u>Harris-Trump presidential debate</u></a>.</p><p>Key takeaways:</p><ul><li><p>In the 24 hour period from October 31 - November 1, Cloudflare automatically mitigated over 6 billion HTTP DDoS requests that targeted US election-related websites–such as state and local government election sites and political campaigns. There were no significant disruptions to the targeted websites during this time period.</p></li><li><p>The day before the election, DNS traffic to Trump/Republican and Harris/Democrat websites peaked, with daily DNS traffic rising 59% and 4% respectively.</p></li><li><p>On election day, states in the midwest saw the highest traffic growth across the US, as compared to the previous week. </p></li><li><p>Internet traffic in the US peaked after the first polling stations closed, with a 15% increase over the previous week. </p></li><li><p>DNS traffic to news, polling, and election websites also saw large traffic jumps. Polling services were up 756% near poll closures and news sites were up 325% by late evening.</p></li></ul>
    <div>
      <h2>How Cloudflare assists with election infrastructure </h2>
      <a href="#how-cloudflare-assists-with-election-infrastructure">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3tqSzKOhzUbLTgnwfP4cIU/8a433526fab8fbebf0aa3ae8633e78dc/BLOG-2618_2.png" />
          </figure><p>Cloudflare’s goal is to ensure that sites that enable democracy — such as voter registration sites, election information portals, campaign websites, and results reporting platforms — remain secure and accessible, especially under heavy traffic periods or cyberattacks. Through our Impact programs, we provide essential cybersecurity resources to more than 800 websites that work on election infrastructure. </p><ul><li><p><a href="https://www.cloudflare.com/galileo/"><b><u>Project Galileo</u></b></a><b>:</b> Launched in 2014, Project Galileo provides free Business level services to media organizations, human rights defenders and non-profit organizations around the world. We protect more than 65 Internet properties related to elections in the United States that work on a range of topics related to voting rights, promoting free and fair elections, and posting election results. These organizations include <a href="https://www.cloudflare.com/case-studies/voteamerica/"><u>Vote America</u></a>, <a href="https://www.cloudflare.com/case-studies/decision-desk-hq/"><u>Decision Desk HQ</u></a>, <a href="https://www.cloudflare.com/case-studies/us-vote-foundation/"><u>US Vote Foundation</u></a>, and <a href="https://www.cloudflare.com/case-studies/us-vote-foundation/"><u>Electionland</u></a>.</p></li><li><p><a href="https://www.cloudflare.com/athenian/"><b><u>Athenian Project</u></b></a><b>: </b>Launched in 2017, the Athenian Project provides state and local governments that run elections with free Enterprise level services to ensure that voters can access accurate and up-to-date information about voter registration, polling places, and election results without interruption. We currently protect 423 websites in 33 states under the project.</p></li><li><p><a href="https://www.cloudflare.com/campaigns/usa/"><b><u>Cloudflare for Campaigns</u></b></a><b>:</b> Launched in 2020, in partnership with <a href="https://defendcampaigns.org/"><u>Defending Digital Campaigns</u></a>, Cloudflare for Campaigns provides a package of products to address the increasing risks posed by cyberattacks on political campaigns and state parties. We currently protect more than 354 campaigns and 34 state-level political parties in the United States. </p></li></ul><p>Since 2020, we’ve strengthened our partnerships with election officials, government agencies, and nonprofits to provide essential protections. Throughout 2024, we’ve collaborated with <a href="https://www.cisa.gov/"><u>CISA</u></a> (Cybersecurity and Infrastructure Security Agency) and the <a href="https://www.cisa.gov/topics/partnerships-and-collaboration/joint-cyber-defense-collaborative"><u>Joint Cyber Defense Collaborative</u></a>, briefing over 300 election officials on emerging threats and conducting 50+ calls with state and local governments to review security practices. Additionally, we held webinars on cyber threats to election groups and strategies for protecting election infrastructure.</p><p>With Defending Digital Campaigns, we worked to onboard more than 90 campaigns and parties weeks before election day. As part of this, we also worked with political vendors managing campaign infrastructure to provide insight on emerging threats and how to mitigate. Under Project Galileo, we onboarded more than 60 local media and journalism sites reporting on elections to ensure they can provide timely, accurate information on voting processes, candidate platforms, and election results.</p>
    <div>
      <h2>Political and election-related cyber attacks </h2>
      <a href="#political-and-election-related-cyber-attacks">
        
