{"id":75411,"date":"2024-03-01T16:31:22","date_gmt":"2024-03-01T08:31:22","guid":{"rendered":"https:\/\/version-2.com\/?p=75411"},"modified":"2024-02-23T15:49:09","modified_gmt":"2024-02-23T07:49:09","slug":"what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/03\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\/","title":{"rendered":"What is a PSYOP, and how can it be used in hybrid war?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"75411\" class=\"elementor elementor-75411\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ae5294 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ae5294\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4a899f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e9119cd\" data-id=\"1e9119cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f04f8cb elementor-widget elementor-widget-text-editor\" data-id=\"4f04f8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>\u00a0<\/div><div><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/psy-thumb-25x25.jpg\" alt=\"\" width=\"250\" height=\"250\" \/><br \/><em>ESET Research recently discovered a new disinformation campaign, Operation Texonto, aiming to break the spirits of Ukrainian people close to the second anniversary of Russia\u2019s full-scale invasion of Ukraine.<\/em><\/div><div><div id=\"content-c10319078\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>The notion that war is only physical and happens exclusively in the real world has long been disproven. Many believe that<a href=\"https:\/\/www.welivesecurity.com\/2017\/06\/16\/seven-years-stuxnet-industrial-systems-security-spotlight\/\" target=\"_blank\" rel=\"noopener\"> Stuxnet<\/a> was the first indicator that international conflict had moved to a hybrid setting, in which digital actions could impact physical outcomes. Today we see a different digital dimension to conflicts: psychological operations that are being carried out online and aim to demoralize and break the spirit of targeted communities and, in this latest case, ultimately trying to convince participants that Russia holds the upper hand.<\/p><\/div><div id=\"content-c10319079\" class=\"frame frame-default frame-type-html frame-layout-0\"><div style=\"background: #86D2DA; padding: 30px;\"><em> Stuxnet is a malicious computer worm, first identified in 2010, that targets industrial control systems and was responsible for causing substantial damage to Iran\u2019s nuclear program. Unlike typical malware, Stuxnet does not just steal information but is designed to sabotage systems and cause real-world physical effects, marking a significant evolution in cyber warfare tactics. <\/em><\/div><\/div><div id=\"content-c10319080\" class=\"frame frame-default frame-type-text frame-layout-0\"><p><a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/operation-texonto-information-operation-targeting-ukrainian-speakers-context-war\/\" target=\"_blank\" rel=\"noopener\">Operation Texonto<\/a>, a new component to the already hybrid war between Russia and Ukraine \u2013 in addition to numerous DDoS attacks and cyber threats involving malware \u2013 is a PSYOP.<\/p><\/div><div id=\"content-c10319081\" class=\"frame frame-default frame-type-html frame-layout-0\"><div style=\"background: #86D2DA; padding: 30px;\"><em> A PSYOP is a psychological operation with the goal of conveying selected information and indicators to certain audiences to influence their motives, objective reasoning, and behaviors. This can be aimed at countries, organizations, and groups of power. In this case, it is to raise doubts in the minds of Ukrainians (and citizens of other European countries). <\/em><\/div><\/div><div id=\"content-c10319320\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>PSYOPs are not only confined to kinetic warzones but are also being sophisticatedly deployed to interfere in electoral processes, influence public opinion, and undermine democratic governments in countries that are not at war. They leverage new technologies to amplify their impact and reach, marking a new era in psychological warfare.<\/p><p><strong>PSYOP almost three years into the war<\/strong><br \/>Operation Texonto, which is the name given to the campaign by <a href=\"https:\/\/www.welivesecurity.com\/en\/about-eset-research\/\" target=\"_blank\" rel=\"noopener\">ESET Research<\/a>, mostly consists of spam emails. ESET detected two different waves of this attack: the first in November 2023 and the second at the end of December 2023.<br \/>In the first wave, which seemed to be more elaborate, ESET detected a wave of emails delivered to hundreds of Ukrainians\u2019 mailboxes (people working in government, energy companies, individuals, etc.) with a PDF attachment.<br \/>The goal of this email was to demoralize and sow doubt in the minds of Ukrainians. One of the emails suggested that there might be \u201cheating interruptions this winter.\u201d Another was allegedly from the Ukraine Ministry of Health, claiming that there was a shortage of medicine available. Another suggested that people eat \u201cpigeon risotto,\u201d giving instructions on its preparation, claiming a shortage of food in the country.