Summary Threat Type Vulnerabilities Surface Matrix Motivations Kill Chain Recommendations Appendix
Print Report

Russian FSB Domestic Intelligence Service depicting arrests of REvil ransomware group members

Submitted File

On May 7, 2021, a crippling ransomware cyberattack was launched against Colonial Pipeline that led to widespread gas shortages on the U.S. East Coast. The attack was caused by ransomware, or cryptovirology software called DarkSide, which was developed by REvil associates. On June 16, 2021 U.S. President Joe Biden met with Russian President Vladimir Putin at a summit in Geneva and to discussed the ransomware attacks. Approximately a month later, the two leaders had over an hour-long phone call wherein Biden urged in Russia to take action against the cyber attackers, with a warning that the United States is prepared to respond if cyber attacks/ransomware attacks are not stopped. On January 14, 2022, the Russian FSB Domestic Intelligence Service announced that it has conducted large-scale operational enforcement actions against members of the REvil ransomware group responsible for the Colonial Pipeline Attack, and posted video footage documenting their efforts. The approximate two minutes of footage contains a number of out of context arrest and search warrant sequences, non-tactical and non-uniform garb and tactical gear. Notably, approximately two and half weeks after the FSB video footage of the purported arrests, Russia had mounted positions and preparation for their military invasion into Ukraine, yet vehemently denied this and blamed the United States for spreading disinformation about their military aggression.

Threat Level

Low

Moderate

Elevated

High


Authenticity Spectrum

Real

Suspicious

Likely Fake

Fake



Deepfake Attack Profile

Credibility

Low

The more synthetic media is perceived to be legitimate and authoritative, the content is more likely to be trusted, persuasive, and acted upon.

Interactivity

Low

Synthetic media can range from non-interactive, not ongoing, or not consistent (low) to interactive, ongoing, and consistent (high).

Familiarity

Moderate

Synthetic media can range from very recognizable and familiar (high) or hardly (or not) recognizable and familiar (low).

Evocation

Moderate

Synthetic media can range from evoking a significant affective response (high) to barely or not at all eliciting an affective reaction.

Distribution

Broadcast

Synthetic media can range from broadcast to a wide human audience or technical security measures (high) to a narrow, specific human audience or tailored technical security measure (low).


Deepfake & Synthetic Media Analysis Framework (DSMAF) Assessment™. The media submitted for this Deepfake Threat Intelligence Report (DTIR) was assessed with the Psyber Labs Deepfake & Synthetic Media Analysis Framework (DSMAF)™, a set of psychological, sociological and affective influence factors and sub-facets, that when holistically applied, inform the motivations, intentions, and targeting process in synthetic media and deepfake propagation. The findings of each DSMAF factor is described in respective sections and graphically plotted on the Deepfake Risk Factor Radar. The combined DSMAF findings are given a Synthetic Media Threat Level (Low, Medium, Elevated, or High) for actionable awareness and risk mitigation.

Threat Type

Threat Type is the category of intended purpose and the risk proposed by the synthetic media or deepfake. Often, cyber deception efforts through deepfake content are multi-purpose, and a result, are categorized with multiple threat types.

While the media content is not synthetically created, the media footage was likely created for influence and information operation purposes.

Propaganda

Information, especially of a biased, misleading or non-rational nature, used to promote a political cause or point of view

Active Measures

Aktivnye meropriyatiya, or “active measures,” was a term originally used by the Soviet Union (USSR) starting in the 1920s and presently used by the Russian Federation to describe a myriad of covert and deniable political influence and subversion operations, such as establishing front organizations, the backing of friendly political movements, the orchestration of domestic unrest in enemy countries and the spread of disinformation based on foreign policy objectives of the Soviet and Russian governments.

Maskirovka

маскировка ("maskirovka") is the Russian doctrine and tactics of military denial & deception

Reflexive Control

Reflexive Control is a uniquely old Soviet Union (USSR)—and now Russian Federation—concept of a campaign that feeds an adversary select misdirecting information so that the adversary makes the decisions that Russia wants him/her to. Methods of reflexive control include spreading false information, leaking partial information at opportune moments, and projecting a different posture of Russia than what may actually be true. The goal of reflexive control is to ‘control’ the ‘reflex’ of the adversary by creating a certain model of behavior in the system it seeks to control.

