Skip to content

Understanding Coordinated Inauthentic Behavior (CIB): What it is and How it Impacts the General Public

The term Coordinated Inauthentic Behavior (CIB) is used frequently in the news to describe the propagation of misinformation, misrepresentation, and other types of negative online influence operations. As seen in the news as of late, reports of CIB have recently led to the large-scale removal of accounts and pages on social media platforms. An example of CIB could be a political news site purportedly headquartered in America but operates from Macedonia or a Russian-created social media account. The said account might use a fictitious name as well as random images as a way to feign American perspectives blogging about US politics. 

It can take the following two forms:

  1. Coordinated inauthentic behavior (CIB) regarding domestic non-government campaigns
  2. Coordinated inauthentic behavior in the case of a foreign or government actor, termed as Foreign or Government Interference (FGI)

The objectives of both variants are the same. They are a part of larger coordinated campaigns that seek to influence public perspectives across social media platforms to further their agendas, both politically and socially.

What is Coordinated Inauthentic Behavior (CIB)?

Any domestic, non-government initiatives/campaigns that comprise groups of accounts and pages on the internet, especially social media, aiming to deceive people regarding who they are and what they do is often regarded as Coordinated Inauthentic Behavior (CIB). Whether they are accounts, pages, or groups, such behavior occurs when numerous bogus identities/personas collaborate to promote a specific idea/item or media subject with an ulterior  intent. It comprises influence operations aimed at manipulating public opinion for a strategic purpose. Their objective could be financial or political. For instance, during the Covid-19 outbreak, a network of web pages was active in spreading coronavirus misinformation.

What Impact Does CIB Have on the Regular Public?

Coordinated Inauthentic Behavior intends to manipulate public debate, push users towards political and social extremes, and inevitably lead to inter-community and inter-religious opinion clashes. The goal of CIB is to sway public opinion or coerce users with financial scams (if the objective is financial exploitation).

The potential for misinformation to impact international politics and public opinion is large, and has proven time and time again. CIB goes a step further, intentionally targeting and misleading individuals instead of merely propagating false news. A large problem with CIB lies in its ability to shift public opinion in such a short period of time, therefore making the removal of said account almost useless in the long term as its original goal has been accomplished. 

Identifying CIB on Facebook and Other Social Media Platforms

In recent years, the global increase of trolls and bots that manipulate public discussions on social media has caused significant challenges for political elections, natural disaster communication systems, and global health emergencies such as  the Covid-19 pandemic. However, progress has been made in using standard supervised learning to combat adversaries.

If you know where to look, coordinated inauthentic behavior by people and organizations on social media is simple to spot. Different indications on Facebook pages and groups, like those mentioned below, can help users better comprehend the data they’re viewing and the intentions of those behind it.

  1. The Section on ‘Page Transparency’

Every Facebook page features a “Page Transparency” feature that allows viewers to see countries from which the page admins upload information. The section is available on both mobile and desktop views. However, this option does not apply to Facebook groups.

  1. Posts with Multiple ‘Like and Share’ Requests Might Signal a Problem

It might indicate organized inauthentic conduct if a page is overloaded with photographs and memes urging users to like and share the content. According to Snopes’ study, though it does not always point towards questionable activity, an overload of this type of media is frequently associated  with inauthentic pages trying to gain more traction.

  1. ‘Blue Ticked’ Verified Pages

Blue badges appear next to the group or profile name on verified pages. Be it on Facebook, Twitter, or Instagram, the blue tick next to the user’s profile name represents an authenticated account. If you see one of these, it implies that the page or profile belongs to an authorized individual or organization. An unverified page, i.e., one without the blue badge representing your favorite celebrity asking for money for some social cause, is unlikely to be genuine. Being more cautious about what accounts are acting as certain organizations or people is an important part of staying safe online. 

  1. Check the ‘Page Creation Date’ 

Check the date the page/group/profile was created, especially for politically focused forums involving serious debates. For instance, it is a red flag if a page regarding some hot-button American political issue was created merely a week ago and shows that the real page managers are people from another nation. It takes time for outsiders to get involved in a country’s debate on a serious domestic issue. You can click the “Page Transparency” link on a page or the “About” tab in a group to determine the creation date.

