{"id":75405,"date":"2024-02-29T16:20:14","date_gmt":"2024-02-29T08:20:14","guid":{"rendered":"https:\/\/version-2.com\/?p=75405"},"modified":"2024-02-23T15:42:34","modified_gmt":"2024-02-23T07:42:34","slug":"i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/02\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\/","title":{"rendered":"I am not sorry for wasting your time: Lessons to learn from Texonto PSYOPs targeting Ukraine"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"75405\" class=\"elementor elementor-75405\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ae5294 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ae5294\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4a899f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e9119cd\" data-id=\"1e9119cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f04f8cb elementor-widget elementor-widget-text-editor\" data-id=\"4f04f8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div id=\"content-c10205619\" class=\"frame frame-default frame-type-text frame-layout-0\">\u00a0<\/div><div class=\"frame frame-default frame-type-text frame-layout-0\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/spam-thumb-250x250.jpg\" alt=\"\" width=\"250\" height=\"250\" \/><\/div><div id=\"content-c10319715\" class=\"frame frame-default frame-type-text frame-layout-0\"><p><em>Since the invasion started, ESET has both investigated and prevented a significant number of attacks launched by Russia-aligned groups against Ukraine.<\/em><\/p><p>In 1998, one of the most annoying things IT-equipped employees needed to deal with, SPAM, <a href=\"https:\/\/www.cnet.com\/tech\/services-and-software\/oxford-dictionary-adds-net-terms\/\" target=\"_blank\" rel=\"noopener\">made it into the New Oxford Dictionary of English<\/a>. Prior to 1998, the word \u201cspam\u201d only referenced a variety of processed canned meat produced by the <a href=\"https:\/\/www.hormelfoods.com\/brand\/spam-brand\/\" target=\"_blank\" rel=\"noopener\">Hormel Foods Corporation<\/a>.\u00a0<\/p><p>\u201cIt&#8217;s sort of unfortunate that we&#8217;ve gotten this far,\u201d John Mozena, then board member of the U.S.-based <a href=\"https:\/\/www.cauce.org\/emeritus-board-members\/\" target=\"_blank\" rel=\"noopener\">Coalition Against Unsolicited Commercial Email <\/a>commented in the news. And that was just the beginning. More than 20 years later, spam messages accounted for <a href=\"https:\/\/www.statista.com\/statistics\/420391\/spam-email-traffic-share\/\" target=\"_blank\" rel=\"noopener\">over 45 percent<\/a> of <a href=\"https:\/\/www.statista.com\/statistics\/456500\/daily-number-of-e-mails-worldwide\/\" target=\"_blank\" rel=\"noopener\">333 billion emails<\/a> sent and received daily around the world in 2022.<\/p><p>The latest ESET research about <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/operation-texonto-information-operation-targeting-ukrainian-speakers-context-war\/\" target=\"_blank\" rel=\"noopener\">Operation Texonto<\/a> highlights a scheme targeting Ukrainian citizens with a combination of spam and phishing messages. This situation reminds us that spam not only frustrates employees, but can also serve as a vehicle for disinformation, psychological operations, and data theft attempts against businesses and institutions.<\/p><p>These cyber incidents may look simple, but just the sheer volume of unsolicited emails coming on a daily basis can be so overwhelming that the situation begs for a professional solution. Especially now, that <a href=\"https:\/\/www.statista.com\/statistics\/967292\/worldwide-cloud-infrastructure-services-market-revenue\/\" target=\"_blank\" rel=\"noopener\">businesses are moving to the cloud<\/a>.<\/p><p>After the full-scale invasion of Ukraine two years ago, all critical institutions and operators of critical infrastructure in Ukraine <a href=\"https:\/\/www.eset.com\/int\/ua-crisis\/\" target=\"_blank\" rel=\"noopener\">were offered a free upgrade<\/a> to ESET\u2019s highest-grade solution. When it comes to spam and phishing, for example, <a href=\"https:\/\/www.eset.com\/int\/business\/solutions\/cloud-security\/\" target=\"_blank\" rel=\"noopener\">ESET Cloud Office Security (ECOS) <\/a>offers broad coverage with advanced protection for Microsoft 365 and Google Workspace applications.<\/p><\/div><div id=\"content-c10319727\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Constant pressure<\/h3><\/header><p>The use of spam as a popular term for unsolicited email, comes from an episode of the 1970s TV show <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365-life-hacks\/privacy-and-safety\/what-is-email-spam#:~:text=Using%20the%20word%20%E2%80%9Cspam%E2%80%9D%20to,name%20for%20canned%2C%20processed%20meat.\" target=\"_blank\" rel=\"noopener\">Monty Python\u2019s Flying Circus<\/a>. <a href=\"https:\/\/www.youtube.com\/watch?v=anwy2MPT5RE\" target=\"_blank\" rel=\"noopener\">In one episode<\/a>, a couple tries to order food in a cafe, but every course of the meal contains spam. To make things even more irritating, a group of Vikings sitting nearby are passionately singing about spam. The word \u201cspam\u201d is uttered at least 132 times.