{"id":19386,"date":"2024-10-11T13:00:37","date_gmt":"2024-10-11T13:00:37","guid":{"rendered":"http:\/\/scannn.com\/facebook\/taking-action-against-coordinated-inauthentic-behavior-in-moldova\/"},"modified":"2024-10-11T13:00:37","modified_gmt":"2024-10-11T13:00:37","slug":"taking-action-against-coordinated-inauthentic-behavior-in-moldova","status":"publish","type":"post","link":"https:\/\/scannn.com\/lv\/taking-action-against-coordinated-inauthentic-behavior-in-moldova\/","title":{"rendered":"Taking Action Against Coordinated Inauthentic Behavior in Moldova"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><span style=\"font-weight: 400\">As part of our regular updates on notable <\/span><a href=\"https:\/\/transparency.meta.com\/metasecurity\/threat-reporting\"><span style=\"font-weight: 400\">threat disruption efforts<\/span><\/a><span style=\"font-weight: 400\">, we\u2019re sharing our findings into coordinated inauthentic behavior (CIB) targeting Moldova that we disrupted in early Q3 of this year, including threat indicators linked to this activity to contribute to the security community\u2019s efforts to detect and counter malicious activity across the internet.<\/span><\/p>\n<p><span style=\"font-weight: 400\">As a reminder, we view CIB as coordinated efforts to manipulate public debate for a strategic goal, in which fake accounts are central to the operation. In each case, people coordinate with one another and use fake accounts to mislead others about who they are and what they are doing. When we investigate and remove these operations, we focus on behavior, not content \u2014 no matter who\u2019s behind them, what they post or whether they\u2019re foreign or domestic.\u00a0<\/span><\/p>\n<p><strong>Here is what we found:<\/strong><\/p>\n<p>We removed seven Facebook accounts, 23 Pages, one Group and 20 accounts on Instagram for violating our policy against coordinated inauthentic behavior. This network originated primarily in the Transnistria region of Moldova, and targeted Russian-speaking audiences in Moldova. We removed this campaign before they were able to build authentic audiences on our apps.<\/p>\n<p><span style=\"font-weight: 400\">This operation centered around about a dozen fictitious, Russian-language news brands posing as independent entities with presence on multiple internet services, including ours, Telegram, OK (Odnoklassniki), and TikTok. It included brands like Tresh Kich, Moldovan Mole, Insider Moldova, Gagauzia on Air.<\/span><\/p>\n<p><span style=\"font-weight: 400\">The individuals behind this activity used fake accounts \u2013 some of which were detected and disabled prior to our investigation \u2013 to manage Pages posing as independent news entities, post content, and to drive people to this operation\u2019s off-platform channels, primarily on Telegram. Some of these accounts went through significant name changes over time and used profile photos likely created using generative adversarial networks (GAN).\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">They posted original content, including cartoons, about news and geopolitical events concerning Moldova. It included criticism of President Sandu, pro-EU politicians, and close ties between Moldova and Romania. They also posted supportive commentary about pro-Russia parties in Moldova, including a small fraction referencing exiled oligarch Shor and his party. The operators also posted about offering money and giveaways, including food and concert tickets, if people in Moldova would follow them on social media or make graffiti with the campaign\u2019s brand names.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">This campaign frequently posted summaries of articles from a legitimate news site point[.]md, but with an apparent pro-Russia and anti-EU slant added by the operators. They also amplified a Telegram channel of the host of a satirical political show in Moldova critical of pro-European candidates. One of this operation\u2019s branded Telegram channels was promoted by a Page we removed last quarter as part of a Russia-origin CIB network (case #3 in the <\/span><a href=\"https:\/\/transparency.fb.com\/sr\/Q2-2024-Adversarial-threat-report\"><span style=\"font-weight: 400\">Q2 2024 report<\/span><\/a><span style=\"font-weight: 400\">).\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">We found this network as part of our internal investigation into suspected coordinated inauthentic behavior in the region. Although the people behind this activity attempted to conceal their identity and coordination, our investigation found links to individuals from Russia and Moldova operating from the Transnistria region, including those behind a fake engagement service offering fake likes and followers on Facebook, Instagram, YouTube, OK, VKontakte, X and the petition platform Change.org. We also found some limited links between this CIB activity and a network from the Luhansk region in Ukraine that we <\/span><a href=\"https:\/\/about.fb.com\/wp-content\/uploads\/2021\/01\/December-2020-CIB-Report-.pdf\"><span style=\"font-weight: 400\">removed <\/span><\/a><span style=\"font-weight: 400\">in December 2020.