Saturday, December 9, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

Facebook Parent Meta Links Influence Campaign to US Military

Researcher by Researcher
November 25, 2022
in Cybersecurity
0
High-Severity Flaw in Argo CD is Information Leak Risk
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Facebook parent Meta has tied a recent influence operation powered by tens of accounts, pages and groups to the United States military.

The social media giant on Tuesday released its adversarial threat report for the third quarter of 2022. During Q3, in addition to disrupting operations linked to Chinese and Russian threat actors, the company disrupted an operation that has been connected to the United States.

According to Meta, the operation that originated in the US focused on countries such as Afghanistan, Algeria, Iran, Iraq, Kazakhstan, Kyrgyzstan, Russia, Somalia, Syria, Tajikistan, Uzbekistan and Yemen.

Meta has removed 39 Facebook accounts, 16 pages, and two groups, as well as 26 Instagram accounts related to this operation for violating policies on coordinated inauthentic behavior. However, the company said the campaign actually ran across multiple online services, including YouTube, Twitter, Telegram and the Russian social media sites Odnoklassniki and VKontakte.

According to the social media giant, the influence operation involved posts written mainly in Arabic, Farsi and Russian, covering news, sports, culture and current events. Some of the posts praised the US military while others criticized Iran, Russia and China, including Iran’s influence in the Middle East, China’s treatment of the Uyghurs, and Russia’s war against Ukraine.

Data collected by the company shows that roughly 22,000 accounts had followed one or more of the offending Facebook pages, and 400 accounts joined at least one of the groups. Around 12,000 accounts followed one or more of the instagram accounts. Approximately $2,500 was spent for Facebook ads — the money was paid in British pounds and US dollars.

However, a majority of the posts published as part of the operation had little to no genuine engagement.

“Although the people behind this operation attempted to conceal their identities and coordination, our investigation found links to individuals associated with the US military,” Meta said.

This campaign was previously detailed in August by Graphika and the Stanford Internet Observatory (SIO), in a report focusing on pro-Western covert influence operations observed over a period of five years. The report did not explicitly say that the US military was behind some of the operations, but the US military was mentioned.

After the report was published, The Washington Post reported that these influence operations had raised concerns in the White House, and the Pentagon had ordered an audit into how clandestine information warfare is conducted.

Meta regularly releases reports detailing the actions taken against misinformation campaigns, but it’s rare for the United States to be named as a source of these campaigns.

Related: Facebook Battles Cyber Campaigns Targeting Ukraine

Related: Facebook Removes More State-Linked Misleading Accounts

Related: Facebook, Twitter Take Down More State-Linked Accounts

view counter

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Previous Columns by Eduard Kovacs:
Tags:





Source link

Related articles

Sentra Raises $30 Million for DSPM Technology

Northern Ireland’s Top Police Officer Apologizes for ‘Industrial Scale’ Data Breach

August 13, 2023
Minimizing Risk Through Proactive Apple Device Management: Addigy

Minimizing Risk Through Proactive Apple Device Management: Addigy

August 12, 2023
Tags: campaignFacebookinfluenceLinksMetaMilitaryparent
Share76Tweet47

Related Posts

Sentra Raises $30 Million for DSPM Technology

Northern Ireland’s Top Police Officer Apologizes for ‘Industrial Scale’ Data Breach

August 13, 2023
0

Northern Ireland’s top police officer apologized Thursday for what he described as an “industrial scale” data breach in which the...

Minimizing Risk Through Proactive Apple Device Management: Addigy

Minimizing Risk Through Proactive Apple Device Management: Addigy

August 12, 2023
0

Enterprise IT teams are struggling to cope with three major forces of change: the evolving regulatory environment, a globally dispersed...

Decipher Podcast: Katelyn Bowden and TC Johnson

Decipher Podcast: Katelyn Bowden and TC Johnson

August 12, 2023
0

Veilid main site: https://veilid.com/ Cult of the Dead Cow site: https://cultdeadcow.com/ Source link

In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack 

In Other News: macOS Security Reports, Keyboard Spying, VPN Vulnerabilities

August 12, 2023
0

SecurityWeek is publishing a weekly cybersecurity roundup that provides a concise compilation of noteworthy stories that might have slipped under...

Used Correctly, Generative AI is a Boon for Cybersecurity

Used Correctly, Generative AI is a Boon for Cybersecurity

August 12, 2023
0

Adobe stock, by Busra At the Black Hat kickoff keynote on Wednesday, Jeff Moss (AKA Dark Tangent), the founder of...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
Microsoft to Block Macros by Default in Office Apps

Qakbot Email Thread Hijacking Attacks Drop Multiple Payloads

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
This Mini Router Gives You Lifetime Wi-Fi and VPN Coverage for $599.99

This Mini Router Gives You Lifetime Wi-Fi and VPN Coverage for $599.99

December 8, 2023
To tap or not to tap: Are NFC payments safer?

To tap or not to tap: Are NFC payments safer?

December 8, 2023
FinTech Connect Europe 2023: Day Two Roundup

FinTech Connect Europe 2023: Day Two Roundup

December 8, 2023
FinTech Scotland Celebrates New ‘Cluster Excellence’ Accreditation

FinTech Scotland Launches FRIL To Aid in ESG, AI and More Regulation

December 8, 2023

Recent Posts

This Mini Router Gives You Lifetime Wi-Fi and VPN Coverage for $599.99

This Mini Router Gives You Lifetime Wi-Fi and VPN Coverage for $599.99

December 8, 2023
To tap or not to tap: Are NFC payments safer?

To tap or not to tap: Are NFC payments safer?

December 8, 2023
FinTech Connect Europe 2023: Day Two Roundup

FinTech Connect Europe 2023: Day Two Roundup

December 8, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cyber Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved