SlideShare a Scribd company logo
HACKING&TROLLING
THECHANGINGFACE
OFHACKTIVISMIN
THEDISINFORMATION
AGE
iDefense Threat Intelligence
Mei Nelson
December 11, 2019
© 2019 Accenture.
ACCENTURE SECURITY
Accenture Security helps organizations build resilience from the inside out, so they can confidently focus on
innovation and growth. Leveraging its global network of cybersecurity labs, deep industry understanding
across client value chains and services that span the security lifecycle, Accenture protects organizations’
valuable assets, end-to-end. With services that include strategy and risk management, cyber defense, digital
identity, application security and managed security, Accenture enables businesses around the world to defend
against known sophisticated threats, and the unknown. Follow us @AccentureSecure on Twitter or visit us at
www.accenture.com/security.
This document is produced by consultants at Accenture as general guidance. It is not intended to provide
specific advice on your circumstances. If you require advice or further details on any matters referred to,
please contact your Accenture representative.
The opinions, statements, and assessments in this report are solely those of the individual author(s) and do not
constitute legal advice, nor do they necessarily reflect the views of Accenture, its subsidiaries, or affiliates.
LEGAL NOTICE & DISCLAIMER
Copyright © 2019 Accenture. All rights reserved.
WHO AM I
3
Copyright © 2019 Accenture Security. All rights reserved.
Mei Nelson
Security Principal
Geopolitical and Strategic
Intelligence Team
iDefense Threat Intelligence
Accenture Security
Accenture
HACKER – HACKTIVIST – HACKTIVISM
Copyright © 2019 Accenture Security. All rights reserved.
Using hacking skills to spread a specific message and bring attention to a political
or social cause
or
The use of malicious cyber activities by non-state actors for ideological purposes
(iDefense)
Hacktivist
Hacker + Activist
Combines traditional activist tactics with hacking techniques
Hacktivism
Hacker
5
HACKTIVISM
Decline?
Copyright © 2019 Accenture. All rights reserved.
The Cult of the Dead
Cow - the Dead Cow
Died?
Source: cDC
Source: Google
6
HACKTIVISM
Changing Face?
Copyright © 2019 Accenture. All rights reserved.
Source: Wikimedia
7
THE CHANGING FACE OF
Hacktivism
Copyright © 2019 Accenture. All rights reserved.
Non-state Actors
State Actors
8
THE CHANGING FACE OF
Malicious Cyber Activities
Breaking into No Breaking into
Systems Systems
Hacktivism
Copyright © 2019 Accenture. All rights reserved.
HACKTIVISM
&
THEDISINFORMATION AGE
Copyright © 2019 Accenture. All rights reserved.
Disinformation
Propaganda
Misinformation
10Copyright © 2019 Accenture. All rights reserved.
INFORMATION OPERATIONS
THREE TYPES & THREE DIMENSIONS
DISINFORMATION OPERATIONS
GOALS: THE “D” WORDS
11
DIVIDE DISCREDIT DISTRACT DENY
Copyright © 2019 Accenture. All rights reserved.
DISINFORMATION OPERATIONS
METHODS
12
“WHITE” METHOD
Broadcasting one’s
message openly
through state
media
“GRAY” METHOD
Placing information in
other sympathetic
media
“BLACK” METHOD
Using hackers,
trolls, and
honeypots
Copyright © 2019 Accenture. All rights reserved.
13
• Flooding the media with multiple versions of a story to