      </a>
    </div>
    <p>As we've seen several times this year, specific DDoS (<a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/"><u>Distributed Denial of Service</u></a>) attacks often target political party or candidate websites around election day. While online attacks are frequent and not always election-related, we saw recent DDoS incidents in <a href="https://blog.cloudflare.com/first-round-of-french-election-2024-party-attacks-and-a-modest-traffic-dip"><u>France</u></a>, the <a href="https://blog.cloudflare.com/dutch-political-websites-hit-by-cyber-attacks-as-eu-voting-starts"><u>Netherlands</u></a>, and <a href="https://blog.cloudflare.com/uk-election-day-2024-traffic-trends-and-attacks-on-political-parties"><u>the U.K.</u></a> focused on political parties during election periods. </p><p>In the US, we saw a similar uptick in attacks immediately prior to the election. Cloudflare blocked  cyberattacks targeting websites affiliated with both parties, attempting to take the sites offline. Although some attacks had high volumes of traffic, the targeted websites remained online.</p><p>DDoS attacks targeting US political or elections-related Internet properties in particular clearly picked up starting in September, with the more than 6 billion HTTP DDoS requests seen during the first six days of November exceeding the volume seen during all of September and October.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3hYmLIj3qjBvrUxtasPJwy/e247cfbd6c546a52025bbefbfe37d503/BLOG-2618_3.png" />
          </figure><p> </p><p>Some campaign websites drove most of the malicious HTTP request traffic as part of DDoS attacks, with a clear increase since October 1, compared to minimal DDoS activity earlier in 2024. </p><p>Let’s look at a few examples of specific DDoS attacks, as these are easier to track.</p>
    <div>
      <h3>High-profile campaign website, October 29 - November 6 </h3>
      <a href="#high-profile-campaign-website-october-29-november-6">
        
      </a>
    </div>
    <p>Cloudflare blocked a series of DDoS attacks targeting a high-profile campaign website. The attacks began on October 29, with a four-minute spike reaching 345,000 requests per second. On October 31, more intense attacks followed, with the first lasting over an hour, peaking at 213,000 requests per second. Hours later, on November 1, a larger attack reached 700,000 requests per second, followed by two more waves at 311,000 and 205,000 requests per second.</p><p>Over 16 hours, Cloudflare blocked more than 6 billion malicious HTTP requests between October 31 and November 1. Additional attacks continued on November 3, with peaks at 200,000 requests per second (rps); on November 4, at 352,000; on Election Day, November 5, at 271,000 around 14:33 ET (11:33 PT); and on November 6, at 108,000.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7a7BGcwhBRbIppTPwGeMEM/70a460bbb3a37db416bf991324f79773/BLOG-2618_4.png" />
          </figure><p>Our data shows that the attacker(s) randomized user agents, attempted cache-busting techniques (methods to bypass cached content and overload servers with unique requests), and employed a geodiverse approach.</p><p>The DDoS attack on November 1 reached peak bandwidth of over 16 Gbps sent to Cloudflare and maintained over 8 Gbps throughout the main attack, which lasted more than two hours.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2WVwTuYycGskegN4Bj6GyC/e0d0a39516f2097fa98e1c6d9771244f/BLOG-2618_5.png" />
          </figure>
    <div>
      <h3>US campaign infrastructure website, November 3</h3>
      <a href="#us-campaign-infrastructure-website-november-3">
        
      </a>
    </div>
    <p>Attackers also expanded their attacks beyond campaign sites, to political parties and their infrastructure, attempting — unsuccessfully — to disrupt services.  For example, on November 3, 2024, a DDoS attack targeted infrastructure associated with a major campaign, lasting two minutes and reaching 260,000 malicious HTTP requests per second. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5QEogge3prSiTXFHHV9SZx/752b1ffda3d559c577c0fc8110bb00d7/BLOG-2618_7.png" />
          </figure>
    <div>
      <h3>US state political party, October 29</h3>
      <a href="#us-state-political-party-october-29">
        
