Facebook parent company disables Russian propaganda network targeting Europe
A sprawling disinformation network originating in Russia sought to use hundreds of fake social media accounts and dozens of sham news websites to spread Kremlin talking points about the invasion of Ukraine, Meta has revealed.
The company, which owns Facebook and Instagram, said it identified and disabled the operation before it gained a large audience.
Facebook said it was the largest and most complex Russian propaganda effort it has found since the invasion began.
The operation involved more than 60 websites created to mimic legitimate news sites including The Guardian newspaper in the UK and Germany’s Der Spiegel. The fake sites contained links to Russian propaganda and disinformation about Ukraine.
More than 1,600 fake Facebook accounts were used to spread the propaganda to audiences in Germany, Italy, France, the UK and Ukraine.
The findings highlighted the promise of social media companies to police their sites and the peril that disinformation continues to pose.
“Video: False Staging in Bucha Revealed!” claimed one of the fake news stories, which blamed Ukraine for the slaughter of hundreds of Ukrainians in a town occupied by the Russians.
The fake social media accounts were then used to spread links to the fake news stories and other pro-Russian posts and videos on Facebook and Instagram, as well as platforms including Telegram and Twitter. The network was active throughout the summer.
“On a few occasions, the operation’s content was amplified by the official Facebook pages of Russian embassies in Europe and Asia,” said David Agranovich, Meta’s director of threat disruption.
“I think this is probably the largest and most complex Russian-origin operation that we’ve disrupted since the beginning of the war in Ukraine earlier this year.”
The network’s activities were first noticed by investigative reporters in Germany.
When Meta began its investigation it found that many of the fake accounts had already been removed by Facebook’s automated systems. Thousands of people were following the network’s Facebook pages when they were deactivated earlier this year.
Researchers said they could not directly attribute the network to the Russian government, but Mr Agranovich noted the role played by Russian diplomats and said the operation relied on some sophisticated tactics, including the use of multiple languages and carefully constructed imposter websites.
Since the war began in February, the Kremlin has used online disinformation and conspiracy theories in an effort to weaken international support for Ukraine.
Groups linked to the Russian government have accused Ukraine of staging attacks, blamed the war on baseless allegations of US bioweapon development and portrayed Ukrainian refugees as criminals and rapists.
Social media platforms and European governments have tried to stifle the Kremlin’s propaganda and disinformation, only to see Russia shift tactics.
Researchers at Meta also exposed a much smaller network that originated in China and attempted to spread divisive political content in the US.
The operation reached only a tiny US audience, with some posts receiving just a single engagement. The posts also made some amateurish moves that showed they were not American, including some clumsy English language mistakes and a habit of posting during Chinese working hours.
Despite its ineffectiveness, the network is notable because it is the first identified by Meta that targeted Americans with political messages ahead of this year’s mid-term elections.
The Chinese posts did not support one party or the other but seemed intent on stirring up polarisation.
“While it failed, it’s important because it’s a new direction” for Chinese disinformation operations, said Ben Nimmo, who directs global threat intelligence for Meta.