confuse the audience
• Publicizing scandalous information to discredit a critic
or adversary
• Distracting world opinion from negative information,
by highlighting or even creating some other crisis or
scandal
• Using inauthentic social media profiles to inflame real-
world violence by publicizing rallies of rival groups
Copyright © 2019 Accenture. All rights reserved.
DISINFORMATION OPERATIONS
TACTICS
14
CYBER-ENABLED INFORMATION OPERATIONS
Broadly
Any information operations taking place in
cyberspace, including in online media and social
media
Narrowly
Information operations leveraging offensive
cyber threat activity such as subverting secure
system
Copyright © 2019 Accenture. All rights reserved.
15
CYBER-ENABLED INFORMATION OPERATIONS
Hacktivism
Non-state actors for
ideological purposes
State-controlled
hacktivism using false
personas
Copyright © 2019 Accenture. All rights reserved.
State-encouraged
hacktivism trolling
16
CASE STUDY: #MACRONLEAKS (PART I)
• Disinformation campaign: rumors,
fake news, forged documents
• Offensive network intrusion:
computers of Macron’s campaign
staff
• Spreading stolen data using trolls
and bots
Source: Reuters
Copyright © 2019 Accenture. All rights reserved.
CASE STUDY: #MACRONLEAKS (PART II)
17
• Spear phishing campaign
• Hacktivist personas
• Social media bots
• Imagery board: 4chan
SNAKEMACKEREL (APT 28)
Copyright © 2019 Accenture. All rights reserved. Source: Fancy Bears’ Hack Team website
18
SKATE
Copyright © 2019 Accenture. All rights reserved.
CASE STUDY: ENDLESS MAYFLY & OPERATION
NEWSCASTER
1. Used typo-squatted domains to create
inauthentic websites
2. Promoted these domains on social
media platforms using inauthentic
personas
3. Hosted malicious mobile applications
4. Leveraged “ephemeral disinformation”
– Burn After Reading
18
CASE STUDY: CYBER-NATIONALISM TO FANDOM
NATIONALISM
19
Cyber-nationalism
Copyright © 2019 Accenture. All rights reserved.
Born with
nationalistic and
patriotic
sentiment
State-influenced
“Striking-back”
principle: “we will
not attack unless
we are attacked”
Following key
historical dates
and international
events involving
in state’s
interests
CASE STUDY: CYBER-NATIONALISM TO FANDOM
NATIONALISM
20
Fandom Nationalism
Copyright © 2019 Accenture. All rights reserved.
Born with
nationalistic and
patriotic
sentiment
State-influenced
“Striking-back”
through social
media
Following
international events
involving in state’s
interests
CASE STUDY: CYBER-NATIONALISM TO FANDOM
NATIONALISM
21
Diba Expedition
Copyright © 2019 Accenture. All rights reserved.
Actor:
Warriors/Crusaders
Weapon:
Emoji packs
Battlefield:
Social media
platforms
Goal:
National unity?
WHEREISTHIS
HEADING?
22Copyright © 2019 Accenture. All rights reserved.
23
This Photo by Unknown Author is licensed under CC BY
This Photo by Unknown Author is licensed under CC BY
HACKING
A FOREVER WAR OF DECEPTION:
DEEPFAKES EMERGE
24
25
SUGGESTIONS
• Follow geopolitical events
• Set social media policies
• Filter inauthentic accounts
• Verify claims
• Investigate information sources
Copyright © 2019 Accenture. All rights reserved.
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Disinformation Age

