Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Meta Disrupts Influence Ops Targeting Romania, Azerbaijan, and Taiwan with Fake Personas

Posted on May 30, 2025May 30, 2025 By CWS

Meta on Thursday revealed that it disrupted three covert affect operations originating from Iran, China, and Romania throughout the first quarter of 2025.
“We detected and eliminated these campaigns earlier than they have been capable of construct genuine audiences on our apps,” the social media big mentioned in its quarterly Adversarial Risk Report.
This included a community of 658 accounts on Fb, 14 Pages, and two accounts on Instagram that focused Romania throughout a number of platforms, together with Meta’s companies, TikTok, X, and YouTube. One of many pages in query had about 18,300 followers.
The menace actors behind the exercise leveraged faux accounts to handle Fb Pages, direct customers to off-platform web sites, and put up feedback on posts by politicians and information entities. The accounts masqueraded as locals residing in Romania and posted content material associated to sports activities, journey, or native information.

Whereas a majority of those feedback didn’t obtain any engagement from genuine audiences, Meta mentioned these fictitious personas additionally had a corresponding presence on different platforms in an try to make them look credible.
“This marketing campaign confirmed constant operational safety (OpSec) to hide its origin and coordination, together with by counting on proxy IP infrastructure,” the corporate famous. “The individuals behind this effort posted primarily in Romanian about information and present occasions, together with elections in Romania.”
A second affect community disrupted by Meta originated from Iran and focused Azeri-speaking audiences in Azerbaijan and Turkey throughout its platforms, X, and YouTube. It consisted of 17 accounts on Fb, 22 FB Pages, and 21 accounts on Instagram.
The counterfeit accounts created by the operation have been used to put up content material, together with in Teams, handle Pages, and touch upon the community’s personal content material in order to artificially inflate the recognition of the community’s content material. Many of those accounts posed as feminine journalists and pro-Palestine activists.
“The operation additionally used common hashtags like #palestine, #gaza, #starbucks, #instagram of their posts, as a part of its spammy ways in an try to insert themselves within the current public discourse,” Meta mentioned.
“The operators posted in Azeri about information and present occasions, together with the Paris Olympics, Israel’s 2024 pager assaults, a boycott of American manufacturers, and criticisms of the U.S., President Biden, and Israel’s actions in Gaza.”
The exercise has been attributed to a recognized menace exercise cluster dubbed Storm-2035, which Microsoft described in August 2024 as an Iranian community focusing on U.S. voter teams with “polarizing messaging” on presidential candidates, LGBTQ rights, and the Israel-Hamas battle.
Within the intervening months, synthetic intelligence (AI) firm OpenAI additionally revealed that it banned ChatGPT accounts created by Storm-2035 to weaponize its chatbot for producing content material to be shared on social media.

Lastly, Meta revealed that it eliminated 157 Fb accounts, 19 Pages, one Group, and 17 accounts on Instagram to focus on audiences in Myanmar, Taiwan, and Japan. The menace actors behind the operation have been discovered to make use of AI to create profile photographs and run an “account farm” to spin up new faux accounts.
The Chinese language-origin exercise encompassed three separate clusters, every reposting different customers’ and their very own content material in English, Burmese, Mandarin, and Japanese about information and present occasions within the nations they focused.
“In Myanmar, they posted about the necessity to finish the continued battle, criticized the civil resistance actions and shared supportive commentary in regards to the army junta,” the corporate mentioned.
“In Japan, the marketing campaign criticized Japan’s authorities and its army ties with the U.S. In Taiwan, they posted claims that Taiwanese politicians and army leaders are corrupt, and ran Pages claiming to show posts submitted anonymously — in a probable try to create the impression of an genuine discourse.”

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:Azerbaijan, Disrupts, Fake, Influence, Meta, Ops, Personas, Romania, Taiwan, Targeting

Post navigation

Previous Post: Integrating Threat Intelligence into Security Operations Centers
Next Post: Actionable Threat Intelligence for Mitigating Emerging Cyber Threats

Related Posts

Xinbi Telegram Market Tied to $8.4B in Crypto Crime, Romance Scams, North Korea Laundering The Hacker News
Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them The Hacker News
Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery The Hacker News
Google AI “Big Sleep” Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act The Hacker News
ASUS Patches DriverHub RCE Flaws Exploitable via HTTP and Crafted .ini Files The Hacker News
Google Adds Multi-Layered Defenses to Secure GenAI from Prompt Injection Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Remove Your Data From Data Broker Sites
  • TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands
  • SharePoint 0-day Vulnerability Exploited in Wild by All Sorts of Hacker Groups
  • Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems
  • Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Remove Your Data From Data Broker Sites
  • TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands
  • SharePoint 0-day Vulnerability Exploited in Wild by All Sorts of Hacker Groups
  • Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems
  • Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News