  1. Examine the Administrators and Moderators of a Facebook Community

Since the Facebook groups (but not pages) disclose their administrators, moderators, and members, you may check the “Members” section on a group to check who is operating it and whether the admins appear to be authenticated individuals.

Examples/Case Studies of CIB

The following are a few well-known campaigns involving CIB that occurred in recent times. 

  1. #SaveTheChildren Campaign

The #SaveTheChildren campaign purposefully propagated the notion that a “cabal” of celebrities and political figures participated in satanic, ritual sexual assault of children worldwide.

In 2020, a conspiracy protest movement known as #SaveTheChildren surged throughout the United States, Canada, the United Kingdom, and Europe, sparking hundreds of in-person marches and protests. The #SaveTheChildren campaign’s claimed purpose was to raise awareness about the atrocities of “child sex trafficking.” 

The main inspiration behind the campaign was the QAnon conspiracy movement, which started in October 2017 by an anonymous 4chan website user later known as “Q.” They had claimed to be privy to top-secret government intel suggesting that Hillary Clinton was wanted by the Federal government and was about to be arrested, among other fraudulent theories.

  1. Ebola and the United States Border

Brian Kolfage, a Trump supporter and anti-immigrant activist, raised millions of dollars in internet donations to build a wall at the US-Mexico border. After two days, when the US government ordered the work to be stopped, he tweeted that an “insider” had notified him that there were nine migrants with “proven” Ebola cases at the Texas border due to which construction had been stopped. This assertion was false, but the Ebola hoax quickly spread across the country on social media and in right-wing organizations. 

He used disinformation to promote panic as a way to exploit the issue of immigration and gather support for his political aim of curbing immigration—a long-standing pledge of then-US President Donald Trump. 

  1. The Milk Tea Alliance 

It is an online multinational network of young people manipulating the media under the hashtag #MilkTeaAlliance. Youngsters from Thailand, Hong Kong, Taiwan, and Myanmar are among its supporters. The alliance uses the hashtag #MilkTeaAlliance to combat what they see as authoritarianism, either directed at the CCP (Chinese Communist Party) or their governments.

It surfaced in April 2020, following the commencement of an online campaign by pro-Chinese Communist Party (CCP) accounts to harass a Thai celebrity and his fans. A loosely organized group of young, largely Southeast Asian, pro-democracy netizens banded together, culminating in a meme war between the two sides on Twitter.

  1. The Antifa Fires Rumor

During the Oregon wildfires in September 2020, allegations circulated locally and globally that left-wing activists were to blame. The evidence alleging “anti-fa” involvement was based on a series of misinterpretations made by public authorities. The rumor was boosted by far-right political influencers, bogus Antifa Twitter accounts, and various anonymous trolling communities on the 4chan website.

  1. Hammer” and “Scorecard

The 2020 US presidential election was disturbed by unfounded accusations of widespread voting fraud, promoted by former President Donald Trump, whose allegations came to be known as “the big lie.” The idea that prompted this coordinated behavior is said to have included two aspects, Hammer and Scorecard, where an alleged government-run supercomputer called “Hammer,” and the system software, the “Scorecard” worked in tandem… The allegation was that the “Hammer and Scorecard” operation influenced real votes across the country in favor of President Joe Biden.

Final Words

With the ever increasing accessibility and widespread popularity of the internet and social media, influence operations and new deceptive behaviors will continue to emerge and spread despite pertinent regulations. Social media networks must continue to work to identify and stop Coordinated Inauthentic Behavior or CIB campaigns and any other kind of large-scale misinformation campaigns. However, as previously noted, users must also stay educated and cautious about the phenomenon. It will help them recognize CIB activity and take precautions to avoid falling into traps.

References

  1. Aziz, Z. (2020, November 2). What is Coordinated Inauthentic Behavior? Nisos. https://www.nisos.com/blog/what-is-coordinated-inauthentic-behavior/
  2. Meta. (2018, December 6). Coordinated inauthentic behavior

https://about.fb.com/news/tag/coordinated-inauthentic-behavior/

  1. Graham, T. (2020, May 29). Detecting and analyzing coordinated inauthentic behavior on social media. QUT Centre for Data Science. 

https://research.qut.edu.au/qutcds/events/detecting-and-analysing-coordinated-inauthentic-behaviour-on-social-media/

