The EU detects pro-Russian “information laundering” web sites to undermine help for kyiv | EUROtoday

Get real time updates directly on you device, subscribe now.


The European Commission reported this Thursday that it has found, along with the Spanish authorities, a “information laundering” scheme on at the very least 23 web sites with hyperlinks to Russia posing as Western media to undermine help for Ukraine.

This “false facade operation” has been detected in France, Germany, Italy, Poland and Spainacknowledged on the EUvsDisinfo weblog the group of the European External Action Service (EEAS) answerable for detecting pro-Kremlin info manipulation within the EU, of which they’ve already documented and analyzed “17,000 examples” for the reason that starting of their work in 2015. .

The researchers discovered that the web sites found take pro-Kremlin content material from managed media by the Russian state or from numerous pro-Kremlin social media accounts and repackage it to focus on EU audiences.

To broaden the attain of unsuspecting potential audiences, content material misleading and manipulative generated by this community can also be translated from Russianor to European languages, indicated the EEAS group answerable for detecting this kind of info manipulation.

Although initially the Network content material comes from Russian sources translated into English, then translated and tailored for EU audiences in France, Germany, Italy, Poland and Spain, he famous.

This kind of coordinated manipulative conduct has been detected by the EEAS, EU Member States and by know-how platforms, whereas they’ve been investigated by the Microsoft Threat Analysis Center, indicated the EUvsDisinfo group.

There are additionally connections between this Russian false facade community and the Portal Kombat community marketing campaign. found by French authorities, by which there are at the very least 193 websites that massively reproduce pro-Russian publications to defend the invasion of Ukraine.

The 'modus operandi' of that community is “to implement an approach called information laundering.”

“Basically, that means taking content from one source, repackaging it into different formats and then spread it through new channels. “Information laundering is mostly used to cover the origin of the supply or to achieve wider audiences, or each,” the EEAS team explained.

There are three distinct phases of information washing: placement, stratification and integration.

This false front operation uncovered by the EEAS and the Spanish authorities focused on the stratification phase, which means spreading the content initially placed through intermediaries to hide connections and obscure origins.

This was done by two means. First, the websites translated and republished automatically content from Russian state-controlled media, eliminating any reference to the original sources. Second, they converted social media content into written articles.

As an example of how the “manipulative ecosystem” created to allow the rapid spread of disinformation works, the researchers cited in their article a YouTube video that claimed that Ukrainian President Volodmir Zelensky He had bought a mansion from King Charles III worth more than £20 million.

Then, a apparent media outlet, the content of the video to write an article about the story, which in turn was picked up and amplified by media controlled by the Russian state and Russian diplomatic accounts, and even by the Pravda network, exposed by Portal Kombat.

At a technical level, researchers have detected that most websites of this network use identical tracking IDs for web analysis platforms and which were registered and established in a relatively short period of time, from January 6 to April 3.

But for researchers the most telling sign is the similarity of style and visual identity of websiteswhich typically use names of US and UK cities, followed by terms such as “weekly”, “each day”, “chronicle”, “instances” or “information”.

The detected cases include,, o

Another sign is that the detected websites have similarities in logoswhich suggests the possibility of its generation through artificial intelligence such as DALL-E 3 from OpenAI.