Russian Firehose of Falsehood

Russian propaganda technique in which large number of messages (text, video, audio, and still imagery) are disseminated rapidly, repetitively, and continuously over multiple channels, such as Internet, social media, satellite television, and traditional radio and television broadcasting, without regard for truth or consistency

Common Cognitive Vulnerabilities & Exposures™ (CCVE)

Common Cognitive Vulnerabilities & Exploits (CCVEs) are perceptual distortions, cognitive biases, heuristics misapplied, or any mental process that exposes a person to a potential manipulation by an adversary.

United States leaders and others government entities invested in the arrests and operational enforcement actions against cyber adversaries responsible for the ransomware attacks against Colonial Pipeline had a vested, motivated belief interest that Russia would genuinely follow through with President Biden's urgent requests for arrests.

Confirmation Bias

Category: Cognitive Processing

The tendency to seek information that confirms or supports a predetermined position or conclusion.

Anchoring

Category: Cognitive Processing

Tendency to focus on a single piece of information when making a decision or assessing a situation, this is often one of the first pieces of information acquired by the individual.

Desirability Bias

Category: Cognitive Processing

A form of motivated reasoning, this is both a cognitive and social response, in which individuals, consciously or unconsciously, allow emotion-loaded motivational biases affect how new information is perceived. In particular, information is often interpreted to correspond with hope/wants/wishes and information to the contrary is ignored.

Emotional Load

Category: Other Psychological Vulnerabilities

Affective responses--emotions, moods and feelings--effect cognition and perception. Media that intentionally causes a high degree of emotional load can significantly image how target audience member perceives and thinks about the subject of the media.


Deepfake Attack Surface & Vectors

As part of the DSMAF criteria, Deepfake Attack Surface & Vectors assesses the intended target; the manner of control, or how the synthetic media is being presented to the target; and medium, or the type of synthetic media being presented to the intended target.


Intended Target

Both humans and automation may be targeted by synthetic media attacks. This criteria references whether the target of the attack was human or automation. The highlighted icon represents the intended target of this submitted media.


Human

Technical

Hybrid

Unknown



Control

A measure of if the attack was constructed by a human or by artificial intelligence. The highlighted icon represents the method of control of this submitted media.


Human

Automation

Hybrid

Unknown



Medium

The medium is the format of the content submitted. Highlighted items represent all of the various formats contained in the submitted content.


Text

Image

Video

Audio

Synthetic Media Exploitation Matrix

The Synthetic Media Exploitation Matrix Is a visual representation of the combined levels of attacker sophistication and maliciousness.

  • Sophistication is a judgment of the level of demonstrated technological prowess and capability involved in the attack.
  • Maliciousness is a conclusion regarding the degree to which the attack was deliberately intended to cause harm.

Sophistication

High

Technical complexity of the atttack.

Sophistication
Maliciousness

Chart Not Available on Printed Version

Maliciousness

High

How damaging the attack was intended to be.



Motivations

Motivations are the underlying activators, purposes or sustained reasons for why the deepfake threat actor sought to create and take the necessary steps to produce and disseminate synthetic media or deepfake content.

In what has many hallmarks of Russian information operation efforts, the video footage was likely created to pacify, deceive and shape the decision making United States government leadership.

Decision Paralysis

Decision paralysis is (also known as choice paralysis or analysis paralysis) is phenomena that occurs when presented with a number of options the more difficult it becomes to make a choice.

Psychological Pressure

Psychological Pressure is the stress felt from perceived serious demands imposed on one person by another individual, group, or environment.

Pacification

Leading the target audience to believe that something acceptable or benign is occurring to reduce vigilance.

Deterrence

Creating the perception of insurmountable superiority or futility to resist

Deception

Intentional strategy and tactics meant to mislead, misdirect and manipulate the perceptions of a target audience through simulation (showing the false) and/or dissimulation (hiding the real)

The Deepfake Kill Chain™

The Deepfake Kill Chain™ describes the various, distinct, sequential stages of deepfake media creation and dissemination. Understanding these stages, and the adversary’s efficacy in the respective stages not only reveals the adversary’s modus operandi and decision-making process, but when contrasted with the Deepfake & Synthetic Media Analysis Framework™, identifies and elucidates methods of preventing and defending against the adversary’s deepfake attacks.