      </a>
    </div>
    <p>On October 29, 2024, a high-volume DDoS attack targeted a U.S. political party website from a specific state. The attack lasted over four hours, from 12:00 to 17:29 ET (09:00 to 14:29 PT), and peaked at 206,000 requests per second. In total, over 2 billion malicious HTTP requests were blocked that day as part of this DDoS attack.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5zE45tcuR8ejFHGdNddc7L/ed8093200c0a1a571a2f8f665dc9edd6/BLOG-2618_8.png" />
          </figure><p>The same method used in the November 1 attack on one of the main campaign websites, mentioned above, was also used in this case. Here, the DDoS attack reached a peak of 5.7 Gbps sent to Cloudflare by the attacker, and sustained over 3 Gbps for most of its four-and-a-half-hour duration.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2v9kxcUtFVGQFwzJU6XkOp/390188c9f24fda8b89cbf020d4d89d87/BLOG-2618_9.png" />
          </figure>
    <div>
      <h3>US counties as a target, September 13</h3>
      <a href="#us-counties-as-a-target-september-13">
        
      </a>
    </div>
    <p>Since September, US state and local websites protected by Cloudflare under the Athenian Project have experienced increased DDoS attacks, particularly targeting specific counties. These types of sites have seen over 290 million malicious HTTP requests since September 1, with 4% of all requests blocked as threats. These attacks were less frequent and intense than those on US political campaigns infrastructure. </p><p>On September 13, 2024, a DDoS attack targeted a county website from 19:29 UTC to 22:32 UTC (15:29 to 18:32 ET), lasting three hours and peaking at 46,000 of malicious HTTP requests per second.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/8S5AmvI1llskUuUiZ3JvR/6cb636695b8682170bd8e2f1f7bece7b/BLOG-2618_10.png" />
          </figure><p>These rates of DDoS attacks are already significant, even more so when we compare it with the 2020 US presidential election. In 2020, we <a href="https://blog.cloudflare.com/2020-us-election-cybersecurity-analysis/"><u>saw</u></a> more varied blocked cyberattack HTTP requests, split between WAF (Web Application Firewall) and firewall rules, and DDoS attacks. There were also significantly fewer blocked requests related to DDoS and WAF, with nearly 100 million in the whole month of October 2020 and close to 25 million in November 2020, the month of the election. In contrast, during November 1-6, 2024, alone, we observed over 6 billion malicious HTTP requests in DDoS attacks targeting campaigns.</p><p>It’s also important to note that even smaller attacks can be devastating for websites not well-protected against such high levels of traffic. DDoS attacks not only overwhelm systems but also serve, if successful, as a <a href="https://cloudflare.tv/shows/this-week-in-net/d-do-s-report-certificate-changes-qr-phishing-and-more/oZK6nra4"><u>distraction for IT teams</u></a> while attackers attempt other types of breaches.</p>
    <div>
      <h2>Internet traffic in the US grows after polls closed</h2>
      <a href="#internet-traffic-in-the-us-grows-after-polls-closed">
        
