• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
iranian and russian entities sanctioned for election interference using ai

Iranian and Russian Entities Sanctioned for Election Interference Using AI and Cyber Tactics

You are here: Home / General Cyber Security News / Iranian and Russian Entities Sanctioned for Election Interference Using AI and Cyber Tactics
January 1, 2025

The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) on Tuesday leveled sanctions against two entities in Iran and Russia for their attempts to interfere with the November 2024 presidential election.

The federal agency said the entities – a subordinate organization of Iran’s Islamic Revolutionary Guard Corps and a Moscow-based affiliate of Russia’s Main Intelligence Directorate (GRU) – sought to influence the electoral outcome and divide the American people through targeted disinformation campaigns.

“As affiliates of the IRGC and GRU, these actors aimed to stoke socio-political tensions and influence the U.S. electorate during the 2024 U.S. election,” it noted in a press release.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


In August 2024, the Office of the Director of National Intelligence (ODNI), the Federal Bureau of Investigation (FBI), and the Cybersecurity and Infrastructure Security Agency (CISA) jointly accused Iran of attempting to undermine democratic processes, including by orchestrating cyber operations designed to gain access to sensitive information related to the elections.

Cybersecurity

Around the same time, Meta revealed that it blocked WhatsApp accounts used by Iranian threat actors to target individuals in Israel, Palestine, Iran, the U.K., and the U.S. The campaign was attributed to an IRGC-affiliated hacking crew codenamed Charming Kitten.

A month later, U.S. federal prosecutors unsealed criminal charges against three Iranian nationals allegedly employed with the IRGC for targeting current and former government personnel to siphon sensitive data.

In tandem, the Treasury Department also sanctioned seven individuals for conducting spear-phishing, hack-and-leak operations, as well as interfering with political campaigns in 2020 and 2024.

The latest Iranian entity to fall under the purview of U.S. sanctions is the Cognitive Design Production Center (CDPC), a subsidiary of the IRGC that’s said to have planned influence operations designed to incite socio-political tensions in the lead up to the 2024 elections.

Also sanctioned by OFAC is a Moscow-based entity called the Center for Geopolitical Expertise (CGE), which works directly with a GRU unit responsible for sabotage, political interference operations, and cyber warfare aimed at the West.

It was founded in late December 2020 as a non-profit by Aleksandr Dugin, who was previously sanctioned by the U.S. in March 2015 for being “complicit in actions or policies that threaten the peace, security, stability, or sovereignty or territorial integrity of Ukraine.”

CGE, per the Treasury Department, “directs and subsidizes the creation and publication of deepfakes and circulated disinformation,” using generative artificial intelligence (AI) tools to create synthetic content at scale and distribute them across bogus websites masquerading as legitimate news outlets.

“CGE built a server that hosts the generative AI tools and associated AI-created content, in order to avoid foreign web-hosting services that would block their activity,” the agency said.

“The GRU provided CGE and a network of U.S.-based facilitators with financial support to: build and maintain its AI-support server; maintain a network of at least 100 websites used in its disinformation operations; and contribute to the rent cost of the apartment where the server is housed.”

Cybersecurity

Valery Mikhaylovich Korovin, a GRU officer, is alleged to have carried out these clandestine influence operations targeting the U.S. elections since at least 2024, coordinating financial support from the GRU to his employees and U.S.-based facilitators.

“The Government of the Russian Federation employs an array of tools, including covert foreign malign influence campaigns and illicit cyber activities, to undermine the national security and foreign policy interests of the United States and its allies and partners globally,” the Treasury said.

“The Kremlin has increasingly adapted its efforts to hide its involvement by developing a vast ecosystem of Russian proxy websites, fake online personas, and front organizations that give the false appearance of being independent news sources unconnected to the Russian state.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «the tools you need to combat ransomware in 2025dec 30, The Tools You Need to Combat Ransomware in 2025Dec 30, 2024Endpoint Security / WebinarDiscover proactive strategies to identify vulnerabilities, block encrypted threats, and prevent ransomware from infiltrating your network.
Next Post: New “DoubleClickjacking” Exploit Bypasses Clickjacking Protections on Major Websites new "doubleclickjacking" exploit bypasses clickjacking protections on major websites»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.