  1. Gleicher, N. (2018, December 6). Coordinated inauthentic behavior explained. Meta. https://about.fb.com/news/2018/12/inside-feed-coordinated-inauthentic-behavior/
  2. Johnson, S. (2021, December 21). How to spot ‘coordinated inauthentic behavior’ on Facebook, according to Snopes. Lifehacker. 

https://lifehacker.com/how-to-spot-coordinated-inauthentic-behavior-on-faceb-1848253059

  1. McGregor, S. (2020, September 17). What even is ‘coordinated inauthentic behavior’ on platforms? Wired

https://www.wired.com/story/what-even-is-coordinated-inauthentic-behavior-on-platforms/

#CIB #Facebook #vicarius_blog

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About VRX
VRX is a consolidated vulnerability management platform that protects assets in real time. Its rich, integrated features efficiently pinpoint and remediate the largest risks to your cyber infrastructure. Resolve the most pressing threats with efficient automation features and precise contextual analysis.

How To Protect Your Enterprise Network From Zero-Day Attacks

Organizations handle cybersecurity issues from varying perspectives. It is the precise reason they apply different strategies for fulfilling security objectives. The goal notwithstanding, one essential element to consider is combating the compounding surge in vulnerabilities. While fixing all may look like a ‘wild goose chase,’ adopting a sustainable approach is the way to go.

At the moment, top managers of companies are more focused on cyber risk than severity levels for security issues. However, the topic encapsulates all potential business losses – financial, operational, reputation, regulatory, and more. Therefore, it becomes necessary to stress that cyber risks are business risks…hence the shift to risk-based security models.

Analyzing Vulnerabilities, Threats, & Risks

In today’s world, data and its protection involve three critical factors for any business. Customers need security guarantees for their personal information. Every organization needs to focus on the issues bordering on cyber security threats, vulnerabilities, and risks. Therefore, it becomes expedient to understand how the three components intertwine fully. The information helps to give a firm grasp on data security issues, along with a focus on the appropriate area for full-service delivery.

  • Threat: Focuses on a new incident with the potential to harm a system or the entire organization. It could take any of these three forms; natural, intentional, or unintentional. Cybercriminals constantly devise new and creative ways to compromise data. When organizations take measures to assess threats regularly, they become well prepared for them.
  • Vulnerability: Refers to a known weakness of a resource prone to exploitation by cybercriminals. An understanding of this crucial aspect is the first step to managing risks. You can begin with vulnerability testing. It is a great way to ensure the constant security of a company’s system. When the weak point gets identified, developing a strategy becomes easy.
  • Risk: Refers to losing the integrity, availability, or confidentiality of data or information systems when a vulnerability is exploited. It often results in an adverse impact on the operations and assets of an organization.

Cybersecurity risks come in various forms and can evolve at an alarming pace. It is the reason why risk management has become a never-ending responsibility. The goal is to prevent financial or reputational damage in a data breach or cyber-attack.

Risk-Based Security: A Safety & Soundness Process

Data is always the primary target for most cyber actors, and it’s an arduous task to defend against every threat. Over the years, organizations focused their resources and budget on security technologies like anti-virus, firewalls,SIEMs, and more. They have become more concerned with detecting and preventing security incidents.

Subsequently, the level of complexity and the increased threat of mobile and IoT devices have made this focus obsolete. The current level of risk is too high, and it is vital for top management to focus on risk reduction through data analysis and rapid incident response.

A risk-based security approach covers five key elements:

I. Attack Surface Visibility & Context

An attack surface is a collection of all attacker-exposed assets. It covers all resources in areas like the cloud, third-party environments, or the company’s subsidiaries.

One critical security issue is being unaware of the exact location of an organization’s assets or digital infrastructure. As a result, some companies cannot tell whether these assets are fully protected. It is a phenomenon called a shadow risk. The implication is that unmanaged assets become easy access points for attackers. Therefore, organizations must expose all shadow risks by assessing and mapping their attack surface.

The truth is this; you can’t protect what you don’t see. So it’s time to make your data work harder. One effective way to carry this out is through attack surface analysis and management. As a universally recognized approach, it is the foundational step necessary for guiding resource investments and security programs. Moreover, organizations need to implement a context-aware change management approach. That way, there can be a balance for rapid changes in all infrastructure and supporting infrastructure.