      </a>
    </div>
    <p>Generally, <a href="https://blog.cloudflare.com/tag/election-security"><u>election days</u></a> do not lead to drastic changes in Internet traffic. Traffic usually slightly dips during voting hours, though not as sharply as on national holidays, and rises in the evening as results are announced. </p><p>In the US, a similar pattern was observed on November 5, 2024, with increased Internet traffic at night. However, traffic throughout the day was generally 6% higher than the previous week, starting as early as 09:15 ET (06:15 PT). This may also be because, unlike in other countries, Election Day in the US is on a weekday rather than a weekend and is not a national holiday. Internet traffic peaked after the first polls closed, around 21:15 ET (18:15 PT), as TV news stations displayed countdown clocks. At that moment, traffic was 15% higher than the previous week.</p><p><i>Note: The previous 7 days line that appears in the next chart is one hour behind due to the Daylight Saving Time change over the weekend in the US. All growth calculations in this post take that change into account.</i></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4gShhxZxAddFNz0pBRHR0s/ecb6986c4665410f55988b2045d2362c/BLOG-2618_11.png" />
          </figure><p>The biggest spike in traffic growth (compared to the previous week) of Election Day occurred at around 01:30 am ET (22:30 PT), when <a href="https://x.com/PpollingNumbers/status/1854046880574980484"><u>projections</u></a> began to favor Trump for the presidential victory and <a href="https://x.com/FoxNews/status/1854046899155660983"><u>Fox News</u></a> called Pennsylvania in his favor, with traffic rising 32% compared to the previous week. Later, during Donald Trump's speech between 02:30 and 02:45 am ET (23:30 and 23:45 PT), Internet traffic was 31% higher than the previous week. </p><p>On Election Day, daily Internet traffic in the US reached its highest level of 2024 in terms of requests, showing a 6% increase compared to the previous week.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7bTq4tRaszFIMNXTLwgWPw/6aa76a2986bb474a042fc72c6188bc53/BLOG-2618_12.png" />
          </figure><p>As expected for a typical election day, considering what we observed in other countries, the share of traffic from mobile devices was also slightly higher on Election Day at 43%, compared to 42% the previous week.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5kKIYDj8eglPtj0zffHXOA/76c7367b1e7af4abe2f74b712834fb00/BLOG-2618_13.png" />
          </figure>
    <div>
      <h3>State-level traffic growth peaks at 21:00 ET (18:00 PT) </h3>
      <a href="#state-level-traffic-growth-peaks-at-21-00-et-18-00-pt">
        
      </a>
    </div>
    <p>State-level traffic shifts on Election Day, compared to the previous week, reveal more detail than country-level data. The map below highlights the biggest traffic changes, peaking at 21:00 ET (18:00 PT) after polling stations began to close. Notably, traffic increased nationwide and at the state level on Election Day, unlike during the two-hour presidential debates, which were broadcast on nationwide TV.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5GyyxpTCD4ADVIk21R2pOQ/03ea8617b81cd317d14afa17cdd680e1/BLOG-2618_14.png" />
          </figure><p>The most significant traffic increases were observed in Maine (44%), South Dakota (44%), and Montana (44%). Interestingly, central states saw higher percentages of Internet traffic growth than coastal ones. More populous states, such as California (8%), Texas (19%), New York (22%), and Florida (23%), also experienced notable traffic increases.</p><p>The seven swing states that are <a href="https://www.bbc.com/news/articles/c511pyn3xw3o"><u>considered</u></a> to have been decisive in the election — Georgia, Michigan, Nevada, North Carolina, Pennsylvania, and Wisconsin (we’re not considering Arizona due to data issues) — each saw traffic growth between 17% and 36%. Here’s a more focused view of those swing states for easier consumption:</p><table><tr><td><p><b>State</b></p></td><td><p><b>Growth in traffic</b></p></td><td><p><b>Local time 
(in each state)</b></p></td></tr><tr><td><p>Georgia</p></td><td><p>25%</p></td><td><p>21:15</p></td></tr><tr><td><p>Michigan</p></td><td><p>34%</p></td><td><p>21:15</p></td></tr><tr><td><p>Nevada</p></td><td><p>17%</p></td><td><p>18:15</p></td></tr><tr><td><p>North Carolina</p></td><td><p>14%</p></td><td><p>21:15</p></td></tr><tr><td><p>Pennsylvania</p></td><td><p>33%</p></td><td><p>21:15</p></td></tr><tr><td><p>Wisconsin</p></td><td><p>36%</p></td><td><p>20:15</p></td></tr></table>
    <div>
      <h2>DNS trends: from news outlets to polling services</h2>
      <a href="#dns-trends-from-news-outlets-to-polling-services">
        
