Q-Snatch: Malware Sent Vote Machine Admin Credentials to China, Dark Web
Added to the grotesque panoply of blatant electioneering via Dominion, Smartmatic, Hammer and Scorecard, new informational analysis reveals the widespread infection of Dominion voting terminals with a malware virus that can capture administrator and precinct supervisor login credentials and forward them anywhere in the world via the dark web, providing foreign actors with remote access to vote totals anywhere on the system.
The malware revelation by a computer voting whistleblower is considered common knowledge in the electronic balloting industry with an estimated 80% of all electronic voting machines infected with the login forwarding program that can be accessed by anyone who knows where to look. The whistleblower claims knowledge of specific incidents where administrative credentials were sent to undisclosed people with Chinese IP addresses via the Dark Web.
Q-Snatch is a specific kind of malware that hackers refer to as background or “lurker” programs that run undetected on the voting machine waiting to be activated either on demand by outside agents or by specific keystroke sequences on the machine. When a precinct supervisor or anyone with administrator privileges on a voting terminal enters their login information, Q-Snatch (as the name implies) snatches their credentials and sends them to the waiting recipient via a preassigned IP address or data dropbox, allowing anyone with the credentials to access voting terminals or banks of voting machines tethered to a local network.
The Q-Snatch performance feature is only the latest vulnerability to be revealed in an election system literally designed to customize election results at the touch of a button in order to protect and perpetuate the political power of aspiring tyrants.