• Vuoi Pubblicare un Articolo | Contattaci
Tech News, Magazine & Review WordPress Theme 2017
  • Home
  • PC & MOBILE
    • All
    • ANDROID
    • IPHONE E IPAD
    • LINUX
    • MAC
    • WINDOWS
    Come utilizzare il comando cp in Linux

    Come utilizzare il comando cp in Linux

    How to check network interface status in CentOS8

    How to check network interface status in CentOS8

    Collisione: app Linux per verificare l'integrità dei file utilizzando gli hash

    Collisione: app Linux per verificare l’integrità dei file utilizzando gli hash

    Metadata Cleaner: Remove Your Traces Within a File

    Metadata Cleaner: Remove Your Traces Within a File

    Create Contact Form Using HTML and PHP

    Create Contact Form Using HTML and PHP

    Piwigo: An Open-Source Google Photos Alternative

    Piwigo: An Open-Source Google Photos Alternative

    10 Best Webcams for Ubuntu in 2022

    10 Best Webcams for Ubuntu in 2022

    Make Applications Start in the Center of Screen in Ubuntu - It's FOSS

    Make Applications Start in the Center of Screen in Ubuntu – It’s FOSS

    Golang Time Format

    Golang Time Format

  • INTERNET
    • All
    • COMUNICAZIONI
    • FACEBOOK
    • SICUREZZA
    • STRUMENTI
    Come limitare chi può contattarti su Instagram

    Come limitare chi può contattarti su Instagram

    I federali scoprono un "coltellino svizzero" per l'hacking di sistemi industriali

    I federali scoprono un “coltellino svizzero” per l’hacking di sistemi industriali

    Come l'invasione russa ha innescato un giro di vite degli Stati Uniti sui suoi hacker

    Come l’invasione russa ha innescato un giro di vite degli Stati Uniti sui suoi hacker

    Blockchains Have a ‘Bridge’ Problem, and Hackers Know It

    Blockchains Have a ‘Bridge’ Problem, and Hackers Know It

    Forcing WhatsApp and iMessage to Work Together Is Doomed to Fail

    Forcing WhatsApp and iMessage to Work Together Is Doomed to Fail

    A Mysterious Satellite Hack Has Victims Far Beyond Ukraine

    A Mysterious Satellite Hack Has Victims Far Beyond Ukraine

    The TSA’s First Crack at Protecting Pipelines From Hackers Falls Short

    The TSA’s First Crack at Protecting Pipelines From Hackers Falls Short

    Russia Wants to Label Meta an ‘Extremist Organization’

    Russia Wants to Label Meta an ‘Extremist Organization’

    Chinese Spies Hacked a Livestock App to Breach US State Networks

    Chinese Spies Hacked a Livestock App to Breach US State Networks

  • LIFESTYLE
    • All
    • DIVERTIMENTO
    • NOTIZIE
    • PRODUTTIVITÀ
    Array

    Array

    Array

    Array

    9 migliori cuscini per cullare la tua zucca per un'ottima notte di sonno

    9 migliori cuscini per cullare la tua zucca per un’ottima notte di sonno

    5 consigli su come aiutare i bambini con bisogni speciali a prosperare

    5 consigli su come aiutare i bambini con bisogni speciali a prosperare

    La settimana lavorativa di 4 giorni aumenta la tua produttività per un migliore equilibrio?

    La settimana lavorativa di 4 giorni aumenta la tua produttività per un migliore equilibrio?

    Come trovare un lavoro in linea con i tuoi valori fondamentali

    Come trovare un lavoro in linea con i tuoi valori fondamentali

    5 strategie per far crescere il tuo business continuamente

    5 strategie per far crescere il tuo business continuamente

    Diventare un Life Coach: come trasformo l'esperienza di vita in coaching

    Diventare un Life Coach: come trasformo l’esperienza di vita in coaching

    9 migliori coperte per aiutarti a dormire meglio di un bambino

    9 migliori coperte per aiutarti a dormire meglio di un bambino

No Result
View All Result
  • Home
  • PC & MOBILE
    • All
    • ANDROID
    • IPHONE E IPAD
    • LINUX
    • MAC
    • WINDOWS
    Come utilizzare il comando cp in Linux