<\/p><p>While Monty Python was clearly trying to mock annoying things in people\u2019s lives, their \u201cspam\u201d numbers were no match for the number of today\u2019s spam emails. We are talking about a staggering <a href=\"https:\/\/www.statista.com\/statistics\/420391\/spam-email-traffic-share\/\" target=\"_blank\" rel=\"noopener\">150 billion <\/a>unsolicited emails sent and received daily. Well, that\u2019s annoying, right?<\/p><p>With this influx of emails, it is no surprise that 2022 data showed that up to <a href=\"https:\/\/www.techradar.com\/news\/spam-emails-are-wasting-hundreds-of-work-hours-every-year\" target=\"_blank\" rel=\"noopener\">80 person-hours <\/a>a year ago in vain just with filtering spam messages.<\/p><p>Moreover, this problem is not only about getting rid of unwanted emails but also avoiding being caught on the hooks of phishing attacks, the most common type of cyberthreat.<\/p><p>According to <a href=\"https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2023\/cyber-security-breaches-survey-2023\" target=\"_blank\" rel=\"noopener\">the latest government survey<\/a> in the United Kingdom, one third of businesses identified a data breach in 2022, and 79 percent of those attacks were phishing. Similarly, in the US, the <a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2022_IC3Report.pdf\" target=\"_blank\" rel=\"noopener\">FBI received<\/a> more than 300,000 phishing complaints in 2022, making it to the top of the bureau\u2019s cybercrime victim list. To compare, personal data breach was the second most reported cybercrime with almost 59,000 victims.<\/p><p>ESET Telemetry confirms that trend. According to the latest <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/eset-threat-report-h2-2023\/\" target=\"_blank\" rel=\"noopener\">ESET H2 2023 Threat Report<\/a>, spam has increased by 6 percent and malicious HTML files sending victims to phishing websites (HTML\/Phishing.Agent trojan) are still by far the most detected email threat. Overall, these email attacks comprise almost a quarter (23.4 percent) of all cyber threats detected by ESET.<\/p><p>According to the latest <a href=\"https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2023\/cyber-security-breaches-survey-2023\" target=\"_blank\" rel=\"noopener\">government survey in the United Kingdom<\/a>, one third of businesses identified a data breach during 2022, and 79% percent of those attacks were phishing. Similarly, in the US, <a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2022_IC3Report.pdf\" target=\"_blank\" rel=\"noopener\">the FBI received <\/a>more than 300,000 phishing complaints in 2022, making it to the top of the bureau\u2019s cybercrime victim list. To compare, personal data breach was the second most reported cybercrime with almost 59,000 victims.<\/p><p>ESET Telemetry confirms the trend. According to the latest <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/eset-threat-report-h2-2023\/\" target=\"_blank\" rel=\"noopener\">ESET H2 2023 Threat Report<\/a>, spam has increased by 6 percent and malicious HTML files sending victims to phishing websites (HTML\/Phishing.Agent trojan) are still by far the most detected email threat. Overall, these email attacks comprise almost a quarter (23.4%) of all cyber threats detected by ESET.<\/p><\/div><div id=\"content-c10319728\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Lessons from Ukraine<\/h3><\/header><p>Operation Texonto in Ukraine shows what such a campaign combining spam emails and phishing can look like.<\/p><p>At the end of 2023, Russia-aligned threat actors tried to <a href=\"https:\/\/www.eset.com\/blog\/consumer\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\/\" target=\"_blank\" rel=\"noopener\">demoralize Ukrainian citizens<\/a> with two waves of spam emails. Additionally, ESET detected a spear phishing campaign conducted by the same group and within the same time period.<\/p><p>Employees working at a major Ukrainian defense company received a phishing email in October 2023, purportedly coming from their IT department.<\/p><p>It was an old-fashioned but still popular phishing message claiming that the employee\u2019s email account was about to expire and they needed to fill in their login details on a given website to keep the account alive. The attached link sent victims to a phishing website posing as a legitimate Microsoft login page, but in reality, trying to steal credentials for Microsoft Office 365 accounts.<\/p><p>To deal with such threats, companies need to not only focus on employee awareness training but also have reliable anti-spam and anti-phishing protection.