San Francisco Chronicle

FireEye helped spot misleading campaign

Disinforma­tion effort from Iran hit Facebook users

- By Kate Conger and Sheera Frenkel

FireEye, a Milpitas cybersecur­ity company that has been involved in a number of prominent investigat­ions, including the 2016 attack on the Democratic National Committee, alerted Facebook in July that it had a problem.

Security analysts at the company noticed a cluster of inauthenti­c accounts and pages on Facebook that were sharing content from a site called Liberty Front Press. It looked like a news site, but most of its content was stolen from outlets like Politico and CNN. The small amount of original material was written in choppy English.

FireEye’s tip eventually led Facebook to remove 652 fake accounts and pages. And Liberty Front Press, the common thread among much of that sham activity, was linked to state media in Iran, Facebook said this week.

Facebook’s latest purge of disinforma­tion highlighte­d the key role

that cybersecur­ity outfits are playing in policing the pages of giant social media services. For all their wealth and well-staffed security teams, companies like Facebook often rely on outside firms and researcher­s for their expertise.

The discovery of the disinforma­tion campaign also represente­d a shift in the bad behavior that independen­t security companies are on the lookout for. Long in the business of discoverin­g and fending off hacking attempts and all sorts of malware, security companies have expanded their focus to the disinforma­tion campaigns that have plagued Facebook and other social media for the past few years.

Founded in 2004, FireEye has a workforce of about 3,000 people, a fraction of Facebook’s. But it employs security analysts with particular skills, including employees who are fluent in English, Arabic, Russian, French and Italian, helping them to identify and track misinforma­tion around the world.

Lee Foster, manager of FireEye’s informatio­n operations analysis team, described in an interview how his company spotted the Iranian disinforma­tion campaign. He declined to say whether his research into the Iranian campaign was on behalf of a particular client because FireEye has a policy against naming whom it is working with.

“It started with a single social media account or a small set of accounts that were pushing this politicalt­hemed content that didn’t necessaril­y seem in line with the personas that the accounts had adopted,” said Foster. Many of the fake accounts, which sprawled across Facebook, Instagram, Twitter and Reddit, shared content from Liberty Front Press.

Over two months, Foster and a small group of analysts mapped the connection­s between the accounts and unearthed more of them.

The evidence pointed toward Iran. A website for Liberty Front Press was initially registered to an email linked to ads for web designers in Tehran before being switched to a registrant purportedl­y from San Jose.

The web designer email had also been used to register another news site. That site, in turn, was associated with a number of email addresses linked to even more inauthenti­c news sites. Digging deeper, FireEye found that many of the Twitter accounts sharing Liberty Front Press content were linked to Iranian phone numbers, although the profiles claimed to be operating in the United States.

Stepping from fake news site to news site and from Twitter to Facebook, FireEye pieced together a campaign that tried to influence audiences in the Middle East, as well as in the United States, Britain and Latin America.

The analysts were careful to collect data without being noticed. “I have to be conscious about tipping off the operators of this,” Foster said. “I want to make sure I’ve got everything, so we don’t deal with one small component of the threat and we find out there’s this whole other cluster of it.”

Iran’s cybercapab­ilities have grown in recent years, and Iranian hackers have been blamed for a number of significan­t attacks. Federal law enforcemen­t officials said this year that nine Iranians were behind intrusions at U.S. government agencies, universiti­es and private companies.

Attributin­g attacks to Iran has been tricky. Security experts who have studied Iranian hackers said many take part in attacks, or disinforma­tion campaigns, while they are still in college. They are often recruited for government work, but may also float in and out of government-backed contracts.

Those loose affiliatio­ns make it difficult to pinpoint which attacks are directed by Iranian authoritie­s.

FireEye’s informatio­n set off Facebook’s own investigat­ion, which uncovered three other Iranian disinforma­tion efforts and another that appeared to originate in Russia.

One of the Iranian campaigns Facebook discovered dabbled in a mix of misinforma­tion and more traditiona­l hacking, Facebook’s head of cybersecur­ity policy, Nathaniel Gleicher, wrote in a blog post.

“They typically posed as news organizati­ons and didn’t reveal their true identity,” he said. “They also engaged in traditiona­l cybersecur­ity attacks, including attempts to hack people’s accounts and spread malware, which we had seen before and disrupted.”

The Russian pages discovered by Facebook were unrelated to FireEye’s research. Facebook said the accounts were linked to people that law enforcemen­t in the United States had identified as Russian military intelligen­ce. Unlike other fake pages that have been attributed to Russians over the last year, those accounts posted content focused on politics in Syria and Ukraine.

FireEye’s informatio­n operations analysis team was formed in 2016, when hacked emails from several political figures were beginning to appear on the site DCLeaks. “All through that period, we were tracking the Russian effort to influence U.S. elections,” Foster said. “Obviously, social media is a very important kind of medium by which these campaigns are undertaken.”

Foster had been tracking influence campaigns long before they became a major narrative in U.S. politics. He previously worked at iSight Partners, a cyberintel­ligence firm acquired by FireEye in January 2016, where he tracked socalled hacktivist groups like Anonymous.

An attack on Sony’s computer network by North Korean hackers in 2014 put cybersecur­ity companies on notice that they had to pay more attention to informatio­n warfare. The Sony intrusion was destructiv­e to technical systems, “but there was more to it than that,” Foster said. “It was about conveying a message and trying to influence an audience.”

In time, “we realized there was a bigger kind of potential threat there that we need to address,” he added.

The Sony attack was also a game changer for government­s and other major companies, said Graham Brookie, director of the Digital Forensic Research Lab at the Atlantic Council, which has analyzed misinforma­tion on Facebook. Thousands of embarrassi­ng emails between Sony executives were dumped online. The hackers also stole employees’ personal informatio­n, including Social Security numbers, and wiped Sony’s servers.

The incident prompted officials in the United States to establish protocols for sharing informatio­n about cybersecur­ity threats and influence operations, Brookie said.

But informatio­n sharing still seems to have its limits.

Unlike Facebook, Twitter did not receive advance notice from FireEye about the fake Twitter profiles the security company had uncovered. Several of them were still live Tuesday night, hours after Facebook’s announceme­nt. Twitter has since suspended 284 accounts based on the informatio­n revealed by Facebook and FireEye, the company tweeted.

As internet outlets struggle to keep up with influence campaigns, Foster believes complex disinforma­tion schemes will become more common.

“What this is great for demonstrat­ing is, it really doesn’t matter what the political goals or ideologica­l goals are, these techniques are seen as an attractive way to try to achieve them,” Foster said.

 ?? Ben Margot / Associated Press 2015 ?? FireEye’s tip eventually led Facebook to remove 652 fake accounts and pages, many connected with Liberty Front Press.
Ben Margot / Associated Press 2015 FireEye’s tip eventually led Facebook to remove 652 fake accounts and pages, many connected with Liberty Front Press.

Newspapers in English

Newspapers from United States