    Come utilizzare il comando cp in Linux

    How to check network interface status in CentOS8

    How to check network interface status in CentOS8

    Collisione: app Linux per verificare l'integrità dei file utilizzando gli hash

    Collisione: app Linux per verificare l’integrità dei file utilizzando gli hash

    Metadata Cleaner: Remove Your Traces Within a File

    Metadata Cleaner: Remove Your Traces Within a File

    Create Contact Form Using HTML and PHP

    Create Contact Form Using HTML and PHP

    Piwigo: An Open-Source Google Photos Alternative

    Piwigo: An Open-Source Google Photos Alternative

    10 Best Webcams for Ubuntu in 2022

    10 Best Webcams for Ubuntu in 2022

    Make Applications Start in the Center of Screen in Ubuntu - It's FOSS

    Make Applications Start in the Center of Screen in Ubuntu – It’s FOSS

    Golang Time Format

    Golang Time Format

  • INTERNET
    • All
    • COMUNICAZIONI
    • FACEBOOK
    • SICUREZZA
    • STRUMENTI
    Come limitare chi può contattarti su Instagram

    Come limitare chi può contattarti su Instagram

    I federali scoprono un "coltellino svizzero" per l'hacking di sistemi industriali

    I federali scoprono un “coltellino svizzero” per l’hacking di sistemi industriali

    Come l'invasione russa ha innescato un giro di vite degli Stati Uniti sui suoi hacker

    Come l’invasione russa ha innescato un giro di vite degli Stati Uniti sui suoi hacker

    Blockchains Have a ‘Bridge’ Problem, and Hackers Know It

    Blockchains Have a ‘Bridge’ Problem, and Hackers Know It

    Forcing WhatsApp and iMessage to Work Together Is Doomed to Fail

    Forcing WhatsApp and iMessage to Work Together Is Doomed to Fail

    A Mysterious Satellite Hack Has Victims Far Beyond Ukraine

    A Mysterious Satellite Hack Has Victims Far Beyond Ukraine

    The TSA’s First Crack at Protecting Pipelines From Hackers Falls Short

    The TSA’s First Crack at Protecting Pipelines From Hackers Falls Short

    Russia Wants to Label Meta an ‘Extremist Organization’

    Russia Wants to Label Meta an ‘Extremist Organization’

    Chinese Spies Hacked a Livestock App to Breach US State Networks

    Chinese Spies Hacked a Livestock App to Breach US State Networks

  • LIFESTYLE
    • All
    • DIVERTIMENTO
    • NOTIZIE
    • PRODUTTIVITÀ
    Array

    Array

    Array

    Array

    9 migliori cuscini per cullare la tua zucca per un'ottima notte di sonno

    9 migliori cuscini per cullare la tua zucca per un’ottima notte di sonno

    5 consigli su come aiutare i bambini con bisogni speciali a prosperare

    5 consigli su come aiutare i bambini con bisogni speciali a prosperare

    La settimana lavorativa di 4 giorni aumenta la tua produttività per un migliore equilibrio?

    La settimana lavorativa di 4 giorni aumenta la tua produttività per un migliore equilibrio?

    Come trovare un lavoro in linea con i tuoi valori fondamentali

    Come trovare un lavoro in linea con i tuoi valori fondamentali

    5 strategie per far crescere il tuo business continuamente

    5 strategie per far crescere il tuo business continuamente

    Diventare un Life Coach: come trasformo l'esperienza di vita in coaching

    Diventare un Life Coach: come trasformo l’esperienza di vita in coaching

    9 migliori coperte per aiutarti a dormire meglio di un bambino

    9 migliori coperte per aiutarti a dormire meglio di un bambino

No Result
View All Result
Soluzioni CRM
No Result
View All Result

The Russian Disinfo Operation You Never Heard About

by Staff
28 Giugno 2020
The Russian Disinfo Operation You Never Heard About
Share on FacebookShare on Twitter


The Internet Research Agency is infamous for flooding mainstream social media platforms with compelling disinformation campaigns. The GRU, Russia’s military intelligence agency, deploys strategic data leaks and destabilizing cyberattacks. But in the recent history of Russia’s online meddling, a third, distinct entity may have been at work on many of the same objectives— indicating that Russia’s disinformation operations went deeper than was publicly known until now.

Dubbed Secondary Infektion, the campaign came on the radar of researchers last year. Today, the social media analysis firm Graphika is publishing the first comprehensive review of the group’s activity, which seems to have begun all the way back in January 2014. The analysis reveals an entity that prioritizes covering its tracks; virtually all Secondary Infektion campaigns incorporate robust operational security, including a hallmark use of burner accounts that only stay live long enough to publish one post or comment. That’s a sharp contrast to the IRA and GRU disinformation operations, which often rely on cultivating online personas or digital accounts over time and building influence by broadening their reach.

