0 0
Read Time:1 Minute, 42 Second

Fake news can be created and distributed for various purposes. For this, there are specially created services on the Internet. For example, the Fakedetail.com service imitates correspondence in mail, instant messenger, etc. according to the parameters you set.

1️⃣ Fraud – such messages are most often disguised as announcements of fundraising for good purposes and are aimed at luring money. Or they are a direct fraud, as was the case with the hacking of the Twitter accounts of Elon Musk, Bill Gates, Warren Buffett, Barack Obama, Kanye West, the head of Binance, Changpeng Zhao, as well as more than 50 accounts of representatives of the crypto community and other well-known verified users. When the attackers published messages about the distribution of several thousand bitcoins to those who send cryptocurrency to the wallets indicated in the tweets.

2️⃣ Sometimes there are other tasks: theft of a login-password from financial instruments or personal data of the victim with subsequent sale.

3️⃣ Hype – to attract maximum attention, for example, to a group, and draw new members there or to your page to increase the number of friends.

4️⃣ Bullying is bullying of a specific person, including using fictitious (fake) information.

5️⃣ Damage to reputation – causing harm by spreading negativity in the media, social networks and search engines, in order to form an hostile attitude towards the brand or distrust of the product among the audience.

6️⃣ Financial fraud – their goal is to influence the financial performance of organizations. For example, on company shares, but this is in the short term. More often used as a tool in corporate wars to influence the opponent’s decision.

7️⃣ Interference with the investigation or pressure on the investigation – the creation of a certain public opinion about the event or its participants, the formation of a certain attitude among the participants in the process, etc.

8️⃣ Lobbyism – these fakes are created by interested parties to promote legislative initiatives that are convenient for them or to interfere with those laws that are currently being considered.

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence