{"id":35644,"date":"2020-06-16T19:09:36","date_gmt":"2020-06-16T19:09:36","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31300\/Russian-Disinfo-Operation-Discovered-Dating-Back-To-2014.html"},"modified":"2020-06-16T19:09:36","modified_gmt":"2020-06-16T19:09:36","slug":"russian-disinfo-operation-discovered-dating-back-to-2014","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/russian-disinfo-operation-discovered-dating-back-to-2014\/","title":{"rendered":"Russian Disinfo Operation Discovered Dating Back To 2014"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/06\/16\/30148b0e-0130-4970-a16a-79d26fe970b7\/secondary-infektion.png\" class alt=\"secondary-infektion.png\"><\/span><span class=\"credit\">Image: Graphika<\/span><\/p>\n<p>Social media research group Graphika published today a 120-page report [<a href=\"https:\/\/secondaryinfektion.org\/downloads\/secondary-infektion-report.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">PDF<\/a>] unmasking a new Russian information operation of which very little has been known so far.<\/p>\n<p>Codenamed <a href=\"https:\/\/secondaryinfektion.org\/forgeries\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Secondary Infektion<\/a>, the group is different from the Internet Research Agency (IRA), the Sankt Petersburg company (troll farm) that has interfered in the US 2016 presidential election.<\/p>\n<p>Graphika says this new and separate group has been operating since 2014 and has been relying on fake news articles, fake leaks, and forged documents to generate political scandals in countries across Europe and North America.<\/p>\n<p>The research team says it&nbsp; first learned of the group from reports published by <a href=\"https:\/\/www.reddit.com\/r\/redditsecurity\/comments\/e74nml\/suspected_campaign_from_russia_on_reddit\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Reddit<\/a> and <a href=\"https:\/\/about.fb.com\/news\/2019\/05\/more-cib-from-russia\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Facebook<\/a> last year, along with previous research done by the <a href=\"https:\/\/medium.com\/dfrlab\/top-takes-suspected-russian-intelligence-operation-39212367d2f0\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Atlantic Council&#8217;s Digital Forensic Research Lab<\/a>.<\/p>\n<p>Graphika says that based on previous research, they&#8217;ve now tracked down more than 2,500 pieces of content the Secondary group Infektion has posted online since early 2014.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/super-secretive-russian-disinfo-operation-discovered-dating-back-to-2014\/\" class=\"lazy\" alt=\"graphika-timeline.png\" data-original=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2020\/06\/16\/92982aaf-3e85-4cfb-ae10-01e66e22bd18\/graphika-timeline.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2020\/06\/16\/92982aaf-3e85-4cfb-ae10-01e66e22bd18\/graphika-timeline.png\" class alt=\"graphika-timeline.png\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: Graphika<\/span> <\/p>\n<p>According to Graphika&#8217;s analysis, most of the group&#8217;s content has followed nine primary themes:<\/p>\n<ul>\n<li>Ukraine as a failed state or unreliable partner<\/li>\n<li>The United States and NATO as aggressive and interfering in other countries<\/li>\n<li>Europe as weak and divided<\/li>\n<li>Critics of the Russian government as morally corrupt, alcoholic, or otherwise mentally unstable<\/li>\n<li>Muslims as aggressive invaders<\/li>\n<li>The Russian government as the victim of Western hypocrisy or plots<\/li>\n<li>Western elections as rigged and candidates who criticized the Kremlin as unelectable<\/li>\n<li>Turkey as an aggressive and destabilizing state<\/li>\n<li>World sporting bodies and competitions as unfair, unprofessional, and Russophobic<\/li>\n<\/ul>\n<p>Graphika says that most of this content has been aimed at attacking classic Russian political rivals like Ukraine, the US, Poland, and Germany, but also other countries where Russian influence came under attack, at one point or another.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>Graphika said the group didn&#8217;t publish only in English, but also adapted to each target and published content in its local language. In total, researchers found content posted in seven languages.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/super-secretive-russian-disinfo-operation-discovered-dating-back-to-2014\/\" class=\"lazy\" alt=\"graphika-articles-per-country.jpg\" data-original=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2020\/06\/16\/3fa94b0c-ba12-4a47-a4f6-c6a2c3bb1eda\/graphika-articles-per-country.jpg\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2020\/06\/16\/3fa94b0c-ba12-4a47-a4f6-c6a2c3bb1eda\/graphika-articles-per-country.jpg\" class alt=\"graphika-articles-per-country.jpg\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: Graphika<\/span><\/p>\n<p>Unlike the IRA, which was primarily focused on creating division at the level of regular citizens, Secondary Infektion&#8217;s primary role appears to been to influence decisions at the highest level of foreign governments.