Secondary Infektion also ran disinformation campaigns on a notably large array of digital platforms. While the IRA in particular achieved virality by focusing its energy on major mainstream social networks like Facebook and Twitter, Secondary Infektion took more than 300 platforms in all, including regional forums and smaller blogging sites. The combination of wide spread and endless burner accounts have helped the group hide its campaigns—and its motives—for years. But the approach also made the actor less influential and seemingly less effective than the IRA or GRU. Without being able to build a following, it’s difficult to get posts to take off. And many Secondary Infektion campaigns were either flagged by platform anti-abuse mechanisms or simply pilloried by regular users.

“The main thing is that this really adds a large scale persistent threat actor into the mental map we have of Russian information operations,” says Ben Nimmo, director of investigations at Graphika. “All the while you have the IRA running its operations, all the while you have GRU running its operations, you had Secondary Infektion running its own brand of operations, which had a very different style, had a very different approach. This was all running at the same time and quite often they were all homing in on the same targets.”

Secondary Infektion has a familiar hit list. The group has been active in running disinformation campaigns related to world elections, has attempted to sow division between European countries, and has highlighted United States and NATO dominance and aggression. Domestically, the actor has run campaigns in defense of Russia and its government, targeted activists and groups critical of the regime—like the reporting group Bellingcat and anti-corruption advocate Alexei Navalny—and tried to discredit the World Anti-Doping Agency. Secondary Infektion has also painted Turkey as a villainous rogue state and sown division over issues of global migration, particularly Muslim displacement. They’ve run relatively few campaigns related to Syria and its civil war, but is devoted to a common priority for Russia-backed digital actor: undermining and destabilizing Ukraine.

Though Secondary Infektion’s activities are difficult to track, Graphika researchers were able to piece the actor’s activity together by looking at rare occasions where the group reused an account a few times, and identifying patterns in sets of blogs and forums the group would post to. Secondary Infektion also has a particular tendency to build its campaigns around “leaked” documents that are really just fabricated by the group, but claim to reveal, say, corruption among the Kremlin’s critics or an anti-Russian plot from the US. Graphika did not see evidence that Secondary Infektion used ads to promote its content, but after months of investigation the researchers did find a sort of digital fingerprint they could use to track Secondary Infektion campaigns at a much larger scale and link many more digital posts to the actor. Graphika would not comment on the nature of this tell, though.

“It’s important to highlight that not all Russian active measures are impressive in quality or indeed effective. In fact the vast majority are not.”

Thomas Rid, Johns Hopkins University

Facebook was the first to discover a group of Secondary Infektion accounts in May 2019, and provided the data to disinformation researchers along with the initial attribution to Russia. Since then other social networks and researchers have gathered more examples of the actor’s activity and reinforced the attribution. The group seemingly reduced its operations or went further underground after being publicly named in 2019. But it was still operating as of at least March 2020. Graphika is clear, though, that Secondary Infektion has still not been tied to a specific organization or apparatus within Russia. Based on the available evidence and the group’s distinctive techniques and behaviors, the researchers don’t believe that the actor operates under the purview of the IRA or GRU. But it remains possible.

.


Tags: disinformationhackingrussiasecurityweb
Staff

Staff

Next Post
TLDR: Ricordando Paul Allen

TLDR: Ricordando Paul Allen

Raccomandati.

Con il chip "Pluton", Microsoft mostra forza e dimostra che il Trustworthy Computing conta ancora

Con il chip “Pluton”, Microsoft mostra forza e dimostra che il Trustworthy Computing conta ancora

14 Gennaio 2021
Google Has a New Plan to Kill Cookies. People Are Still Mad

Google Has a New Plan to Kill Cookies. People Are Still Mad

27 Gennaio 2022

Tendenza.

No Content Available

DISCLAIMER

Questo sito non costituisce testata giornalistica e non ha carattere periodico essendo aggiornato secondo la disponibilità e la reperibilità dei materiali. Pertanto non può essere considerato in alcun modo un prodotto editoriale ai sensi della L. n. 62 del 7/3/2001.

Pagine

  • CONTATTACI

© 2019 Soluzioni-crm.it

No Result
View All Result

© 2022 JNews - Premium WordPress news & magazine theme by Jegtheme.