      </a>
    </div>
    <p>Switching our focus to domain trends, our <a href="http://1.1.1.1/"><u>1.1.1.1</u></a> resolver DNS data reveals a clear impact during the US elections when analyzing specific categories.</p><p>Analysis of DNS traffic for <b>US news media outlets</b> shows that traffic from the United States rose significantly right after 09:00 ET (06:00 PT), increasing around 15%, compared to the previous week. Traffic continued to climb throughout the day, peaking between 22:00 and 23:00 ET (19:00 and 20:00 PT) with DNS request traffic volume 325% higher than the previous week. There was also a brief spike on Wednesday, November 6, at 05:00 ET (02:00 PT), showing a 117% increase.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3eoBJOHz37gSZYFdbuapSY/c5fe40345d841ebb5ed69ed4c7f67a8a/BLOG-2618_15.png" />
          </figure><p>We observed significantly higher DNS traffic for <b>polling services </b>websites — websites of platforms or organizations that conduct and publish polls — on Election Day, peaking at 13:00 ET (10:00 PT) with a 206% increase from the previous week, and again at 22:00 ET (19:00 PT), after the polls started to close, with a 756% increase. Daily traffic to this category was up 145% on Election Day, and 36% the day prior.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1IOBseQF9hWO2vLGCUOu2A/b6f0b628b23ea1d82f1d98667706ab00/BLOG-2618_16.png" />
          </figure><p><b>Election and voting information-related </b>websites also saw a notable rise in DNS traffic around Election Day. Traffic clearly began to increase the day before the election, and peaked on November 5, 2024, at 12:00 ET (09:00 PT), with a 313% increase from the previous week. Daily traffic was 139% higher on Election Day, and 68% higher the day before.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7gXUO3FvfuPf9QvUrJ7C7a/c2eaf29a518306b2f783ecd1847edae9/BLOG-2618_17.png" />
          </figure><p>Social media sites/applications, especially <b>microblogging platforms</b> like X and Threads, were also impacted during Election Day. DNS traffic for these microblogging platforms peaked at 22:00 ET (19:00 PT), aligning with spikes for news organizations and polling services, showing a 91% increase compared to the previous week. In this microblogging category, daily DNS traffic on Election Day rose by 12% from the previous week.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2LUkx7e6abYPbqWH9vpXs1/bd9da044ebafafffa22d22fbf26e34f3/BLOG-2618_18.png" />
          </figure><p>Regarding the two main presidential candidates, DNS traffic for their websites and their parties’ websites was much higher the day before the election than on Election Day. On November 4, 2024, daily DNS traffic to <b>Trump and Republican</b> websites was up 59% compared to the previous week, while traffic to <b>Harris and Democrat</b> websites, which had a more significant increase in DNS traffic the previous week, rose by 4%. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3jZy22GPey40FDg3gxjBg1/a99412b55d6b032117051d6f3f1f38f3/BLOG-2618_19.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2sDIbWHfRmyt0vqifwl72F/4f61cf9c1d5186cde5e611ec2f9a3028/BLOG-2618_20.png" />
          </figure>
    <div>
      <h2>Candidate-related email phishing trends</h2>
      <a href="#candidate-related-email-phishing-trends">
        
      </a>
    </div>
    <p>From a cybersecurity perspective, trending <a href="https://blog.cloudflare.com/paris-2024-olympics-recap"><u>events</u></a>, topics, and individuals often attract more emails, including malicious, phishing, and spam messages. Our <a href="https://blog.cloudflare.com/how-the-first-2024-us-presidential-debate-influenced-internet-traffic-and-security-trends"><u>earlier</u></a> analysis covered email trends involving “Joe Biden” and “Donald Trump” since January. We’ve since updated it to include Kamala Harris after the <a href="https://blog.cloudflare.com/internet-security-trends-2024-us-democratic-convention/"><u>Democratic Convention</u></a> and the <a href="https://blog.cloudflare.com/how-the-harris-trump-us-presidential-debate-influenced-internet-traffic/"><u>Harris-Trump debate</u></a>.</p><p>From June 1 through November 4, 2024, <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Cloudflare’s Cloud Email Security</u></a> service processed over 19 million emails with “Donald Trump” or “Kamala Harris” in the subject line — 13.9 million for Trump and 5.3 million for Harris. Nearly half of these emails (49%) were sent since September. In the last 10 days of the campaign (since October 24), Harris was named in 800,000 email subject lines and Trump in 1.3 million.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/21O0KXy0aKPf5zX8KI186y/60c89b6c9d0cedc8f2791943fc50f2ff/BLOG-2618_21.png" />
          </figure><p>Since June 1, 12% of emails mentioning Trump were marked as spam, and 1.3% were flagged as malicious or phishing. This rate has dropped since September 1, with only 3% marked as spam and 0.3% as malicious. For emails mentioning Harris, the rates were lower: 0.6% were marked as spam and 0.2% as malicious since June, increasing slightly to 1.2% spam and 0.2% malicious since September 1. Trump was mentioned more frequently in email subjects than Harris and was found in higher overall percentages of spam and malicious emails.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3MeF2avFWsQhJiq1emyBtr/2e9f3b785c1bed52394b52f720f8c84b/BLOG-2618_22.png" />
          </figure>
    <div>
      <h2>Conclusion: keeping track of elections</h2>
      <a href="#conclusion-keeping-track-of-elections">
        
