• Book Dewayne Hart
  • Dewaynehart@dewaynehart.com
  • (470) 409 8316
  • Speaker Bio
  • Home
  • About
  • Speaker
  • Books
  • Podcast
  • Contact
  • Blog
  • Home
  • About
  • Speaker
  • Books
  • Podcast
  • Contact
  • Blog
Facebook-f Linkedin-in Youtube X-twitter Globe
Order books

AI-Powered Fake News Campaign Targets Western Support for Ukraine and U.S. Elections

Posted on November 29, 2024 by admin

[ad_1]

Nov 29, 2024Ravie LakshmananDisinformation / Artificial Intelligence

Ukraine and U.S. Elections

A Moscow-based company sanctioned by the U.S. earlier this year has been linked to yet another influence operation designed to turn public opinion against Ukraine and erode Western support since at least December 2023.

The covert campaign undertaken by Social Design Agency (SDA), leverages videos enhanced using artificial intelligence (AI) and bogus websites impersonating reputable news sources to target audiences across Ukraine, Europe, and the U.S. It has been dubbed Operation Undercut by Recorded Future’s Insikt Group.

“This operation, running in tandem with other campaigns like Doppelganger, is designed to discredit Ukraine’s leadership, question the effectiveness of Western aid, and stir socio-political tensions,” the cybersecurity company said.

“The campaign also seeks to shape narratives around the 2024 U.S. elections and geopolitical conflicts, such as the Israel-Gaza situation, to deepen divisions.”

Cybersecurity

Social Design Agency has been previously attributed to Doppelganger, which also employs social media accounts and a network of inauthentic news sites to sway public opinion. The company and its founders were sanctioned by the U.S. earlier this March, alongside another Russian company known as Structura.

Operation Undercut shares infrastructure with both Doppelganger and Operation Overload (aka Matryoshka and Storm-1679), a Russia-aligned influence campaign that has attempted to undermine the 2024 French elections, the Paris Olympics, and the U.S. presidential election using a combination of fake news sites, false fact-checking resources, and AI-generated audio.

Ukraine and U.S. Elections

The latest campaign is no different in that it abuses the trust users place on trusted media brands and leverages AI-powered videos and images mimicking media sources to lend it more credibility. No less than 500 accounts spanning various social media platforms, such as 9gag and America’s best pics and videos, have been used to amplify the content.

Furthermore, the operation has been found to use trending hashtags in targeted countries and languages to reach a bigger audience, as well as promote content from CopyCop (aka Storm-1516).

“Operation Undercut is part of Russia’s broader strategy to destabilize Western alliances and portray Ukraine’s leadership as ineffective and corrupt,” Recorded Future said. “By targeting audiences in Europe and the U.S., the SDA seeks to amplify anti-Ukraine sentiment, hoping to reduce the flow of Western military aid to Ukraine.”

APT28 Conducts Nearest Neighbor Attack

The disclosure comes as the Russia-linked APT28 (aka GruesomeLarch) threat actor has been observed breaching a U.S. company in early February 2022 through an unusual technique called the nearest neighbor attack that involved first compromising a different entity located in an adjacent building located within the Wi-Fi range of the target.

The end goal of the attack aimed at the unnamed organization, which took place just ahead of Russia’s invasion of Ukraine, was to collect data from individuals with expertise on and projects actively involving the nation.

Cybersecurity

“GruesomeLarch was able to ultimately breach [the organization’s] network by connecting to their enterprise Wi-Fi network,” Volexity said. “The threat actor accomplished this by daisy-chaining their approach to compromise multiple organizations in close proximity to their intended target.”

The attack is said to have been accomplished by conducting password-spray attacks against a public-facing service on the company’s network to obtain valid wireless credentials, and taking advantage of the fact that connecting to the enterprise Wi-Fi network did not require multi-factor authentication.

Ukraine and U.S. Elections

The strategy, Volexity said, was to breach the second organization located across the street from the target and use it as a conduit to laterally move across its network and ultimately connect to the intended company’s Wi-Fi network by supplying the previously obtained credentials, while being thousands of miles away.

“The compromise of these credentials alone did not yield access to the customer’s environment, as all internet-facing resources required use of multi-factor authentication,” Sean Koessel, Steven Adair, and Tom Lancaster said. “However, the Wi-Fi network was not protected by MFA, meaning proximity to the target network and valid credentials were the only requirements to connect.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



[ad_2]

Recent Posts

  • Secure to Scale: 7 Executive Strategies to Align Cybersecurity With Business Growth
  • No Blind Spots: A Veteran’s Blueprint to Protect Critical Infrastructure
  • Cybersecurity as a Growth Lever: A Board-Ready Playbook for CIOs and CTOs
  • From Reaction to Readiness: Building a Cybersecurity Mindset for Proactive Defense
  • Cybersecurity Leadership in 2026: Executive Decisions that Drive Resilience and Growth

Recent Comments

No comments to show.

Archives

  • March 2026
  • February 2026
  • July 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023

Categories

  • Cyber News
  • Uncategorized

Book Dewayne Hart for your next event

  • Dewaynehart@dewaynehart.com
  • (470) 409 8316
Facebook-f Linkedin-in Youtube X-twitter Globe
© 2025 Dewayne Hart | Cybersecurity Leadership & Innovation
no_deposit_bonus