{"id":57032,"date":"2024-09-06T15:15:13","date_gmt":"2024-09-06T15:15:13","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/36305\/Russian-Doppelganger-Campaign-Exposed.html"},"modified":"2024-09-06T15:15:13","modified_gmt":"2024-09-06T15:15:13","slug":"russian-doppelganger-campaign-exposed","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/russian-doppelganger-campaign-exposed\/","title":{"rendered":"Russian Doppelganger Campaign Exposed"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2024\/09\/AdobeStock_476099547.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Inner workings of the Russian nation-state \u201cDoppelganger\u201d influence <a href=\"https:\/\/www.justice.gov\/opa\/pr\/justice-department-disrupts-covert-russian-government-sponsored-foreign-malign-influence\" target=\"_blank\" rel=\"noreferrer noopener\">campaign were exposed Wednesday<\/a> when the U.S. Department of Justice (DOJ) <a href=\"https:\/\/www.justice.gov\/opa\/media\/1366261\/dl\" target=\"_blank\" rel=\"noreferrer noopener\">published an affidavit<\/a> detailing internal documents, web domains and online accounts used in the campaign.<\/p>\n<p>The DOJ is in the process of seizing 32 internet domains used by three Russian government-sponsored organizations \u2014 Social Design Agency (SDA), Structura National Technology and ANO Dialog \u2014 to spread disinformation in support of Russian interests, which included efforts to influence U.S. voters ahead of the 2024 presidential election.<\/p>\n<p>\u201cThe influence operation landscape has changed significantly since previous elections. New technologies and techniques have been employed by adversarial actors, we\u2019ve seen the rise of disinformation-as-a-service and financially motivated actors, and we\u2019re beginning to see the use of generative AI technologies, though their employment has so far been limited,\u201d Lisa Kaplan, CEO of online risk mitigation technology company Alethea, told SC Media.<\/p>\n<h2>How Doppelganger group used cybersquatting, social media in propaganda campaigns<\/h2>\n<p>Doppelganger has been active since at least 2022 and is tied to multiple individuals known to be working under the direction of the Russian Presidential Administration of Vladimir Putin, including First Deputy Chief of Staff of the Presidential Executive office Sergei Vladilenovich Kiriyenko.<\/p>\n<p>Kiriyenko and other individuals listed in the affidavit were previously sanctioned pursuant to executive orders declaring a national emergency regarding conflict between Russia and Ukraine, making their use of U.S.-based domains a violation of the International Emergency Economic Powers Act (IEEPA), DOJ authorities said.<\/p>\n<p>Additionally, several domains were seized on the grounds of trademark infringement, as they hosted websites designed to impersonate legitimate news sites such as The Washington Post and Fox News.<\/p>\n<p>Doppelganger used cybersquatted domains such as washingtonpost[.]pm and fox-news[.]top to host web pages nearly identical in appearance to the real publications, but containing articles designed to sway the reader\u2019s sentiment toward positions favorable to Russian interests. For example, some articles portrayed the United States\u2019 support of Ukraine in a negative light, while others sought to arouse negative feelings toward particular U.S. political candidates or parties. &nbsp;<\/p>\n<p>Links to these articles were spread through thousands of comments on social media sites, posted by accounts with fake identities that hid their Russian origins. Internal documents circulated by members of the Doppelganger group revealed at least three distinct campaigns. For example, one document outlined the creation of a \u201cmeme factor\u201d with the goal of posting about 200 memes about the Russia-Ukraine conflict per month.<\/p>\n<p>Doppelganger also monitored and targeted online influencers and worked with internet personalities to spread content supporting the campaign\u2019s agenda. Further details of this social media influencer campaign were revealed in <a href=\"https:\/\/www.justice.gov\/opa\/media\/1366266\/dl\" target=\"_blank\" rel=\"noreferrer noopener\">an indictment<\/a> also published Wednesday, which was <a href=\"https:\/\/www.justice.gov\/opa\/pr\/two-rt-employees-indicted-covertly-funding-and-directing-us-company-published-thousands\" target=\"_blank\" rel=\"noreferrer noopener\">filed against Kostiantyn Kalashnikov and Elena Afanasyeva<\/a>, both employees of the Russia-controlled RT media outlet (formerly known as Russia Today).<\/p>\n<p>The indictment alleges that the defendants spent nearly $10 million to create and distribute propaganda content through the social media channels of a Tennessee-based content creation company, garnering millions of views. While not named or charged in the indictment, the U.S. media company that published the content has been <a href=\"https:\/\/apnews.com\/article\/russian-interference-presidential-election-influencers-trump-999435273dd39edf7468c6aa34fad5dd\" target=\"_blank\" rel=\"noreferrer noopener\">identified by reporters<\/a> as Tenet Media.<\/p>\n<p>\u201cThe indictment and sanctioning of those involved in the Tenet Media operation and its links to state media outlet Russia Today increases education and awareness of the public, as well as with the media and influencers who may be unwittingly approached by state adversaries,\u201d said Kaplan. \u201cThe better the problem is understood, the better equipped democracies are at inoculating their citizens to the potential ill effects of malign foreign influence.\u201d<\/p>\n<h2>Will generative AI worsen election disinformation?<\/h2>\n<p>Doppelganger was previously revealed to have used OpenAI\u2019s ChatGPT to generate anti-Ukraine and anti-U.S. comments on the X and 9GAG social media sites earlier this year, although many of these comments were quickly called out as being from \u201cRussian bots\u201d by other users, <a href=\"https:\/\/www.scmagazine.com\/news\/openai-report-reveals-threat-actors-using-chatgpt-in-influence-operations\" target=\"_blank\" rel=\"noreferrer noopener\">OpenAI noted in a May 2024 report<\/a>.<\/p>\n<p>The DOJ\u2019s affidavit noted that Doppelganger also used generative AI to create content for social media ads targeting U.S. politicians and identified five OpenAI accounts used to generate and edit articles and comments.<\/p>\n<p>While the role of AI in the Doppelganger campaign was relatively small, it marks a continuing evolution in influence campaigns between past elections and 2024 U.S. election season, Sean Guillory, Lead Scientist for Booz Allen Hamilton\u2019s Cognitive Domain\/Dimension Products and Capabilities, told SC Media. AI-enhanced versions of <a href=\"https:\/\/www.scmagazine.com\/news\/facebook-says-russian-troll-farm-bought-placed-ads-during-2016-campaign\" target=\"_blank\" rel=\"noreferrer noopener\">\u201cRussian Troll Farms\u201d<\/a> could potentially serve propaganda to a wider audience at lower effort and cost.