<\/p><\/div><div id=\"content-c10319730\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Mitigating the threat<\/h3><\/header><p>If you want to know more about spotting phishing attacks, you can <a href=\"https:\/\/www.welivesecurity.com\/en\/scams\/dear-all-what-are-some-common-subject-lines-in-phishing-emails\/\" target=\"_blank\" rel=\"noopener\">check this blog<\/a>, but let\u2019s now focus more on a technical solutions implemented in <a href=\"https:\/\/www.eset.com\/int\/business\/solutions\/cloud-security\/\" target=\"_blank\" rel=\"noopener\">the ESET Cloud Office Security <\/a>such as <a href=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/Products\/Business\/ECOS\/v02\/Product-Overview-ESET-Cloud-Office-Security.pdf\" target=\"_blank\" rel=\"noopener\">Antispam <\/a>which consecutively <a href=\"https:\/\/help.eset.com\/ecos\/en-US\/?key_features.html\" target=\"_blank\" rel=\"noopener\">won spam filtering tests<\/a> by Virus Bulletin, a leading security testing authority, and received the VBSpam+ certification for several years.<\/p><p>The ECOS Antispam technology has high catch rates and being a cloud-based service, allows for prompt data updates that provide quicker reaction times when new spam emerges. This essential component filters all spam emails and keeps user mailboxes free of unsolicited or undesired messages.<\/p><p>ECOS Anti-Phishing prevents users from accessing web pages that are known to be phishing sites. Because phishing emails often contain links leading victims to phishing webpages, ESET Cloud Office Security searches the message body and the subject of incoming email messages to identify such links (URLs). The links are compared against the phishing database, which is being constantly updated.<\/p><p>Combining these powerful tools together with anti-malware scanning, ultimate zero-day threat defense, and an easy-to-use cloud management console, ECOS helps to protect companies\u2019 communications, collaboration, and cloud applications.<\/p><\/div><div id=\"content-c10319731\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Conclusion<\/h3><\/header><p>When looking at spam and phishing data, it is clear that no one has come up with a definitive answer for these threats, but that doesn\u2019t mean you should give up the fight. Quite the contrary. You need professional protection in order not to be overwhelmed by tons of emails both soaking up employees\u2019 time and trying to sneak some phishing messages into corporate mailboxes.<\/p><\/div><div id=\"content-c10319744\" class=\"frame frame-default frame-type-html frame-layout-0\"><div style=\"background: #86D2DA; padding: 30px;\"><p><em><em><strong> How ESET helps: <\/strong><\/em><\/em><\/p><p>\u2022 ESET products and threat intelligence have been protecting Ukrainian IT infrastructure for years. Since the start of the full-scale war in February 2022, ESET have prevented and investigated a significant number of attacks launched by Russia-aligned groups such as HermeticWiper and Industroyer2.<\/p><p>\u2022 As the leading endpoint protection platform vendor headquartered in the European Union, ESET also announced that it has stopped all sales to any individuals, businesses, and organizations in Russia and Belarus.<\/p><p>\u2022 ESET offered critical institutions and operators of critical infrastructure in Ukraine a free upgrade to ESET\u2019s highest-grade solution.<\/p><p>\u2022 Between March and May 2022, ESET automatically extended expiring licenses for consumers in Ukraine at no cost.<\/p><p>\u2022 On top of that, ESET Foundation has allocated 1,277,700 euros for humanitarian relief in Ukraine.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1b0f4 elementor-widget elementor-widget-shortcode\" data-id=\"1a1b0f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18159\" class=\"elementor elementor-18159\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73b4cd0 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"73b4cd0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d19c1e\" data-id=\"8d19c1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8865cce elementor-widget elementor-widget-text-editor\" data-id=\"8865cce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About ESET<\/strong><br \/>For 30 years, ESET\u00ae has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET\u2019s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24\/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&amp;D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single \u201cin-the-wild\u201d malware without interruption since 2003.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>\u00a0 Since the invasion started, ESET has both investigate [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,40,61],"tags":[41,1272],"class_list":["post-75405","post","type-post","status-publish","format-standard","hentry","category-1273","category-eset","category-press-release","tag-eset","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>I am not sorry for wasting your time: Lessons to learn from Texonto PSYOPs targeting Ukraine - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eset.com\/blog\/business\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"I am not sorry for wasting your time: Lessons to learn from Texonto PSYOPs targeting Ukraine - Version 2\" \/>\n<meta