<\/p>\n<p>This was done by attempting to influence political decisions by creating fake narratives, pitting Western countries against each other, and by embarrassing anti-Russian politicians using fake articles and <a href=\"https:\/\/secondaryinfektion.org\/forgeries\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">forged documents<\/a>.<\/p>\n<p>&#8220;The &#8216;leaks&#8217; typically exposed some dramatic geopolitical scandal, such as a prominent Kremlin critic&#8217;s corrupt dealings or secret American plans to overthrow pro-Kremlin governments around the world,&#8221; the Graphika team said today.<\/p>\n<p>The group had operations going during the US presidential elections in 2016, the French elections in 2017, and in Sweden in 2018, but election interferene was never the group&#8217;s primary target.<\/p>\n<p>Graphika said the group &#8220;aimed to exacerbate divisions between countries, trying to set Poles against Germans, Germans against Americans, Americans against Britons, and absolutely everyone against Ukrainians.&#8221;<\/p>\n<h3>Secondary Infektion liked blogs more than social media<br \/><\/h3>\n<p>Furthermore, another way in which Secondary Infektion differed from the more well-known IRA was that while the IRA was mostly active on social media networks, the Secodanry Infektion gang had a broader reach, with a lot of its content being published on blogs and news&nbsp; sites.<\/p>\n<p>Graphika said it found content published on more than 300 platforms, from social media giants such as Facebook, Twitter, YouTube, and Reddit to blogging platforms like WordPress and Medium, but also niche discussion forums in Pakistan and Australia.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/super-secretive-russian-disinfo-operation-discovered-dating-back-to-2014\/\" class=\"lazy\" alt=\"graphika-platforms.png\" data-original=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2020\/06\/16\/bd03d78b-fd91-4daa-aea4-4841a117ee79\/graphika-platforms.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2020\/06\/16\/bd03d78b-fd91-4daa-aea4-4841a117ee79\/graphika-platforms.png\" class alt=\"graphika-platforms.png\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: Graphika<\/span><\/p>\n<p>Graphika researchers also said Secondary Infektion was more advanced than the IRA. Unlike the sloppy IRA operators who were easily traced back to an exact building in Sankt Petersburg, Russia, the mystery about Secondary Infektion&#8217;s real identity remains unsolved.<\/p>\n<p>&#8220;[Secondary Infektion&#8217;s] identity is the single most pressing question to emerge from this study,&#8221; the Graphika team wrote in its report today.<\/p>\n<p>Researchers said the group managed to keep its identity secret because they paid very close attention to operational security (OpSec). Graphika says Secondary Infektion agents employed single-use burner accounts for almost everything they posted online, abandoning each account in less than an hour after promoting their content.<\/p>\n<p>This approach has made it more difficult for the group to build a dedicated audience but has allowed it to orchestrate high-impact operations for years, without giving away their infrastructure, modus operandi, and goals.<\/p>\n<p>With its identity still a secret, the group is expected to continue operating and sowing conflict between Russia&#8217;s rivals.<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31300\/Russian-Disinfo-Operation-Discovered-Dating-Back-To-2014.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":35645,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[2345],"class_list":["post-35644","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentusarussiafraudcyberwarspyware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Russian Disinfo Operation Discovered Dating Back To 2014 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/russian-disinfo-operation-discovered-dating-back-to-2014\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Russian Disinfo Operation Discovered Dating Back To 2014 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/russian-disinfo-operation-discovered-dating-back-to-2014\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-16T19:09:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/russian-disinfo-operation-discovered-dating-back-to-2014.png\" \/>\n\t<meta property=\"og:image:width\" content=\"999\" \/>\n\t<meta property=\"og:image:height\" content=\"549\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-disinfo-operation-discovered-dating-back-to-2014\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-disinfo-operation-discovered-dating-back-to-2014\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Russian Disinfo Operation Discovered Dating Back To 2014\",\"datePublished\":\"2020-06-16T19:09:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-disinfo-operation-discovered-dating-back-to-2014\\\/\"},\"wordCount\":743,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-disinfo-operation-discovered-dating-back-to-2014\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/russian-disinfo-operation-discovered-dating-back-to-2014.png\",\"keywords\":[\"headline,government,usa,russia,fraud,cyberwar,spyware\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-disinfo-operation-discovered-dating-back-to-2014\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-disinfo-operation-discovered-dating-back-to-2014\\\/\",\"name\":\"Russian