II. Breach and Attack Simulation

A breach and attack simulation is an advanced computer security testing method. You may call it the “hack-yourself” approach. However, security is never static, so you stay on top of the ever-changing trends.

Attack simulations identify vulnerabilities by mimicking cyber actors’ plausible techniques and attack paths. The approach provides a continuous, automated penetration test. It also improves the previous limitations of red and blue team testing.

This technology tracks and resolves vulnerabilities, and also gives regular updates and alerts on imminent risks to your network. It also runs on a 24/7 basis and gives organizations deeper visibility of their defense-readiness level.

III. Cybersecurity Risk Scoring

A cyber risk score focuses on the evaluation of a security posture. It aims to convert these evaluations into a simplified, comprehensive risk score. The concept of security posture helps organizations know the level of asset safety they possess. That way, they know the area to focus on for improvements .

An organization that takes such concrete steps shows they are meeting its cybersecurity obligations. In another sense, it leads to increased revenue generation. The reason is that customers and partners view security as a competitive differentiator. Scoring has therefore become an essential aspect.

IV. Cyber Exposure Management

Cyber exposure management helps organizations identify, predict, and take action against risks. The discipline hinges on risk-based vulnerability management. That way, you continuously assess your system’s security posture and health. Additionally, organizations also get to unify business objectives with security goals.

V. Vulnerability Assessments

A vulnerability assessment involves a review of security weaknesses in a system. It evaluates how susceptible a system is and assigns severity levels. There’s also the aspect of recommending remediation or mitigation.

Some of these vulnerability assessments include:
  • Host Assessment: Host assessments focus on the vulnerability of critical servers to attacks.
  • Database Assessment: These involve the assessment of a database for misconfiguration and vulnerability. It also entails classifying sensitive data on a network.
  • Network Assessment: Network assessments involve the assessment of policies and practices as a way to prevent unauthorized access to resources.
  • Application Scan: These use automated scans to identify security vulnerabilities in web applications and their source code.

Risk-Based Security & Risk Reduction

Organizations need to recognize that breaches are inevitable. However, we also see that attackers have become better at what they do than the defenders. Therefore, there’s an urgent need to modify the current paradigm of cyber security towards risk-reduction through risk-based security models.

Where to Start?
  • Assess the status of critical control systems and operations for security vulnerabilities that need addressing.
  • Revisit security and alarm management standards. This requires significant coordination between all players in the system.
  • Develop cross-collaboration between engineers and network administrators

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

CISAnalyis 18 July 2022

CVE-2022-22047, an actively exploited zero-day affecting a range of Microsoft Windows and Windows Server versions, was added to CISA’s Known Exploited Vulnerabilities list with an order to all US agencies to patch by the 2nd of August.

Understandably, there’s a dearth of information regarding this new vulnerability’s scope and use cases, but Microsoft released a patch along with 83 others in their July 2022 Patch Tuesday update.

What we do know is that CVE-2022-22047 is an elevation of privilege bug in Windows’ Client/Server Runtime Subsystem (CSRSS). It was given a CVSSv3 score of 7.8 and a rating of Important. If exploited, the vulnerability gives SYSTEM privileges, allowing an attacker full control of a Microsoft endpoint.

Given the potential repercussions of this exploit, one might wonder why it hasn’t been deemed critical. According to Mike Walters of Action1, it can only be executed locally. But he also adds that “vulnerabilities of this type are great for taking control over a workstation or server when they are paired with phishing attacks that use Office documents with macros. This vulnerability can likely be paired with Follina to gain full control over a Windows endpoint.”

On 11 July 2022, Microsoft also released an article stating that VBA macros from the internet will be blocked by default.

#cisa_analysis #vicarius_blog

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About VRX
VRX is a consolidated vulnerability management platform that protects assets in real time. Its rich, integrated features efficiently pinpoint and remediate the largest risks to your cyber infrastructure. Resolve the most pressing threats with efficient automation features and precise contextual analysis.

CYBERSECURITY IN THE FACE OF MASS LAYOFFS: WHAT MAKES IT RESILIENT?

 

karina

 

In the face of inflation and interest rate hikes, companies started tightening their belts by reducing staff to survive the uncertain times ahead. As of July, all this resulted in more than 400 companies laying off over 80 000 workers worldwide.

