Russian influence campaign shares bogus articles by fake Israeli news websites

Cybersecurity company says it uncovered disinformation infrastructure linked to the Russian government designed to influence decision-making in Jerusalem and sow discord in Israel-U.S. ties
Raphael Kahan|
A Russian online influence campaign is spreading fake articles to generate disinformation and confusion online according to researchers from the Israeli cybersecurity company, Cybereason which says they may be trying to alter public opinion or even incite conflict and obscure the truth.
<< Follow Ynetnews on Facebook | Twitter | Instagram | TikTok >>
Read more:
"We have uncovered a disinformation infrastructure linked to the Russian government in Israel, designed to influence decision-making in Jerusalem by imitating reputable Israeli news sites, Ilan Sokol, Cybereason CEO, said. "This campaign involved creating imposter websites that closely resembled legitimate and prominent news outlets. For example, they produced an internet site that mimicked and matched the distribution and content of genuine news sites, intending to confuse users and make them believe they were accessing the real site through a similar web address," he said.
3 View gallery
האקר על רקע דגלי רוסיה ואיראן
האקר על רקע דגלי רוסיה ואיראן
Russian hacker illustration
(Photo: Shutterstock)
"One example of the fake content published includes an article praising Israel's ambassador to Ukraine for allegedly giving an interview to a local news outlet. These false articles continue to echo old Russian narratives, accusing Ukrainian authorities of being Nazis who continue the work of the German Reich. Another false article accused U.S. President Joe Biden of orchestrating protests and attempting to topple the Israeli government. This suggests that the Russian government is attempting to sow discord between Jerusalem and Washington."
3 View gallery
פייק ניוז רוסיה סייבר
פייק ניוז רוסיה סייבר
A fake site with an article about Israel's Ambassador to Ukraine support of Russia
(Photo: Cybereason)
Cybereason researchers investigated and identified the location from which the hackers were operating, and it appears to be within Russia itself. While the fake website's address did not reveal the location, through cross-referencing with similar domains, the researchers inferred that the campaign originated in Russia. According to data from Similarweb, the site received around 1,000 visits since its creation about eight days ago.
3 View gallery
כותרת מזויפת אנטי-אוקראינית המופצת על ידי גורמים רוסיים ברשת
כותרת מזויפת אנטי-אוקראינית המופצת על ידי גורמים רוסיים ברשת
Fake N12 website with an anti-Ukraine headline
(Photo: Screenshot)
Cybereason researchers also discovered additional examples of impersonation targeting other media outlets, such as the "Mako" and N12 websites, both belonging to the Keshet Group. Several articles on the fake site, posing as the official N12 site, attempt to portray Ukraine as an instigator of conflict in the Middle East. These articles attribute statements to real and credible journalists who have no association with the content published under their names. Furthermore, the articles quote supposed government officials warning against Ukraine, statements that were never made.
Comments
The commenter agrees to the privacy policy of Ynet News and agrees not to submit comments that violate the terms of use, including incitement, libel and expressions that exceed the accepted norms of freedom of speech.
""