property=\"og:description\" content=\"\u00a0 Since the invasion started, ESET has both investigate [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eset.com\/blog\/business\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-29T08:20:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/spam-thumb-250x250.jpg\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/02\\\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"I am not sorry for wasting your time: Lessons to learn from Texonto PSYOPs targeting Ukraine\",\"datePublished\":\"2024-02-29T08:20:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/02\\\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\\\/\"},\"wordCount\":1243,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/BLOG\\\/spam-thumb-250x250.jpg\",\"keywords\":[\"ESET\",\"2024\"],\"articleSection\":[\"2024\",\"ESET\",\"Press Release\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/02\\\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\\\/\",\"url\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\\\/\",\"name\":\"I am not sorry for wasting your time: Lessons to learn from Texonto PSYOPs targeting Ukraine - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/BLOG\\\/spam-thumb-250x250.jpg\",\"datePublished\":\"2024-02-29T08:20:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/BLOG\\\/spam-thumb-250x250.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/BLOG\\\/spam-thumb-250x250.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"I am not sorry for wasting your time: Lessons to learn from Texonto PSYOPs targeting Ukraine\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"I am not sorry for wasting your time: Lessons to learn from Texonto PSYOPs targeting Ukraine - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eset.com\/blog\/business\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\/","og_locale":"en_US","og_type":"article","og_title":"I am not sorry for wasting your time: Lessons to learn from Texonto PSYOPs targeting Ukraine - Version 2","og_description":"\u00a0 Since the invasion started, ESET has both investigate [&hellip;]","og_url":"https:\/\/www.eset.com\/blog\/business\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\/","og_site_name":"Version 2","article_published_time":"2024-02-29T08:20:14+00:00","og_image":[{"url":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/spam-thumb-250x250.jpg","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eset.com\/blog\/business\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/02\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"I am not sorry for wasting your time: Lessons to learn from Texonto PSYOPs targeting Ukraine","datePublished":"2024-02-29T08:20:14+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/02\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\/"},"wordCount":1243,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.eset.com\/blog\/business\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/spam-thumb-250x250.jpg","keywords":["ESET","2024"],"articleSection":["2024","ESET","Press Release"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eset.com\/blog\/business\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/02\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\/","url":"https:\/\/www.eset.com\/blog\/business\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\/","name":"I am not sorry for wasting your time: Lessons to learn from Texonto PSYOPs targeting Ukraine - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eset.com\/blog\/business\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\/#primaryimage"},"image":{"@id":"https:\/\/www.eset.com\/blog\/business\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/spam-thumb-250x250.jpg","datePublished":"2024-02-29T08:20:14+00:00","breadcrumb":{"@id":"https:\/\/www.eset.com\/blog\/business\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eset.com\/blog\/business\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eset.com\/blog\/business\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\/#primaryimage","url":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/spam-thumb-250x250.jpg","contentUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/spam-thumb-250x250.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eset.com\/blog\/business\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"I am not sorry for wasting your time: Lessons to learn from Texonto PSYOPs targeting Ukraine"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-jCd","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/75405","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=75405"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/75405\/revisions"}],"predecessor-version":[{"id":75840,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/75405\/revisions\/75840"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=75405"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=75405"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=75405"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}