In this interview, we speak to Karina Dajoraitė-Dirvonskienė, Chief People Officer at Nord Security, who shares her insights into the mass layoff trend, its impact on the cybersec industry, and the situation at Nord Security. She also gives tips on how to bounce back after experiencing a layoff.

The current job market

What, in your opinion, are the main reasons behind current layoffs in the tech sector?

There are several factors. Some of them come from the global perspective, like the looming threat of recession with the inflation and interest rates shooting up as well as the changing behavior of consumers. Of course, no one can account for a global crisis. Still, once it happens, some action scenarios should be put in place to secure your organization and ensure it stays afloat without making drastic sacrifices.

Also, there could be other factors at play here, too – like overplanning your hiring quotas, too much reliance on outside funding, as well as, changing evaluation of companies with the focus of investors from growth to profit, and failure to raise additional capital as a result.

The situation at Nord Security

What is our current situation in Lithuania, Berlin, and Nord Security in general?

Nothing is changing at Nord Security. We continue growing and expanding our global team with new locations and hires. After more than a decade of being a profitable bootstrapped business, last quarter, we officially became a tech unicorn by raising $100 million from investors at a valuation of $1.6 billion. And for the future, that means more growth and more talent joining our community worldwide.

Do you believe that the current trend will affect hiring goals at Nord Security? If so, how?

I believe it will. We will use this global trend of layoffs as an opportunity to fill our vacant positions more quickly. As I’ve mentioned, the growth of our organization continues. Therefore we’re looking for new talent to join our team.

Why do you think the situation at Nord Security is different from that of tech companies, that are currently laying off large numbers of staff?

Actually, our co-founder, Tom Okman, has recently commented on the situation that Lithuanian businesses are mainly profitable or bootstrapped. That was the case with us, too. Therefore, there’s no need to rely on outside funding too much. Also, I think the cybersecurity market that we work in also has an impact here. It is constantly growing and is expected to reach $376.32 billion in 2029. Moreover, the pandemic, geopolitical unrest, and an increase in cyberattacks have highlighted the need for our products.

Cybersecurity threats will continue to exist as long as we have our online lives. As a result, not only the demand for cyber products and services is growing, but also the need for cybersecurity professionals. Currently, there are more than 36,000 open positions for cybersec experts in the public sector and more than 700,000 available jobs in the private sector globally. These factors are the main reasons why the cybersecurity industry hasn’t seen hiring freezes or layoffs on a broad scale.

What should be considered when planning recruiting volumes, and how does this help us maintain sustainable growth?

We plan our recruiting volumes meticulously with every team in the organization, evaluating the needs, pain points, and plans for growth. I think it’s important to have this alignment throughout the whole organization and with the key stakeholders if you want your recruitment volumes to be on track and ensure sustainability. So for our team, communication and alignment are key in this accord.

Bouncing back after a painful layoff

Can you give some advice to people who have experienced layoff? How can they cope with the stress of losing their job?

Well, first of all – not to panic. Of course, it’s never pleasant to lose your job. However, while some companies are overhired, others are experiencing shortages. Therefore, there’re still plenty of job opportunities available, especially for those with tech skills. This demand will continue to grow in the future, notwithstanding the current hardships. So here are some tips on what you can do to find your next employment easier:

  • If your local market doesn’t have a suitable offer, check global companies – remote work is still very much a possibility.

  • Be active on LinkedIn – if you have recruiters in your connections, don’t hesitate to drop them a line.

  • Reach out to friends to refer you to their employer. Many companies have internal referral programs available. At Nord Security, we even launched an external referral program – you can check it HERE.

  • Network – there are plenty of events and meetups to attend online or offline for techies. Who knows, maybe there’s another job opportunity waiting for you.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

A Summary of Adversarial Threat Reports – 2022

Sharing authentic information is critical in today’s world of the internet. It becomes more significant if the information shared benefits everyone, including the individual who uses the internet for leisure or the organization dependent on the internet for their operations. The Adversarial Threat Reports are vital bits of information that keep the community aware of the significant cyber threats that appear from time to time. Generally, security agencies and digital establishments issue adversarial threat reports quarterly, highlighting the significant challenges that emerge during the specific quarter. This article summarizes the findings of various such threat reports published in 2022. 

What Are Adversarial Threats?

