• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
meta disrupts influence ops targeting romania, azerbaijan, and taiwan with

Meta Disrupts Influence Ops Targeting Romania, Azerbaijan, and Taiwan with Fake Personas

You are here: Home / General Cyber Security News / Meta Disrupts Influence Ops Targeting Romania, Azerbaijan, and Taiwan with Fake Personas
May 30, 2025

Meta on Thursday revealed that it disrupted three covert influence operations originating from Iran, China, and Romania during the first quarter of 2025.

“We detected and removed these campaigns before they were able to build authentic audiences on our apps,” the social media giant said in its quarterly Adversarial Threat Report.

This included a network of 658 accounts on Facebook, 14 Pages, and two accounts on Instagram that targeted Romania across several platforms, including Meta’s services, TikTok, X, and YouTube. One of the pages in question had about 18,300 followers.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The threat actors behind the activity leveraged fake accounts to manage Facebook Pages, direct users to off-platform websites, and post comments on posts by politicians and news entities. The accounts masqueraded as locals living in Romania and posted content related to sports, travel, or local news.

Cybersecurity

While a majority of these comments did not receive any engagement from authentic audiences, Meta said these fictitious personas also had a corresponding presence on other platforms in an attempt to make them look credible.

“This campaign showed consistent operational security (OpSec) to conceal its origin and coordination, including by relying on proxy IP infrastructure,” the company noted. “The people behind this effort posted primarily in Romanian about news and current events, including elections in Romania.”

A second influence network disrupted by Meta originated from Iran and targeted Azeri-speaking audiences in Azerbaijan and Turkey across its platforms, X, and YouTube. It consisted of 17 accounts on Facebook, 22 FB Pages, and 21 accounts on Instagram.

The counterfeit accounts created by the operation were used to post content, including in Groups, manage Pages, and comment on the network’s own content so as to artificially inflate the popularity of the network’s content. Many of these accounts posed as female journalists and pro-Palestine activists.

“The operation also used popular hashtags like #palestine, #gaza, #starbucks, #instagram in their posts, as part of its spammy tactics in an attempt to insert themselves in the existing public discourse,” Meta said.

“The operators posted in Azeri about news and current events, including the Paris Olympics, Israel’s 2024 pager attacks, a boycott of American brands, and criticisms of the U.S., President Biden, and Israel’s actions in Gaza.”

The activity has been attributed to a known threat activity cluster dubbed Storm-2035, which Microsoft described in August 2024 as an Iranian network targeting U.S. voter groups with “polarizing messaging” on presidential candidates, LGBTQ rights, and the Israel-Hamas conflict.

In the intervening months, artificial intelligence (AI) company OpenAI also revealed that it banned ChatGPT accounts created by Storm-2035 to weaponize its chatbot for generating content to be shared on social media.

Cybersecurity

Lastly, Meta revealed that it removed 157 Facebook accounts, 19 Pages, one Group, and 17 accounts on Instagram to target audiences in Myanmar, Taiwan, and Japan. The threat actors behind the operation have been found to use AI to create profile photos and run an “account farm” to spin up new fake accounts.

The Chinese-origin activity encompassed three separate clusters, each reposting other users’ and their own content in English, Burmese, Mandarin, and Japanese about news and current events in the countries they targeted.

“In Myanmar, they posted about the need to end the ongoing conflict, criticized the civil resistance movements and shared supportive commentary about the military junta,” the company said.

“In Japan, the campaign criticized Japan’s government and its military ties with the U.S. In Taiwan, they posted claims that Taiwanese politicians and military leaders are corrupt, and ran Pages claiming to display posts submitted anonymously — in a likely attempt to create the impression of an authentic discourse.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «cybercriminals target ai users with malware loaded installers posing as popular Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools
Next Post: ConnectWise Hit by Cyberattack; Nation-State Actor Suspected in Targeted Breach connectwise hit by cyberattack; nation state actor suspected in targeted breach»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • 6 Steps to 24/7 In-House SOC Success
  • Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
  • 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
  • New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware
  • Secure Vibe Coding: The Complete New Guide
  • Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session
  • Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.