State hackers: disinformation campaigns against Ukraine 

Share post

Research by Mandiant provides a comprehensive analysis of the various disinformation campaigns that have been observed since the Russian invasion of Ukraine began. New insights into those responsible for the attacks point to hacking groups supported by the Russian, Chinese and Iranian governments.

The report reveals new disinformation campaigns that have not previously been reported, makes new attributions to Chinese and Iranian hacker groups that have simultaneously launched their own disinformation campaigns, and illustrates that the various cyber attacks have been accompanied by disruptive and destructive military attacks on Ukraine.

Disinformation campaigns against Ukraine

One of the report's senior authors, Senior Analyst Alden Wahlstrom, summarizes the research as follows:

“Some of these activities are well known and have been reported. However, this new report highlights how well-known actors and campaigns can be used or refocused to pursue emerging security interests – including large-scale conflict. For years, analysts have documented that Ukraine is of major strategic interest to Russia and a testing ground for Russian cyberattacks that are then deployed elsewhere. Now we see pro-Russian actors using the tools and campaign infrastructure developed over time (in whole or in part) to target Ukraine.”

Key findings from Mandiant's research

🔎 Timeline of disinformation campaigns against Ukraine (Image: Mandiant).

  • Dubbed the “Secondary Infection,” the Russian influence campaign began before the invasion and continued to spread misinformation about President Volodymyr Zelenskyy thereafter.
  • A new ghostwriting operation, which Mandiant is publicly attributing to the group for the first time, used compromised documents to publish fake content. The aim: to spread the claim that a Polish criminal ring is taking organs from Ukrainian refugees for illegal trafficking in the European Union.
  • A pro-Iranian campaign previously unnamed by Mandiant is now being labeled "Roaming Mayfly" as it may be linked to Iran's "Endless Mayfly" influence campaign. Citizen Lab reported on this in 2019.
  • The pro-Chinese DRAGONBRIDGE campaign has changed its communication: it now produces content in English and Chinese, echoing the portrayals circulated by the Russian state media and influence campaigns.
More at Mandiant.com

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more