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><i><span style=\"font-weight: 400\">Presence on Facebook and Instagram:<\/span><\/i><span style=\"font-weight: 400\"> 7 Facebook accounts, 23 Pages, 1 Group and 20 Instagram accounts.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400\"><i><span style=\"font-weight: 400\">Followers<\/span><\/i><span style=\"font-weight: 400\">: About 4,200 accounts followed one or more of these Pages, no accounts joined this Group, and around 335,000 accounts followed one or more of these Instagram accounts. The vast majority of these followers were outside of Moldova, which suggests the use of inauthentic engagement tactics to make these efforts appear more popular than they actually were.<\/span><\/li>\n<li style=\"font-weight: 400\"><i><span style=\"font-weight: 400\">Ad spend: <\/span><\/i><span style=\"font-weight: 400\">About $4,000 in spending for ads, paid for mostly in US dollars.<\/span><\/li>\n<\/ul>\n<h2><b>Threat indicators<\/b><\/h2>\n<p><span style=\"font-weight: 400\">This section details unique threat indicators that we assess to be associated with the malicious network we disrupted. It is not meant to provide a full cross-internet, historic view into this operation. It\u2019s important to note that, in our assessment, the mere sharing of these operations\u2019 links or engaging with them by online users would be insufficient to attribute accounts to a given campaign without corroborating evidence.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">To help the broader research community to study and protect people across different internet services, we\u2019ve collated and organized these indicators according to the <\/span><a href=\"https:\/\/carnegieendowment.org\/2023\/03\/15\/phase-based-tactical-analysis-of-online-operations-pub-89275\"><span style=\"font-weight: 400\">Online Operations Kill Chain<\/span><\/a><span style=\"font-weight: 400\"> framework, which we use to analyze many sorts of malicious online operations, identify the earliest opportunities to disrupt them, and share information across investigative teams. The kill chain describes the sequence of steps that threat actors go through to establish a presence across the internet, disguise their operations, engage with potential audiences, and respond to takedowns.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">As part of our next threat reporting cycle, we\u2019ll be adding these threat indicators to our public repository on <\/span><a href=\"https:\/\/github.com\/facebook\/threat-research\"><span style=\"font-weight: 400\">GitHub<\/span><\/a><span style=\"font-weight: 400\">.\u00a0<\/span><\/p>\n<p><b>Phase: Acquiring assets<\/b><\/p>\n<p><i><span style=\"font-weight: 300\">Tactic: Acquiring Facebook accounts, Pages, Groups, Instagram accounts<\/span><\/i><\/p>\n<ul>\n<li style=\"font-weight: 300\"><i><span style=\"font-weight: 400\">Threat indicators:<\/span><\/i><span style=\"font-weight: 400\"> 7 Facebook accounts, 23 Pages, 1 Group and 20 Instagram accounts.<\/span><\/li>\n<\/ul>\n<p><i><span style=\"font-weight: 300\">Tactic: Acquiring TikTok accounts<\/span><\/i><\/p>\n<ul>\n<li style=\"font-weight: 300\"><span style=\"font-weight: 300\">tiktok[.]com\/@trech_kich6<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 300\"><span style=\"font-weight: 300\">tiktok[.]com\/@moldova_acum<\/span><span style=\"font-weight: 400\">\u00a0<\/span><\/li>\n<\/ul>\n<p><i><span style=\"font-weight: 300\">Tactic: Acquiring Telegram channels<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 300\">Tactic: Acquiring other social media assets<\/span><\/i><\/p>\n<ul>\n<li style=\"font-weight: 300\"><span style=\"font-weight: 300\">ok[.]ru\/group\/70000005349948<\/span><\/li>\n<\/ul>\n<p><b>Phase: Disguising assets<\/b><\/p>\n<p><i><span style=\"font-weight: 300\">Tactic: Creating fictitious news outlets<\/span><\/i><\/p>\n<ul>\n<li style=\"font-weight: 300\"><span style=\"font-weight: 300\">\u0422\u0440\u0435\u0448 \u041a\u0438\u0448 \u2013 Trech Kich\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 300\"><span style=\"font-weight: 300\">\u041c\u043e\u043b\u0434\u043e\u0432\u0430 \u043e\u043d\u043b\u0430\u0439\u043d \u2013 Moldova Online<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 300\"><span style=\"font-weight: 300\">\u041c\u043e\u043b\u0434\u0430\u0432\u0441\u043a\u0438\u0439 \u041a\u0440\u043e\u0442 \u2013 Moldovan Mole\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 300\"><span style=\"font-weight: 300\">\u0424\u043b\u0443\u0435\u0440\u0430\u0448 \u2013 Fluieras<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 300\"><span style=\"font-weight: 300\">\u041a\u0438\u0448\u0438\u043d\u0435\u0432 \u2013 Kishinev\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 300\"><span style=\"font-weight: 300\">\u0420\u0435\u0430\u043b\u044c\u043d\u044b\u0439 \u041a\u0438\u0448\u0438\u043d\u0435\u0432 \u2013 Real Chisinau<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 300\"><span style=\"font-weight: 