Building on our series exploring the adversarial mindset, disinformation actors seek amplification of their content, regardless of whether their goal is financial, ideological, or political. Disinformation actors need venues to post their content that will be most likely to result in viral spread of their messages. Oftentimes, depending on the sophistication of the actors and the narrative they are trying to publicize, they might not even care if they are identified or not.
To find these venues, sophisticated disinformation actors will conduct reconnaissance on the social media groups or outlets that will be most likely to host their content and most likely to result in viral spread based on the psychological characteristics of that outlet.
Actors will look to use content that validates the prior assumptions of the target audience, particularly if it preys on a primal emotion such as fear or anger. This content will be more likely to be shared widely than a post that is neutral or disconfirms a target audience's prejudices.
For example, Macedonian actors host US political content on ad-supported websites and post that content into social media groups that are most likely to share that content. When social media users click on the links - often because their titles or content are written in language designed to provoke strong emotions - the disinformation actors profit from the resulting ad revenue.
Similarly, the Russian actors behind the recently uncovered disinformation campaigns targeting left-leaning audiences with peacedata(.)net and right-leaning audiences with NAEBC would have had to conduct reconnaissance to find Americans willing to write for them as well as identify the outlets that would be most likely to re-publish their content.
Requirements for Anonymous Disinformation Campaigns:
Domain Registration: More advanced adversaries backstop personas before registering domains. Some financially motivated actors do not use such sophisticated operational security. Actors need anonymous or mis-attributable domains for website hosting infrastructure. Financially motivated actors may use two low cost and consumer-oriented registrars (Namecheap and Enom), while more sophisticated efforts could mimic business-oriented registrars like Network Solutions, MarkMonitor, and CSC (more common for authentic news websites).
Certificate Usage: One key feature is the number of domains that a certificate covers (based on the Subject Alternative Name field). More sophisticated actors could mimic news websites that have more domains in their certificates because parent news organizations use one certificate to cover their subsidiaries. Less sophisticated actors may have a large number of domains in their certificates attributable to low-cost hosting providers that deploy shared certificates.
Hosting: Unsophisticated actors use mass-market hosting providers like GoDaddy and Namecheap while advanced actors may use hosting providers such as Incapsula, often used by more authentic news websites.
After the adversary has conducted the necessary reconnaissance, steps can be taken to weaponize the disinformation campaign in the appropriate outlets to conduct information and influence operations.
For more on the adversarial mindset, check out our overviews of cyber threat actor reconnaissance and fraud actor reconnaissance.