      </a>
    </div>
    <p>Although Cloudflare observed a notable increase in DDoS attacks on political and election-related sites, blocking billions of malicious requests, these attacks resulted in no significant disruption due to planning and proactive defenses. We share the Cybersecurity and Infrastructure Security Agency’s <a href="https://www.cisa.gov/news-events/news/statement-cisa-director-easterly-security-2024-elections"><u>view</u></a> that “our election infrastructure has never been more secure” and concur with their conclusion that  “We have no evidence of any malicious activity that had a material impact on the security or integrity of our election infrastructure." Keeping our elections secure and resilient is critical to the functioning of democracy, and Cloudflare is proud to have played our part. </p><p>If you want to follow more trends and insights about the Internet and elections in particular, you can check <a href="https://radar.cloudflare.com/"><u>Cloudflare Radar</u></a>, and more specifically our new <a href="https://radar.cloudflare.com/reports/elections-2024"><u>2024 Elections Insights</u></a> report, which will be updated as elections take place throughout the year.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Elections]]></category>
            <category><![CDATA[Athenian Project]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Cloudflare for Campaigns]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Election Security]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">1YyA4YHY9p5HoeHCrgO3L5</guid>
            <dc:creator>João Tomé</dc:creator>
            <dc:creator>Jocelyn Woolbright</dc:creator>
        </item>
        <item>
            <title><![CDATA[Election Cybersecurity: Protecting the 2020 U.S. Elections.]]></title>
            <link>https://blog.cloudflare.com/election-cybersecurity-preparing-for-the-2020-u-s-elections/</link>
            <pubDate>Mon, 17 Aug 2020 12:30:00 GMT</pubDate>
            <description><![CDATA[ At Cloudflare, we believe that expanding access to tools that election officials and political candidates need to combat a range of online threats both serves our mission to help build a better Internet and strengthens our democracy. ]]></description>
            <content:encoded><![CDATA[ <p>At Cloudflare, our mission is to help build a better Internet. As we look to the upcoming 2020 U.S. elections, we are reminded that having the Internet be trusted, secure, reliable, and accessible for campaigns and citizens alike is critical to our democracy. We rely on the Internet to share and discover pertinent information such as how to register to vote, find polling locations, or learn more about candidates.</p><p>Due to the spread of COVID-19, we are seeing a number of election environments shift online, to varying degrees, with political parties conducting virtual fundraisers, campaigns moving town halls to online platforms and election officials using online forms to facilitate voting by mail. As the 2020 U.S. elections approach, we want to ensure that players in the election space have the tools they need to stay online to promote trust and confidence in the democratic system.</p><p>We’re keeping an eye on how this shift to online activities affect cyberattacks. From April to June 2020, for example, we saw a <a href="/network-layer-ddos-attack-trends-for-q2-2020/">trend</a> of increasing DDoS attacks, with double the amount of L3/4 attacks observed over our network compared to the first three months of 2020. In the election space, we are tracking trends and vulnerabilities to better understand the threats against these critical players. Our goal is to use the information to create best practices for election and campaign officials so they can be better prepared for the upcoming elections.</p><p><b>Key Takeaways:</b></p><ul><li><p>When comparing types of attacks against campaigns and government election sites, we saw the exact inverse type of attacks with political campaigns experiencing more DDoS attacks while government sites experiencing more attempts to exploit security vulnerabilities.</p></li><li><p>On average, state and local government election sites experience 122,475 cyber threats per day with an average of 199 SQL injection attempts per day.</p></li><li><p>On average, political campaigns experience 4,949 cyber threats per day, although larger campaigns may see far more.</p></li></ul>
    <div>
      <h3>The Athenian Project &amp; Cloudflare for Campaigns Participants</h3>
      <a href="#the-athenian-project-cloudflare-for-campaigns-participants">
        
