• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
google takes down influence campaigns tied to china, indonesia, and

Google Takes Down Influence Campaigns Tied to China, Indonesia, and Russia

You are here: Home / General Cyber Security News / Google Takes Down Influence Campaigns Tied to China, Indonesia, and Russia
June 10, 2024

Google has revealed that it took down 1,320 YouTube channels and 1,177 Blogger blogs as part of a coordinated influence operation connected to the People’s Republic of China (PRC).

“The coordinated inauthentic network uploaded content in Chinese and English about China and U.S. foreign affairs,” Google Threat Analysis Group (TAG) researcher Billy Leonard said in the company’s quarterly bulletin released last week.

The tech giant said it also terminated Ads, AdSense, and Blogger accounts linked to two coordinated influence operations with ties to Indonesia that shared content supportive of the ruling party in the country.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Another big cluster dismantled by Google involved a network of 378 YouTube channels that it said originated from a Russian consulting firm and disseminated content that projected Russia in a favorable light and denigrated Ukraine and the West.

The company further terminated one AdSense account and blocked 10 domains from showing up in Google News and its Discover feed for mobile devices that spawned content in English and Norwegian about food, sports, and lifestyle topics.

The coordinated operation, linked to individuals from the Philippines and India, was financially motivated, according to Google.

Cybersecurity

Some of the other prominent violators taken down are listed below –

  • A network of 59 YouTube channels linked to Pakistan that shared Urdu language Shorts critical of Pakistani political figures
  • A network of 11 YouTube channels linked to France that shared French language content critical of French political figures
  • A network of 11 YouTube channels linked to individuals in Russia that shared content supportive of Russia and critical of Ukraine
  • Two YouTube channels linked to Myanmar that shared English/Burmese language content supportive of the Burmese military government and critical of pro-independence groups

The development comes as OpenAI and Meta revealed that they disrupted an influence operation orchestrated by a Tel Aviv-based political marketing firm called Stoic to propagate pro-Israel messaging in the U.S. and Canada amid the ongoing conflict in Gaza. The campaign began in October post the outbreak of war between Israel and Hamas.

“This network commented on Facebook Pages of international and local media organizations, and political and public figures, including U.S. lawmakers,” Meta noted late last month. “Their comments included links to the operation’s websites and were often met with critical responses from authentic users calling them propaganda.”

“They posted primarily in English about the Israel-Hamas war, including calls for the release of hostages; praise for Israel’s military actions; criticism of campus antisemitism, the United Nations Relief and Works Agency (UNRWA), and Muslims claiming that ‘radical Islam’ poses a threat to liberal values in Canada.”

Meta told CyberScoop that it linked the activity to STOIC based on a “combination of technical and behavioral indicators,” without sharing additional specifics.

According to a report published by The New York Times last week, the covert influence-for-hire campaign was commissioned by Israel’s Ministry of Diaspora Affairs, citing four Israeli officials, who said the government body earmarked around $2 million to the operation.

This is not the first time shadowy Israeli companies have been caught engaging in disinformation campaigns. In early 2023, the Forbidden Stories consortium uncovered an “ultra-secret” entity named Team Jorge that offers for sale “influence and manipulation services to the highest bidder.”

The disclosures also follow an advisory from Microsoft delving into Russia’s escalating malign disinformation campaigns against France and the 2024 Summer Olympic Games, some of which have used artificial intelligence (AI)-generated audio clips to advance pro-Kremlin narratives.

It’s worth noting that the International Olympic Committee (IOC), while allowing qualifying athletes from Russia and Belarus to compete in the multi-sport event as “Individual Neutral Athletes,” has barred them from participating in the opening ceremony in light of the war in Ukraine.

Last October, the IOC’s executive board suspended the Russian Olympic Committee “with immediate effect until further notice” after its decision to include as members regional sports organizations from four Ukrainian territories illegally annexed by Russia since the onset of the war in February 2022. In February, Russia lost its appeal against the ban.

“If they cannot participate in or win the Games, then they seek to undercut, defame, and degrade the international competition in the minds of participants, spectators, and global audiences,” Redmond said.

Cybersecurity

Google-owned Mandiant and Recorded Future, in two separate analyses, characterized the sporting event as a “target-rich environment” that faces a broad range of cyber threats ranging from ransomware and hacktivist attacks to nation-state actors conducting espionage and influence operations.

“The Paris Olympics faces an elevated risk of cyber threat activity, including cyber espionage, disruptive and destructive operations, financially-motivated activity, hacktivism, and information operations,” Mandiant researchers Michelle Cantos and Jamie Collier pointed out.

The actor behind the defamation campaign against the IOC is being tracked by Microsoft under the moniker Storm-1679, whose goals, the company added, also seek to instigate public fear to deter spectators from attending the event altogether through fabricated videos alleging possible terrorism threats.

The second Russia-linked threat actor to ramp up its anti-Olympics messaging in the past two months is Doppelganger (aka Storm-1099) which has been found using a cluster of 15 French language news sites to spread claims of rampant IOC corruption and potential violence at the Games.

“The Kremlin’s propaganda and disinformation machine is unlikely to hold back in leveraging its network of actors to undermine the Games as the Olympics draw near,” the Microsoft Threat Analysis Center (MTAC) said.

“Actors are likely to use a mix of propaganda facilitated by generative AI across social media platforms to continue their campaigns against France, the IOC, and the Olympic Games.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «sticky werewolf expands cyber attack targets in russia and belarus Sticky Werewolf Expands Cyber Attack Targets in Russia and Belarus
Next Post: Azure Service Tags Vulnerability: Microsoft Warns of Potential Abuse by Hackers azure service tags vulnerability: microsoft warns of potential abuse by»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.