<\/p>\n<p>\u201cIn the run up to the 2015 election, Troll Farms were able to reach 140 million Americans a month. The adoption of Generative AI and Large Language Models has the potential to see this accelerate far beyond 2016. Now, LLMs have the potential to significantly increase the \u2018bang for the buck\u2019 in disinformation campaigns,\u201d said Guillory.<\/p>\n<p>Guillory said tools like GPTZero, an AI-powered tool that can help detect content generated by ChatGPT, is one example of the technology that can be utilized in the battle against disinformation this election season.<\/p>\n<p>\u201cAnother effort to combat disinformation is the DISARM Foundation, an organization established to build a common framework similar to the MITRE ATT&amp;CK framework for cybersecurity. The DISARM Framework is an attempt to use an understanding of adversarial tactics, techniques, and procedures for crafting and executing disinformation campaigns to find ways to detect and mitigate or disrupt them,\u201d Guillory said.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/36305\/Russian-Doppelganger-Campaign-Exposed.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":57033,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[11035],"class_list":["post-57032","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackergovernmentrussiacybercrimefraudcyberwar"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Russian Doppelganger Campaign Exposed 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/russian-doppelganger-campaign-exposed\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Russian Doppelganger Campaign Exposed 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/russian-doppelganger-campaign-exposed\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-06T15:15:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2024\/09\/AdobeStock_476099547.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-doppelganger-campaign-exposed\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-doppelganger-campaign-exposed\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Russian Doppelganger Campaign Exposed\",\"datePublished\":\"2024-09-06T15:15:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-doppelganger-campaign-exposed\\\/\"},\"wordCount\":902,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-doppelganger-campaign-exposed\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/russian-doppelganger-campaign-exposed.jpg\",\"keywords\":[\"headline,hacker,government,russia,cybercrime,fraud,cyberwar\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-doppelganger-campaign-exposed\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-doppelganger-campaign-exposed\\\/\",\"name\":\"Russian Doppelganger Campaign Exposed 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-doppelganger-campaign-exposed\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-doppelganger-campaign-exposed\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/russian-doppelganger-campaign-exposed.jpg\",\"datePublished\":\"2024-09-06T15:15:13+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-doppelganger-campaign-exposed\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-doppelganger-campaign-exposed\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-doppelganger-campaign-exposed\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/russian-doppelganger-campaign-exposed.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/russian-doppelganger-campaign-exposed.jpg\",\"width\":800,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-doppelganger-campaign-exposed\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,government,russia,cybercrime,fraud,cyberwar\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackergovernmentrussiacybercrimefraudcyberwar\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Russian Doppelganger Campaign Exposed\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Russian Doppelganger Campaign Exposed 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/russian-doppelganger-campaign-exposed\/","og_locale":"en_US","og_type":"article","og_title":"Russian Doppelganger Campaign Exposed 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/russian-doppelganger-campaign-exposed\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-09-06T15:15:13+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2024\/09\/AdobeStock_476099547.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/russian-doppelganger-campaign-exposed\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/russian-doppelganger-campaign-exposed\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Russian Doppelganger Campaign Exposed","datePublished":"2024-09-06T15:15:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/russian-doppelganger-campaign-exposed\/"},"wordCount":902,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/russian-doppelganger-campaign-exposed\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/09\/russian-doppelganger-campaign-exposed.jpg","keywords":["headline,hacker,government,russia,cybercrime,fraud,cyberwar"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/russian-doppelganger-campaign-exposed\/","url":"https:\/\/www.threatshub.org\/blog\/russian-doppelganger-campaign-exposed\/","name":"Russian Doppelganger Campaign Exposed 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/russian-doppelganger-campaign-exposed\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/russian-doppelganger-campaign-exposed\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/09\/russian-doppelganger-campaign-exposed.jpg","datePublished":"2024-09-06T15:15:13+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/russian-doppelganger-campaign-exposed\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/russian-doppelganger-campaign-exposed\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/russian-doppelganger-campaign-exposed\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/09\/russian-doppelganger-campaign-exposed.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/09\/russian-doppelganger-campaign-exposed.jpg","width":800,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/russian-doppelganger-campaign-exposed\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,government,russia,cybercrime,fraud,cyberwar","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentrussiacybercrimefraudcyberwar\/"},{"@type":"ListItem","position":3,"name":"Russian Doppelganger Campaign Exposed"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57032","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=57032"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57032\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/57033"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=57032"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=57032"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=57032"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}