      </a>
    </div>
    <p>Since 2020, the number of domains under the Athenian Project has increased by 48 percent, to 229 state and local government election websites in 28 states receiving our security protections. Cloudflare also protects many political campaigns at all levels on a wide range of plans. Under <a href="/introducing-cloudflare-for-campaigns/">Cloudflare for Campaigns,</a> an initiative we launched in January 2020 to provide a free package of security protections to political campaigns with our partnership with <a href="https://www.defendcampaigns.org/">Defending Digital Campaigns</a>, we protect more than 50 political campaigns from candidates in 27 states.</p>
    <div>
      <h3>Significant traffic spikes and probing for vulnerabilities to government election websites</h3>
      <a href="#significant-traffic-spikes-and-probing-for-vulnerabilities-to-government-election-websites">
        
      </a>
    </div>
    <p>For state and local governments, election night and the days leading up that day are typically the most important days of the year. With constituents accessing voter information such as voting and polling stations, election officials expect higher amounts of traffic to their website. Over the last few months, we’ve seen this shift at Cloudflare, with noticeable increases in traffic ranging from 2 to 3 times the volume of requests to many of these government election websites. We believe there are a wide range of factors for traffic spikes including, but not limited to, states expanding vote-by-mail initiatives and voter registration <a href="https://thehill.com/homenews/state-watch/501577-heres-where-your-state-stands-on-mail-in-voting">deadlines</a> due to emergency orders by 53 states and territories throughout the United States. In March, more than 23 states conducted presidential primaries including 14 states on Super Tuesday, the most states on a single day to host primary elections.</p><p>At this year's DEF CON Voting Village, experts from the Department of Homeland Security <a href="https://www.politico.com/newsletters/weekly-cybersecurity/2020/08/10/looking-back-at-a-landmark-law-on-government-it-modernization-789782">identified</a> routine failure due to abnormally high demand as the largest risk to election systems because of the coronavirus pandemic. We have seen this in full effect, with traffic to election websites being unpredictable, and including unexplained spikes outside of election cycles, per the graph below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4gm6Qv21tg5xhRwAjrzawp/a517449aa57ddc203d514bdba63070e1/image1-7.png" />
            
            </figure><p>To help state and local governments under the Athenian Project prepare for elections, we wanted to identify the types of threats that election websites face and how to better protect their website from malicious attacks. Since the beginning of this year, we’ve seen a large number of attempts to exploit security vulnerabilities that were mitigated by the <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">web application firewall (WAF)</a>, with 90 million threats blocked in March 2020, for example. Cloudflare’s WAF uses managed rulesets to offer a wide range of protection against known vulnerabilities and suspicious behavior and custom firewall rules to allow users to rapidly identify and adapt to the evolving threat landscape. Of the threats we identified, managed rulesets helped mitigate 51% of threats and custom firewall rules mitigated an additional 35% of threats. Having both managed rulesets and custom firewall rules therefore helps safeguard election information.</p><p>In previous <a href="https://arstechnica.com/information-technology/2019/04/dhs-fbi-say-election-systems-in-50-states-were-targeted-in-2016/">elections</a>, attackers have used SQL injections against government election websites to attempt to extract information. We therefore did a deeper dive on those types of attacks, to understand if these threats are being conducted leading up to the 2020 election. We identified a number of SQL injection threats that were blocked by Cloudflare, with an average of 43,884 attempts per day across all domains under the Athenian Project. SQL injection attacks are commonly attempted against government election sites, with the WAF <a href="https://www.cloudflare.com/learning/security/threats/how-to-prevent-sql-injection/">blocking</a> an average of 199 SQL injection threats per day.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7y9ig1wX7AziXeYCvE8Hgq/e691992a5cf4a6ab70560777bee505a9/image2-2.png" />
            