<\/p><\/div><div id=\"content-c10319321\" class=\"frame frame-default frame-type-textpic frame-layout-0\"><div class=\"ce-textpic ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\"><figure class=\"image\"><img decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/PSYOP_pigeon.png\" width=\"605\" height=\"813\" \/><figcaption>Caption<\/figcaption><\/figure><\/div><\/div><\/div><\/div><\/div><div class=\"ce-bodytext\"><p><em><span class=\"align-left\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"align-left\">Figure <\/span><\/span><span class=\"align-left\"><span class=\"align-left\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"align-left\">5<\/span><\/span><\/span><span class=\"align-left\" lang=\"EN-US\" xml:lang=\"EN-US\"><span class=\"align-left\">. <\/span><span class=\"align-left\">PDF allegedly from the Ministry of <\/span><span class=\"align-left\">Agriculture<\/span><\/span><span class=\"align-left\">\u00a0<\/span><\/em><\/p><\/div><\/div><\/div><div id=\"content-c10319324\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>The aim of these was most likely to instill fear and demoralize Ukrainians in an effort to destabilize communities and the resolve of Ukrainian citizens. This campaign also shares some similarities with campaigns using social engineering; however, none of these emails included malicious links or urged people to give up their personal information. The techniques used here align with common Russian propaganda themes. They are trying to make Ukrainian people believe they won\u2019t have enough resources and heat as a result of Russian aggression.<\/p><\/div><div id=\"content-c10319325\" class=\"frame frame-default frame-type-html frame-layout-0\"><div style=\"background: #86D2DA; padding: 30px;\"><em> Social engineering is a tactic used by cybercriminals to manipulate people into sharing information they normally wouldn\u00b4t share, download malicious software, or send money to a perpetrator. This tactic is used on individuals and businesses alike. <\/em><\/div><\/div><div id=\"content-c10319327\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>The second wave appeared a little less elaborate or even ill-prepared but was much darker in its messaging. The emails included disturbing messaging, with the attackers pretending to be Ukrainian citizens urging other Ukrainians to mutilate themselves to avoid military deployment. Sadly, this is a textbook wartime PSYOP campaign.<br \/>Spearphishing in the wild<br \/>In addition to the misinformation campaign, ESET Research also detected spearphishing campaigns targeting a Ukrainian defense company in October 2023 and an EU agency in November 2023. Both aimed to steal Microsoft Office 365 account credentials. These campaigns share similarities with the abovementioned PSYOPs; thus, ESET researchers believe these are connected.<\/p><\/div><div id=\"content-c10319328\" class=\"frame frame-default frame-type-html frame-layout-0\"><div style=\"background: #86D2DA; padding: 30px;\"><em> Spearphishing is a highly tailored campaign through which attackers use social engineering techniques to urge the victims to click on a malicious link or an attachment. The goal is to steal sensitive information and\/or enter a network undetected. <\/em><\/div><\/div><div id=\"content-c10319331\" class=\"frame frame-default frame-type-text frame-layout-0\"><p class=\"heading-p-regular\">ESET Reserach also revealed that the domain names used as part of Operation Texonto related to internal Russian topics, such as <a href=\"https:\/\/www.britannica.com\/biography\/Aleksey-Navalny\" target=\"_blank\" rel=\"noopener\">Alexei Navalny<\/a>, a well-known Russian opposition leader. Navalny was recently <a href=\"https:\/\/www.reuters.com\/world\/europe\/alexei-navalnys-death-what-do-we-know-2024-02-18\/\" target=\"_blank\" rel=\"noopener\">declared dead<\/a> while serving jail time in Russia.<br \/>Those domains include:<br \/>\u2022\u00a0\u00a0 \u00a0navalny-votes[.]net<br \/>\u2022\u00a0\u00a0 \u00a0navalny-votesmart[.]net<br \/>\u2022\u00a0\u00a0 \u00a0navalny-voting[.]net<\/p><p>From the mentioned domains, researchers believe that it\u2019s possible that the operation also included spearphishing or information operations targeting Russian dissidents.<\/p><p><strong>A new layer of complexity to the war<\/strong><br \/>The emergence of PSYOPs on the digital landscape of warfare has added a new layer to the already complex and ongoing hybrid war between Russia and Ukraine. Since the start of the Russian invasion, Russia-aligned groups, such as <a href=\"https:\/\/www.welivesecurity.com\/2022\/03\/21\/sandworm-tale-disruption-told-anew\/\" target=\"_blank\" rel=\"noopener\">Sandworm<\/a>, have been busy disrupting Ukrainian infrastructure using wipers. Operation Texonto is yet another use of technology to try to influence the outcome of the war. It underscores the shifting battlegrounds, from physical to psychological, aiming to demoralize and destabilize communities through disinformation campaigns.<br \/>It is crucial for nations, organizations, and individuals to stay vigilant, prioritize cybersecurity, and promote accurate information dissemination to counter such threats. As we circle back to the initial concept of PSYOPs, it\u2019s evident that while the tactic has been in use for a long time, its modern incarnations are more sophisticated and insidious. This underscores the importance of understanding and recognizing PSYOPs as part of the broader spectrum of hybrid warfare tactics, a component that is likely to become increasingly prevalent in future conflicts.<br \/>To read more from ESET Research, head over to <a href=\"https:\/\/www.welivesecurity.com\/en\/about-eset-research\/\" target=\"_blank\" rel=\"noopener\">WeLiveSecurity.com<\/a>.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1b0f4 elementor-widget elementor-widget-shortcode\" data-id=\"1a1b0f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18159\" class=\"elementor elementor-18159\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73b4cd0 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"73b4cd0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d19c1e\" data-id=\"8d19c1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8865cce elementor-widget elementor-widget-text-editor\" data-id=\"8865cce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About ESET<\/strong><br \/>For 30 years, ESET\u00ae has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET\u2019s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24\/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&amp;D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single \u201cin-the-wild\u201d malware without interruption since 2003.