Adversarial threats generally denote enterprise disruptions or losses caused by the deliberate actions of malicious third parties interacting with their information systems. Any threat associated with accidental human error or environmental or structural failure is not considered an adversarial threat. The deliberate and malicious intention is critical for the threat to qualify as one.

Examples of Adversarial Threats

Adversarial threats are of various types and characteristic features. Ransomware, phishing, and cyber espionage attacks are a few of them. For example, Ukraine’s invasion by Russia has greatly impacted the phishing threat landscape. Since its initiation,  phishing has seen a 10-percentage point increase over the previous year. The increase in the number and types of phishing attacks has been seen as a common concern across security service providers.

(Source: Cofense 2022 Annual State of Phishing Report)

Sophos 2022 Adversarial Threat Report states that ransomware constituted 79% of cyber threats, followed by Cobalt Strike at 6% and Web shells at 4%. Other hazards include data exfiltration and miscellaneous malware. Even the Global Threat Report 2022 by Crowdstrike indicates that ransomware is an ever-increasing threat today, growing 82% between 2020 and 2021.

What Do the Adversarial Threat Reports Signify?

The significance of adversarial threat reports is that they highlight the latest threats the internet communities face from various malicious sources. For instance, the Meta Adversarial Threat Report Q1-2022 focuses on state actors, especially in the backdrop of the Russian Ukrainian War. Thus, it discusses cyber warfare, an ominous large-scale threat in today’s circumstances.

The Meta Adversarial Threat Report aims to highlight coordinated inauthentic behavior (CIB), cyber espionage efforts by Iran, and malicious mass reporting attempts from Russia. Besides reporting inauthentic behavior, such reports also examine the efforts put in by the security community to counter these activities.

The Purpose Behind the Adversarial Threat Reports

The primary reason behind the compilation of these adversarial threat reports is to share information on malicious threats capable of causing significant global damage to enterprise network systems. A glance through these reports can help educate  security teams concerning the latest threats in the internet environment, even if all of them might not pose immediate cybersecurity risks. 

Below are the findings of the Meta Adversarial Threat Report for the first quarter of 2022.

  • Cyber Espionage Operations Linked to Iran

Cyber espionage targets people to gather intelligence, manipulate them into sharing critical information, and compromise their devices and accounts. The Meta Adversarial Threat Report Q1 2022 highlights three groups of malicious actors engaging in cyber espionage. 

  1. A group of Iranian adversaries, also known as UNC788, targeted people from the Middle East, including the Saudi military, dissident groups from Iran and Israel, and US politicians and journalists. The malicious actors used phishing to steal users’ credentials and share links to malicious websites that hosted malware. The modus operandi included social engineering tactics, phishing, and malware injection.
  2. Similarly, an unreported group of threat actors from Iran used spoofing to target various organizations in multiple industrial sectors. They include energy establishments in Russia, Italy, Canada, and Saudi Arabia and targets in the IT industry in UAE and India. Other industrial sectors include the maritime logistics industry in the US, Israel, UAE, Norway, Iceland, etc., the telecommunication industry in the UAE and Saudi Arabia, and the semiconductor industrial sector in the US, Germany, and Israel. The methods of attack include using social engineering and interactive targeting, spoofing of corporate websites, and injecting malware.
  3. It also identified another malicious group from Azerbaijan engaging in CIB and cyber espionage targeting Azerbaijani democracy activists, opposition party leaders, journalists, and government critics. Though the group maintained a low profile and focused on news and social media websites like Twitter, Facebook, and LinkedIn, there were resemblances to a prominent threat actor named ‘Ghostwriter’ that targeted Ukraine. The modus operandi was compromising and spoofing websites, injecting malware, credential phishing, and CIB.  
  • Security Updates on Ukraine

The risk of the ongoing hostilities between Russia and Ukraine escalating into a full-fledged cyber war is omnipresent. Under such circumstances, almost every adversarial threat report includes security updates on Ukraine. The Meta Adversarial Threat Report identifies government-linked Russian and Belarusian actors engaging in online cyber espionage and covert influence operations. For instance, it detected CIB activity linked to the Belarusian KGB spreading misinformation about Ukrainian troops’ withdrawal even before Russia commenced war activities.

