Overview of Russian government hacking strategy and disinformation – Arrows in the Quiver

Read Time:2 Minute, 28 Second

A large part of human ideas, thoughts and information is provided by social networks, and this has led to large and small disinformation campaigns to influence people’s minds and change and inject information.

A report revealed that over the past six years, Russian government agents have been systematically disseminating false information and stories with specific purposes and influencing the minds of the people on 300 social platforms in 7 languages.


After Russia, China and Iran have taken similar measures.
The operation, dubbed “Secondary Infection,” involved the sharing of tweets and fake posts by US government officials, the fabrication and dissemination of conspiracy theories about Corona, etc., and the misuse of Facebook, Google and Twitter advertising campaigns, and false revelations.

Treadstone 71 Cyber CounterIntelligence Training – Influence Operations 

Divisiveness has intervened in the 2016 US election, hurting Hillary Clinton’s popularity and paving the way for Trump’s election.
The St. Petersburg Internet Research Agency is one of the main defendants in disinformation and publishing false news by building troll farms.

The Troll Farm includes a large number of fake American characters on social media, especially Twitter and Facebook, with the aim of creating divisions, spreading false posts, spreading rumors, and carrying out Kremlin orders.

The top secret NSA report states that Russian intelligence service (GRU) hackers were behind cyberattacks on US elections and voting systems, targeted propaganda and phishing attacks and interference in elections.
The confidential report also said that the Kremlin had ordered a massive and multifaceted propaganda effort to undermine public confidence in the democratic process in the US election, and vowed to humiliate Trump’s rival, Hillary Clinton, and damage her popular popularity.

Some hacking and government teams try to imitate the activities of another team in order to hide by using the false flag method, and place the responsibility for their attacks on another team or country.

Using this tactic and using the identities and behavioral patterns of Iranian government hacking teams and using related codes and signatures, as well as hacking some of these hackers, the Russian intelligence service hackers carried out their attacks and activities in the name of Iran.  Save the consequences and US sanctions on Russia and sacrifice Iran.

Online Training in Cyber Intelligence

Iran’s Internet protection is in fact a copy of Russia’s independent Internet plan, which was implemented in 2019 and the Kremlin decided to minimize global Internet access, and by 2024 Russia will provide only 10% of its traffic from global servers.  People in Russia are still using domestic platforms, and the Russian government has largely avoided the risk of retaliation despite destabilizing cyberattacks.

The process of using malware by two Russian hacking groups to infiltrate targets
Information laundering and disinformation ecosystem

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

Author

  • @Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence

Previous post Mahan Air conceals other countries’ diplomatic incidents
Next post Lab Dookhtegan: The Regime and Me, We Ain’t Mates – HUGE DATA REVEAL
%d bloggers like this: