Security Experts:

Connect with us

Hi, what are you looking for?



Russia Effort in 2016 US Election Was ‘Vast,’ ‘Professional’

Russia’s efforts to sow misinformation on Twitter ahead of the 2016 US election was more extensive and professional than earlier believed, security researchers said Wednesday.

Russia’s efforts to sow misinformation on Twitter ahead of the 2016 US election was more extensive and professional than earlier believed, security researchers said Wednesday.

A report by the security firm Symantec said some of the accounts linked to Russia’s Internet Research Agency dated back as far as 2014 and that the manipulation effort involved a vast effort that included both automated “bots” and manual operations.

“While this propaganda campaign has often been referred to as the work of trolls, the release of the dataset makes it obvious that it was far more than that,” said Gillian Cleary of Symantec’s Security Technology and Response team in a blog post.

“It was planned months in advance and the operators had the resources to create and manage a vast disinformation network. It was a highly professional campaign.”

Twitter said the Symantec analysis was based on its data released to researchers last year of some 10 million tweets.

While the Russian campaign used Facebook and other channels, Twitter’s data availability makes it easier for independent researchers to study these campaigns.

“Our singular focus is to improve the health of the public conversation on our platform, and protecting the integrity of elections is an important aspect of that mission,” a Twitter spokesperson said.

“We’ve made significant strides since 2016 to counter manipulation of our service, which includes our release of data last fall related to previously disclosed activities to enable further independent academic research and investigation.”

According to Symantec, the Twitter campaign was professionally orchestrated with accounts registered well in advance of their use, in many cases masquerading as news outlets or political organizations.

“The operation was carefully planned, with accounts often registered months before they were used — and well in advance of the 2016 US presidential election,” Cleary wrote.

“The average time between account creation and first tweet was 177 days.”

While most accounts were automated, there were signs of manual intervention, such as posting original content or slightly changing the wording of reposted contented,  in an attempt to make them appear more authentic and reduce the risk of their deletion, Symantec said.

The campaign sparked real Twitter users to retweet many of the messages, with one generating over six million retweets and some were effective in organizing rallies.

“Despite the fact that the accounts (were) comprised of fake personas and organizations, they nevertheless succeeded in mobilizing people to attend events,” Cleary wrote. 

“Besides its online activities, the campaign’s operators also organized rallies supporting positions on both sides of the political spectrum.”

Written By

AFP 2023

Click to comment

Expert Insights

Related Content


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet


Iranian APT Moses Staff is leaking data stolen from Saudi Arabia government ministries under the recently created Abraham's Ax persona


Artificial intelligence is competing in another endeavor once limited to humans — creating propaganda and disinformation.


The UK’s NCSC has issued a security advisory to warn about spearphishing campaigns conducted by two unrelated Russian and Iranian hacker groups.


WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...


Albanian prosecutors on Wednesday asked for the house arrest of five public employees they blame for not protecting the country from a cyberattack by...


Cybersecurity firm Group-IB is raising the alarm on a newly identified advanced persistent threat (APT) actor targeting government and military organizations in Asia and...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...