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u00a0ESET Research recently discovered a new disinformation [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_feature_clip_id":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,40,61],"tags":[41,1272],"class_list":["post-75411","post","type-post","status-publish","format-standard","hentry","category-1273","category-eset","category-press-release","tag-eset","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is a PSYOP, and how can it be used in hybrid war? - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eset.com\/blog\/consumer\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a PSYOP, and how can it be used in hybrid war? - Version 2\" \/>\n<meta property=\"og:description\" content=\"\u00a0ESET Research recently discovered a new disinformation [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eset.com\/blog\/consumer\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-01T08:31:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/psy-thumb-25x25.jpg\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/03\\\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"What is a PSYOP, and how can it be used in hybrid war?\",\"datePublished\":\"2024-03-01T08:31:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/03\\\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\\\/\"},\"wordCount\":995,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/BLOG\\\/psy-thumb-25x25.jpg\",\"keywords\":[\"ESET\",\"2024\"],\"articleSection\":[\"2024\",\"ESET\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/03\\\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\\\/\",\"url\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\\\/\",\"name\":\"What is a PSYOP, and how can it be used in hybrid war? - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/BLOG\\\/psy-thumb-25x25.jpg\",\"datePublished\":\"2024-03-01T08:31:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/BLOG\\\/psy-thumb-25x25.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/BLOG\\\/psy-thumb-25x25.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is a PSYOP, and how can it be used in hybrid war?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is a PSYOP, and how can it be used in hybrid war? - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eset.com\/blog\/consumer\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\/","og_locale":"zh_HK","og_type":"article","og_title":"What is a PSYOP, and how can it be used in hybrid war? - Version 2","og_description":"\u00a0ESET Research recently discovered a new disinformation [&hellip;]","og_url":"https:\/\/www.eset.com\/blog\/consumer\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\/","og_site_name":"Version 2","article_published_time":"2024-03-01T08:31:22+00:00","og_image":[{"url":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/psy-thumb-25x25.jpg","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"6 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eset.com\/blog\/consumer\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/03\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"What is a PSYOP, and how can it be used in hybrid war?","datePublished":"2024-03-01T08:31:22+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/03\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\/"},"wordCount":995,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.eset.com\/blog\/consumer\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/psy-thumb-25x25.jpg","keywords":["ESET","2024"],"articleSection":["2024","ESET","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eset.com\/blog\/consumer\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/03\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\/","url":"https:\/\/www.eset.com\/blog\/consumer\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\/","name":"What is a PSYOP, and how can it be used in hybrid war? - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eset.com\/blog\/consumer\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\/#primaryimage"},"image":{"@id":"https:\/\/www.eset.com\/blog\/consumer\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/psy-thumb-25x25.jpg","datePublished":"2024-03-01T08:31:22+00:00","breadcrumb":{"@id":"https:\/\/www.eset.com\/blog\/consumer\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eset.com\/blog\/consumer\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/www.eset.com\/blog\/consumer\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\/#primaryimage","url":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/psy-thumb-25x25.jpg","contentUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/psy-thumb-25x25.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eset.com\/blog\/consumer\/what-is-a-psyop-and-how-can-it-be-used-in-hybrid-war\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"What is a PSYOP, and how can it be used in hybrid war?"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-jCj","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/75411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=75411"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/75411\/revisions"}],"predecessor-version":[{"id":75847,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/75411\/revisions\/75847"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=75411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=75411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=75411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}