300 platforms in 7 languages: Russian hackers have led a massive disinformation campaign for years - ForumDaily
The article has been automatically translated into English by Google Translate from Russian and has not been edited.
Переклад цього матеріалу українською мовою з російської було автоматично здійснено сервісом Google Translate, без подальшого редагування тексту.
Bu məqalə Google Translate servisi vasitəsi ilə avtomatik olaraq rus dilindən azərbaycan dilinə tərcümə olunmuşdur. Bundan sonra mətn redaktə edilməmişdir.

300 platforms in 7 languages: Russian hackers have led a massive disinformation campaign for years

For almost six years, the Russian disinformation campaign has operated covertly on 300 social media platforms using seven languages, analysts at Graphika say. "Voice of America".

Photo: Shutterstock

 

The campaign, which researchers called "Secondary Infection," included the spread of false tweets, allegedly published by US and European officials, as well as conspiracy theories regarding coronavirus.

Most of the false content concerned discrediting Ukraine, the researchers note. Ukraine was presented on social networks as a “failed or unreliable state.” Other themes included portraying the US and NATO as aggressors and Europe as weak and divided.

Critics of the Russian government were portrayed as immoral or alcoholics; Muslims were portrayed as aggressors, and the Russian government as a victim of Western insincerity and conspiracies.

Elections in the West were called unfair, Turkey was called an aggressive power, and world sports institutions and competitions were called unprofessional, unfair and Russophobic.

The campaign tried to support the Russian authorities, attacked and undermined the confidence of its opponents, says Graphika researcher Ben Nimmo, noting that it is not known whether the campaign was “conducted by the government; one associated with the government; or someone who wanted to support the government. "

On the subject: The FBI arrested the Russian, who led the hacker trading platform in the US

Nimmo noticed a new tactic this campaign was using - instead of spreading propaganda through popular accounts, they created one-off accounts that would spread one message at a time and then disappear.

The six-year campaign began in 2014 and lasted until early 2020, according to official research site. During the disinformation process, 2500 pieces of content - articles and graphics - were created and published on more than 300 platforms in 7 languages.

Hackers actively participated in political campaigns, including the 2016 U.S. elections, the 2017 French elections, and attempts to discredit the World Anti-Doping Agency (WADA). According to the researchers, the attackers consistently used sophisticated schemes to cover the tracks, but struggled to achieve any measurable involvement in the campaigns they needed.

Most campaign materials were not popular.

“They didn't seem to be very successful at creating viral content,” Nimmo notes.

At the moment, there is no specific subject to which responsibility for discredit campaigns would be attributed.

Read also on ForumDaily:

Russian programmer convicted in US for cybercrime deported to homeland

Russia's nuclear doctrine: whom and why the Kremlin is ready to fire rockets

8 different tactics: intelligence agencies explained how Russia will intervene in the US presidential election

The illusion of choice and fear: how technology makers manipulate us

cybercriminals Russian aggression Russian hackers At home
Subscribe to ForumDaily on Google News

Do you want more important and interesting news about life in the USA and immigration to America? — support us donate! Also subscribe to our page Facebook. Select the “Priority in display” option and read us first. Also, don't forget to subscribe to our РєР ° РЅР ° Р »РІ Telegram  and Instagram- there is a lot of interesting things there. And join thousands of readers ForumDaily New York — there you will find a lot of interesting and positive information about life in the metropolis. 



 
1075 requests in 1,155 seconds.