While the media content is not synthetically created, the media footage was likely created for influence and information operation purposes. The respective areas in the Deepfake Kill Chain inform areas of cyber media deception.

Motivation

Motivation is the underlying activator, purpose or sustained reasons for why the deepfake threat actor wants to create nefarious synthetic media.

Pacify, deceive and shape the decision making United States leadership

Targeting

Targeting is the threat actor’s intentional selection of a target audience, or the group or individual whom he is interested in impacting with his deepfake campaign.

United States government leadership; United States and global audiences for influence and manipulation by Russian Impression Management efforts.

Research and Reconnaissance

Research & Reconnaissance occurs when the threat actor is effortfully gathering information about the target audience, the optimal channels to conduct their campaign on, the relevant narratives for the attack, and type of content that will have the desired impact on the target audience.

No case specific insights generated.

Preparation and Planning

Preparation & Planning are the steps and processes that the threat actor takes to acquire the tools and content needed to create the deepfake media for their campaign and their deliberation for the execution of the campaign.

No case specific insights generated.

Production

Production is the threat actor’s use of tools and content for the creation and development of deepfake media for their attack campaign.

No case specific insights generated.

Narrative Testing

Narrative Testing. A narrative is a story, or an account of related events or experiences. A good narrative will have story coherence, such that both the story being told and its relationship to the real world are cohesive and clear. In deepfake campaigns, threat actors consider and evaluate the possible narratives—particularly in relation to events and context—to support the campaign in an effort to maximize the believability and efficacy of the attack.

Narrative framing of Russia performing benevolent, responsible and international comity enforcement actions.

Deployment

Deployment is the threat actor’s intentional transmission of deepfake content to the target audience through selected online channels.

Video & audio rich media over the Internet.

Amplification

Amplification is the threat actor’s intentional efforts to maximize the visibility, virality and target audience exposure to their deepfake content.

Social media, news outlets

Post-Campaign

Post-Campaign is the period after the target audience has received and been exposed to the deepfake content.

Timing of the video release was only 2.5 weeks before Russian military aggression mobilization.



Cognitive Security Recommendations

This section identifies the steps and measures to prevent and defend against the synthetic media/deepfake content assessed in this DTIR. For a more detailed recommendation, training or consultation, connect with Psyber Labs.


This type of Russian information operation effort is part of Reflexive Control, meant to exploit United States government leaders' motivated reasoning (desirability biased) that "Russian will do the 'right thing' and genuinely comply with United States requests." -Content such as this should be holistically assessed within the context of known information operation strategies and tactics used by Russia -Content such as this should be compared to historical cases and statistics regarding Russia's true, authentic enforcement action efforts when requested by the United States--particularly when the United States is the target and the offenders are Russian citizens. -Recognize and acknowledge existing hopes and expectations relating to the the arrests. Do these thoughts, feelings, biases and expectations color your perception of the video and the signaled outcome in the video?

Appendix

DTIR™ Version: 1.0

Submission Date (UTC): December 21, 2023 07:16

Assessment Date (UTC): December 23, 2023 00:00

SHA256 Hash: bbcb7e3dad3c890711368da10203c88c3de9fc586c1d5160158026e1fb836391

Source: https://www.reuters.com/technology/russia-arrests-dismantles-revil-hacking-group-us-request-report-2022-01-14/


Notes:

Translated notes from the video description: The FSB of Russia has established the full composition of the criminal community "REvil" and the involvement of its members in the illegal circulation of payment instruments, and has documented the illegal activities. The basis for the search activities was a request from the competent US authorities, who reported the leader of a criminal community and his involvement in attacks on the information resources of foreign high-tech companies by introducing malicious software, encrypting information and extorting money for decrypting it. As a result of a set of coordinated investigative and operational search activities at the places of residence of 14 members of an organized criminal community, funds were seized: over 426 million rubles, including in cryptocurrency, 600 thousand US dollars, 500 thousand euros, as well as computer equipment, crypto wallets used for committing crimes, 20 premium cars purchased with funds obtained from crime. The detained members of the organized crime group were charged with committing crimes under Part 2 of Art. 187 “Illegal circulation of means of payment” of the Criminal Code of Russia.” As a result of joint actions of the FSB and the Russian Ministry of Internal Affairs, the organized criminal community ceased to exist, and the information infrastructure used for criminal purposes was neutralized. #FSB #RUSSIA #HACKERS