            </figure>
    <div>
      <h3>Political Campaigns have experienced more DDoS attacks</h3>
      <a href="#political-campaigns-have-experienced-more-ddos-attacks">
        
      </a>
    </div>
    <p>When looking at the ecosystem of election security, political campaigns can be soft targets for cyberattacks due to the inability to dedicate resources to sophisticated cybersecurity protections. Campaigns are typically short-term, cash strapped operations that do not have an IT staff or budget necessary to promote long term security strategies.</p><p>To gain a better understanding of the threats around political campaigns, we surveyed 80 U.S. federal political campaigns on a range of Cloudflare plans from Cloudflare for Campaigns to our self serve plans. Cloudflare has mitigated a total of 77,192,840 threats on these sites since January 2020. That means that, on average, these sites saw 4,949 threats per day from January 2020 to present.  In general, we see larger scale attacks against Senate candidate’s sites than those of House candidates.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/10d6M1cglV6h5W2Vf7gfFL/d8987686cca0b5720312b045ec4b2109/image4-2.png" />
            
            </figure><p>As the election season has progressed, we’ve also seen an increase in the average number of attacks against political campaigns, with a 187% increase from May to June 2020. As face to face campaigning is not an option, campaigns now rely on online platforms such as video conferencing software, online fundraising and social media to reach voters. This can present significant <a href="https://www.cloudflare.com/learning/security/what-is-cyber-security/">cybersecurity challenges</a> to already vulnerable groups, such as political campaigns. Political campaigns are realizing the importance of cybersecurity services and have begun working with state parties and committees on training on the types of <a href="https://www.usnews.com/news/politics/articles/2019-05-03/campaigns-grapple-with-how-to-manage-cybersecurity-in-2020">cyber threats</a> and widely available resources for campaigns. With basic cybersecurity hygiene training on issues such as password security, two factor authentication, <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">identifying phishing scams</a>, network protection, internal application security and social media privacy, campaign staff are less likely to be the victims of a data breach.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/72sLfeawAVuHIuAlPV8mxc/9644139e68627d35b1c2272783884d1c/image3-2.png" />
            
            </figure><p>There has been a notable amount of DDoS activity against political campaign websites. DDoS attacks, which can be cheap, easy to organize and highly destructive, are often <a href="https://www.cyberscoop.com/ddos-democratic-campaigns-primary-dnc-dccc/">used</a> for targeting political campaigns. A DDoS attack that takes down a campaign's website during critical times can severely disadvantage a website. Campaigns used rate limiting to address 63% of the cyber threats they experienced, suggesting that DDoS attacks remain a significant concern.</p>
    <div>
      <h3>Securing Elections in 2020</h3>
      <a href="#securing-elections-in-2020">
        
      </a>
    </div>
    <p>Democracies rely on access to information and trust in government institutions, especially during a crisis. Reflecting this reality, elections officials are more aware and focused on reliability and resilience than ever before. Likewise, political campaigns are increasingly aware of the potential risks of DDoS activity and other cyber threats.</p><p>As COVID-19 continues to spread, it puts further pressure on ensuring that the Internet can be used to access and share election information. At Cloudflare, we believe that expanding access to tools that election officials and political candidates need to combat a range of online threats both serves our mission to help build a better Internet and strengthens our democracy.</p> ]]></content:encoded>
            <category><![CDATA[Athenian Project]]></category>
            <category><![CDATA[Cloudflare for Campaigns]]></category>
            <category><![CDATA[Election Security]]></category>
            <guid isPermaLink="false">3KpkXmFtmHmnGfmx1dx4Xp</guid>
            <dc:creator>Jocelyn Woolbright</dc:creator>
        </item>
    </channel>
</rss>