This report refers to a spike in Ghostwriter’s attempts to target people through email compromise and use the information to access their social media accounts. The group also attempted to attack the Facebook accounts of various Ukrainian military personnel by posting videos of people calling on the Army to surrender. Meta detected and took down various networks belonging to politically aligned actors for violating its policy on inauthentic behavior by mass reporting their political opponents and spreading hate speech.

As a way to protect users, Meta also suggested Ukrainians and Russians strengthen the security of their online accounts, emails, and social media. The company suggested downloading a VPN (Virtual Private Network) app, enabling MFA (Multi-factor authentication), and avoiding reusing passwords along with practicing other online safety tactics.

  • Continuous CIB Enforcement

CIB includes opening fake social media accounts and coordinating with others to mislead users and manipulate public debate for a strategic goal. Meta Adversarial Threat Report identifies many such people globally, which the company has removed from the network. In addition, Meta monitors these removed accounts to ensure they do not resurface under different aliases. 

The Meta Adversarial Threat Report has identified and removed 14 Facebook accounts, nine web pages, and 39 Instagram accounts in Brazil for violating Meta’s CIB policy. While the malicious actors started misleading people on Covid-19 in 2020, they later shifted their attention toward Amazon deforestation issues in 2021.

Similarly, Meta has removed 233 Facebook accounts, 84 pages, and 27 Instagram profiles in Costa Rica and El Salvador for using fake accounts to post misinformation on both sides of the political spectrum. The report also mentions fake Russian and Ukrainian social media accounts that spread misinformation about the war. Meta has successfully identified and removed 27 of these Facebook accounts and 4 of these Instagram accounts, respectively.  

  • Mass Reporting Network in Russia

Meta successfully identified nearly 200 social media accounts that spread fake information using mass reporting techniques. Besides focusing on Ukrainian and Russian nations, these accounts had users from the US, Poland, and Israel. The modus operandi was spreading fake information regarding the war and making people believe in false reports, thereby misleading them with the intent of causing widespread distrust in the government and local news.

  • Removing Coordinated Violating Networks in the Philippines

Similarly, Meta has discovered a network of nearly 400 accounts and groups in the Philippines involved in DDoS attacks and compromising websites in the country. This network prided itself on bringing down news websites. Besides, it offered cybersecurity services to protect networks from such attacks they initiated. Eventually, they started inviting new members openly to carry out DDoS attacks. 

What Constitutes Inauthentic Behavior?

Inauthentic behavior is usually centered on amplifying and increasing false content distribution to manipulate public debate in order to achieve a strategic goal. The primary objective is to mislead people. If such behavior is financially motivated, it can qualify as spam and scam activity.

IB operators focus on quantity rather than quality. They need large numbers of fake accounts to post their content in order to reach the largest audience possible. Generally, you can also find these accounts monetizing people’s attention by driving them to off-platform websites filled with ads.

The Deceptive Strategies Used by IB Operators

Here are some deceptive strategies IB operators use to boost their engagement artificially.

  • Context Switching

Generally, IB operators mislead their audience by claiming to be dedicated to a specific subject but switching to an unrelated one when the account or post goes viral. They perceive the pulse of their audience and use tactics like sensationalism to deceive people into clicking links to their websites.

  • Posing as Authentic Communities

IB operators trick their audience by making them believe they are operating from a specific country or community when they are actually a different one. This tactic proves helpful to indulge in context switching by posting content related to political crises or natural calamities to attract audiences and monetize their attention. 

  • Mass Posting, Sharing, and Liking of Content to Popularize it

Usually, IB operators use fake social media accounts to mass-post content. This way, their entire chain can start liking or sharing the content amongst their contacts to increase apparent popularity. There is not much actual engagement because there is no interaction with people outside their bubble that is composed of just their members.

While CIB is the trending threat today, especially in the backdrop of the Russian-Ukrainian war, one cannot ignore other adversarial threats. The Blackberry 2022 Threat Report lists various hazards that can affect the daily functioning of businesses globally, as listed below.

  • Ransomware was the most dangerous of all adversarial threats in 2021. Trends indicate that ransomware will also continue to top the charts this year. The year 2021 saw massive ransomware attacks. Two examples are DarkSide crippling the Colonial Pipeline Network and the Russian ransomware threat group REvil attacking Acer and JBS Foods. Another significant attack included the infiltration of the insurer AXA by the Avaddon ransomware group. In a recent 2022 survey by ransomware.org, 80% of the survey respondents accepted that their organization is more likely to be a target of a ransomware attack in 2022 as compared to 2021.