Disinfo Operation Discovered Dating Back To 2014 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-disinfo-operation-discovered-dating-back-to-2014\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-disinfo-operation-discovered-dating-back-to-2014\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/russian-disinfo-operation-discovered-dating-back-to-2014.png\",\"datePublished\":\"2020-06-16T19:09:36+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-disinfo-operation-discovered-dating-back-to-2014\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-disinfo-operation-discovered-dating-back-to-2014\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-disinfo-operation-discovered-dating-back-to-2014\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/russian-disinfo-operation-discovered-dating-back-to-2014.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/russian-disinfo-operation-discovered-dating-back-to-2014.png\",\"width\":999,\"height\":549},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-disinfo-operation-discovered-dating-back-to-2014\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,usa,russia,fraud,cyberwar,spyware\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentusarussiafraudcyberwarspyware\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Russian Disinfo Operation Discovered Dating Back To 2014\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Russian Disinfo Operation Discovered Dating Back To 2014 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/russian-disinfo-operation-discovered-dating-back-to-2014\/","og_locale":"en_US","og_type":"article","og_title":"Russian Disinfo Operation Discovered Dating Back To 2014 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/russian-disinfo-operation-discovered-dating-back-to-2014\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-06-16T19:09:36+00:00","og_image":[{"width":999,"height":549,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/russian-disinfo-operation-discovered-dating-back-to-2014.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/russian-disinfo-operation-discovered-dating-back-to-2014\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/russian-disinfo-operation-discovered-dating-back-to-2014\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Russian Disinfo Operation Discovered Dating Back To 2014","datePublished":"2020-06-16T19:09:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/russian-disinfo-operation-discovered-dating-back-to-2014\/"},"wordCount":743,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/russian-disinfo-operation-discovered-dating-back-to-2014\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/russian-disinfo-operation-discovered-dating-back-to-2014.png","keywords":["headline,government,usa,russia,fraud,cyberwar,spyware"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/russian-disinfo-operation-discovered-dating-back-to-2014\/","url":"https:\/\/www.threatshub.org\/blog\/russian-disinfo-operation-discovered-dating-back-to-2014\/","name":"Russian Disinfo Operation Discovered Dating Back To 2014 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/russian-disinfo-operation-discovered-dating-back-to-2014\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/russian-disinfo-operation-discovered-dating-back-to-2014\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/russian-disinfo-operation-discovered-dating-back-to-2014.png","datePublished":"2020-06-16T19:09:36+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/russian-disinfo-operation-discovered-dating-back-to-2014\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/russian-disinfo-operation-discovered-dating-back-to-2014\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/russian-disinfo-operation-discovered-dating-back-to-2014\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/russian-disinfo-operation-discovered-dating-back-to-2014.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/russian-disinfo-operation-discovered-dating-back-to-2014.png","width":999,"height":549},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/russian-disinfo-operation-discovered-dating-back-to-2014\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,usa,russia,fraud,cyberwar,spyware","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentusarussiafraudcyberwarspyware\/"},{"@type":"ListItem","position":3,"name":"Russian Disinfo Operation Discovered Dating Back To 2014"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35644","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=35644"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35644\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/35645"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=35644"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=35644"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=35644"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}