300\">\u041c\u043e\u043b\u0434\u043e\u0432\u0430 \u0441\u0435\u0439\u0447\u0430\u0441 \u2013 Moldova Acum\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 300\"><span style=\"font-weight: 300\">\u0413\u0430\u0433\u0430\u0443\u0437\u0438\u044f \u0432 \u044d\u0444\u0438\u0440\u0435 \u2013 Gagauzia on Air\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 300\"><span style=\"font-weight: 300\">\u0411\u0435\u043b\u044c\u0446\u044b 24 \u2013 Beltsy 24<\/span><\/li>\n<\/ul>\n<p><i><span style=\"font-weight: 300\">Tactic: Adopting visual disguise<\/span><\/i><\/p>\n<ul>\n<li style=\"font-weight: 300\"><i><span style=\"font-weight: 400\">Threat indicators:<\/span><\/i> <span style=\"font-weight: 300\">Using profile photos likely generated using artificial intelligence such as Generative Adversarial Networks (GAN)<\/span><\/li>\n<\/ul>\n<p><b>Phase: Evading detection<\/b><\/p>\n<p><i><span style=\"font-weight: 300\">Tactic: Camouflaging content<\/span><\/i><\/p>\n<ul>\n<li style=\"font-weight: 300\"><i><span style=\"font-weight: 400\">Threat indicators:<\/span><\/i> <span style=\"font-weight: 300\">Frequently posting summaries of articles from a legitimate news site point[.]md, but with an apparent pro-Russia and anti-EU slant added by the operators.<\/span><\/li>\n<\/ul>\n<p><b>Phase: Targeted engagement<\/b><\/p>\n<p><i><span style=\"font-weight: 300\">Tactic: Running Ads<\/span><\/i><\/p>\n<ul>\n<li style=\"font-weight: 300\"><i><span style=\"font-weight: 400\">Threat indicators:<\/span><\/i> <span style=\"font-weight: 300\">About $4,000\u00a0 in spending for ads on Facebook, paid for mostly in US dollars<\/span><\/li>\n<\/ul>\n<p><i><span style=\"font-weight: 300\">Tactic: Engaging with users outside the operation<\/span><\/i><\/p>\n<ul>\n<li style=\"font-weight: 300\"><span style=\"font-weight: 300\">About 4,200 accounts followed one or more of these Pages;\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 300\"><span style=\"font-weight: 300\">About 335,000 accounts followed one or more of these Instagram accounts. However, the vast majority of these followers were outside of Moldova, suggesting the use of inauthentic engagement tactics to make these efforts appear more popular than they actually were.<\/span><\/li>\n<\/ul>\n<p><i><span style=\"font-weight: 300\">Tactic: Engaging with specific audience<\/span><\/i><\/p>\n<ul>\n<li style=\"font-weight: 300\"><i><span style=\"font-weight: 400\">Threat indicators: <\/span><\/i><span style=\"font-weight: 300\">Targeting Russian-speaking audiences in Moldova<\/span><\/li>\n<\/ul>\n<p><i><span style=\"font-weight: 300\">Tactic: Directing online traffic<\/span><\/i><\/p>\n<ul>\n<li style=\"font-weight: 300\"><i><span style=\"font-weight: 400\">Threat indicators: <\/span><\/i><span style=\"font-weight: 300\">Using fake accounts to drive people to this operation\u2019s off-platform channels, including Telegram channels<\/span><\/li>\n<\/ul>\n<p><i><span style=\"font-weight: 300\">Tactic: Posting about individuals or institutions<\/span><\/i><\/p>\n<ul>\n<li style=\"font-weight: 300\"><span style=\"font-weight: 300\">Posting original content that included criticism of President Sandu, pro-EU politicians, and close ties between Moldova and Romania.\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 300\"><span style=\"font-weight: 300\">Posting supportive commentary about pro-Russia parties in Moldova, including a small fraction referencing exiled oligarch Shor and his party.<\/span><\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<\/p><\/div>\n<p><script async defer crossorigin=\"anonymous\" src=\"https:\/\/connect.facebook.net\/en_US\/sdk.js#xfbml=1&#038;version=v5.0\"><\/script><br \/>\n<br \/><br \/>\n<br \/><a href=\"https:\/\/about.fb.com\/news\/2024\/10\/taking-action-against-coordinated-inauthentic-behavior-in-moldova\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As part of our regular updates on notable threat disruption efforts, we\u2019re sharing our findings into coordinated inauthentic behavior (CIB) targeting Moldova that we disrupted in early Q3 of this year, including threat indicators linked to this activity to contribute to the security community\u2019s efforts to detect and counter malicious activity across the internet. As [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":19387,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[123],"tags":[],"class_list":["post-19386","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-facebook"],"_links":{"self":[{"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/posts\/19386","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/comments?post=19386"}],"version-history":[{"count":0,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/posts\/19386\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/media\/19387"}],"wp:attachment":[{"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/media?parent=19386"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/categories?post=19386"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/tags?post=19386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}