(Source: ransomware.org)

  • A zero-day vulnerability is also a potent adversarial threat, especially with the HAFNIUM group exploiting the Microsoft Exchange Server’s zero-day vulnerability. It allowed other threat actors to reverse engineer the patch and target organizations worldwide. Organizations and individuals can protect against zero-day vulnerabilities by keeping their network systems updated and looking for alternative security approaches like the Zero Trust framework and XDR (Extended Detection and Response) solutions.
  • Supply chain attacks were the flavor of threat actors in 2020, especially with SolarWinds Attack making international headlines. Additionally, 2021 saw the supply chain attacks re-emerging with the compromising of Kaseya’s VSA software affecting over 1,000 businesses. As supply chain attacks betray the trust between service providers and customers, there is a pressing need for companies to adopt a Zero Trust framework. 

Threat actors were rampant in 2021, with many adept at mimicking private sector capabilities by leveraging services like IaaS (Infrastructure-as-a-Service), RaaS (Ransomware-as-a-Service), and MaaS (Metal-as-a-Service, for the deployment of large cloud and Big Data environments) to launch their malicious attacks. 

Final Words

Cyber threats and malicious actors will play around as long as the internet survives. Since one cannot eliminate all threats at all levels, it is a matter of co-existence with the utmost awareness and security. Adversarial threat reports make people aware of the latest threats looming over the horizon and waiting to attack unsuspecting network systems globally. 

Though phishing is considered the earliest of all cyber threats, it is significant even today because almost all the other threats rely on phishing (or its variants) in order to gain global access to network systems. Therefore, while anti-malware solutions are necessary to neutralize threats, cybersecurity awareness is critical in fighting the fundamental stages to avoid bigger contingencies. Documents like adversarial threat reports are handy for the purpose.

Every cybersecurity professional should go through these threat reports and acquire reliable knowledge of the current threat landscape and the modus operandi malicious actors use to carry out the threats. In essence, adversarial threat reports are critical for every industry.

References

  1. Meta. (2022, April). Adversarial Threat Report. Meta. https://about.fb.com/wp-content/uploads/2022/04/Meta-Quarterly-Adversarial-Threat-Report_Q1-2022.pdf
  2. Crowdstrike. 2022 Global Threat Report. https://go.crowdstrike.com/global-threat-report-2022.html
  3. Blackberry. BlackBerry 2022 threat report. 

https://www.blackberry.com/us/en/forms/enterprise/report-bb-2022-threat-report-aem?

  1. Borges, R. Scribd. Meta Quarterly Adversarial Threat Report Q1 2022. 

https://www.scribd.com/document/568491724/Meta-Quarterly-Adversarial-Threat-Report-Q1-2022

  1. Sophos. Sophos 2022 Threat Report: Interrelated threats target an interdependent world.

https://assets.sophos.com/X24WTUEQ/at/b739xqx5jg5w9w7p2bpzxg/sophos-2022-threat-report.pdf

  1. NCC. (2022, June 27). Threat Report 10th June 2022. 

https://www.ncsc.gov.uk/pdfs/report/threat-report-10th-june-2022.pdf

  1. Shier, J. (2022, June 7). The Active Adversary Playbook 2022. Sophos News. https://news.sophos.com/en-us/2022/06/07/active-adversary-playbook-2022/
  2. National Cyber Security Centre. (2022, June 10). Threat Report 10th June 2022. https://www.ncsc.gov.uk/report/threat-report-10th-june-2022
  3. Trellix. Trellix Advanced Threat Research Report: January 2022. 

https://www.trellix.com/en-us/threat-center/threat-reports/jan-2022.html

  1. Cofense. (2022, April 12). Cofense 2022 annual state of phishing report highlights. Cofense. https://cofense.com/blog/three-highlights-from-cofense-2022-annual-state-of-phishing-report

#threatreport #cybersecurity #Russia #ransomware #phishing #espionage #Meta #Ukraine #vicarius_blog

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About VRX
VRX is a consolidated vulnerability management platform that protects assets in real time. Its rich, integrated features efficiently pinpoint and remediate the largest risks to your cyber infrastructure. Resolve the most pressing threats with efficient automation features and precise contextual analysis.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×