

Graphika Report
Tuesday June 16, 2020
Exposing Secondary Infektion
Ben Nimmo, Camille François, C. Shawn Eib, Lea Ronzaud, Rodrigo Ferreira, Chris Hernon, and Tim Kostelancik
Read Full ReportForgeries, Interference, and Attacks on Kremlin Critics Across Six Years and 300 Sites and Platforms
Secondary Infektion is a series of operations run by a large-scale, persistent threat actor from Russia that worked in parallel to the Internet Research Agency and the GRU but was systematically different in its approach.
The campaign used fake accounts and forged documents to sow conflict between Western countries and most often targeted Ukraine. It produced at least 2,500 pieces of content in seven languages across over 300 platforms from 2014 into 2020.
Read Full Report