The network operated with false, duplicate and authentic accounts, whose behavior was detected by the platform’s automatic systems. The company indicates in its report that mass reporting efforts increased in mid-February, just before the invasion of Ukraine.
As regards false behavior that is distributed in a coordinated way, the company removed a relatively “small” network that used fake accounts (27 from Facebook and four from Instagram, although it also had a presence on other platforms) to attack users from Ukraine, a country where it operated alongside Russia.
Meta links this network with another eliminated two years ago that operated from Russia, the Ukrainian region of Donbas and Crimea.
The technology company also updated its actions in Ukraine. In this regard, he highlighted that there were attempts to return to the platform by state and non-state actors previously removed from it, in addition to spam networks that use deceptive tactics to monetize public attention on the ongoing war.
In turn, Meta detected two cyber-espionage campaigns in Iran, one of them directed against key industries and infrastructures of industries such as energy, telecommunications, maritime logistics or information technology; and in Azerbaijan, against civil society and operated by the Ministry of the Interior.
In South America, the company disrupted operations for coordinated inauthentic behavior in Brazil, Costa Rica, and El Salvador.
On the other hand, in the Philippines, it removed a network in charge of shutting down websites and damaging them and as well as tens of thousands of accounts, pages and groups around the world for deploying a spam campaign to monetize people’s attention on the upcoming elections in the country.