More Related Content

PDF
brochure
DOC
July digital media report
PDF
Modern Adversaries (Amplify Partners)
PDF
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
PDF
Business under cyberassault
PDF
2016-Cyber-Security-Report-visualization 07 MS
PPTX
Cyber Crime - "Who, What and How"
PDF
A Look Back at 2016: The Most Memorable Cyber Moments
brochure
July digital media report
Modern Adversaries (Amplify Partners)
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
Business under cyberassault
2016-Cyber-Security-Report-visualization 07 MS
Cyber Crime - "Who, What and How"
A Look Back at 2016: The Most Memorable Cyber Moments

What's hot (20)

PDF
McAfee's Commitment to Innovation - Chris Young
DOCX
DBryant-Cybersecurity Challenge
PDF
NTXISSACSC3 - Sharing is Real! by Christy Coffey
PDF
Top Talks from BSides San Francisco 2017
PDF
AFCEA - DOD Cyber
PDF
Cyber Warfare vs. Hacking (in English)
PPTX
Crim cybersecurity_jarno_limnéll
PDF
Holistic security strategies to address non-consensual intimate imagery
PPTX
Cyber Conflicts - Time for Reality Check
PPTX
2020 12 nyu-workshop_cog_sec
PPTX
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
PPTX
Threat Check for Struts Released, Equifax Breach Dominates News
PDF
War Against Terrorism - CIO's Role
PPTX
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
PPTX
Recap of 2017's biggest cyber-incidents so far
PDF
InfragardNCR Annual Report 2015
PDF
Cyber Attacks: How to Ninja-Proof Your Data - Centre Technologies
PDF
Tema 5.cybersecurity
PPTX
Privacy vs Security
PDF
Holistic security strategies to address non consensual intimate images
McAfee's Commitment to Innovation - Chris Young
DBryant-Cybersecurity Challenge
NTXISSACSC3 - Sharing is Real! by Christy Coffey
Top Talks from BSides San Francisco 2017
AFCEA - DOD Cyber
Cyber Warfare vs. Hacking (in English)
Crim cybersecurity_jarno_limnéll
Holistic security strategies to address non-consensual intimate imagery
Cyber Conflicts - Time for Reality Check
2020 12 nyu-workshop_cog_sec
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Threat Check for Struts Released, Equifax Breach Dominates News
War Against Terrorism - CIO's Role
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
Recap of 2017's biggest cyber-incidents so far
InfragardNCR Annual Report 2015
Cyber Attacks: How to Ninja-Proof Your Data - Centre Technologies
Tema 5.cybersecurity
Privacy vs Security
Holistic security strategies to address non consensual intimate images

Similar to Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Disinformation Age (20)

PDF
[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...
PDF
Hacktivism.pdf
PDF
Hacktivism
PPTX
hate speech
PPTX
Symantec: The rise of hacktivism and insider threats
PPTX
Introduction to Hacktivism
PPTX
Hacktivism: Motivations, Tactics and Threats
PDF
HacktivismPaper.docx
PPTX
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
PPT
Polinter07
PPTX
Political hacktivism
PPT
Political Communication In Cmc Mypart
PPT
Internet Activism & Hacktivism
PPT
Polinter06
PDF
powerpointpresentThreat Actor Groups.pptx
PPTX
Andrew Auernheimer - Hacktivism for profit and glory
PDF
The Threat Landscape & Network Security Measures
PPTX
Hacktivism 2: A brief history of hacktivism.
PPT
Mark Arena - Cyber Threat Intelligence #uisgcon9
PPT
Building An Information Security Awareness Program
[CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators"...
Hacktivism.pdf
Hacktivism
hate speech
Symantec: The rise of hacktivism and insider threats
Introduction to Hacktivism
Hacktivism: Motivations, Tactics and Threats
HacktivismPaper.docx
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Polinter07
Political hacktivism
Political Communication In Cmc Mypart
Internet Activism & Hacktivism
Polinter06
powerpointpresentThreat Actor Groups.pptx
Andrew Auernheimer - Hacktivism for profit and glory
The Threat Landscape & Network Security Measures
Hacktivism 2: A brief history of hacktivism.
Mark Arena - Cyber Threat Intelligence #uisgcon9
Building An Information Security Awareness Program

More from REVULN (12)

PDF
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
PDF
Isao MATSUNAMI - Digital security in japanese journalism
PDF
Chung-Jui LAI - Polarization of Political Opinion by News Media
PDF
Stewart MACKENZIE - The edge of the Internet is becoming the center
PDF
Masayuki HATTA - Debunking toxic "Matome sites" in Japan
PDF
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
PDF
Rachel BLUNDY - Overview of AFP Fact Check
PDF
Dominic WAI - When would using a computer be a crime?
PDF
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
PDF
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
PDF
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
PDF
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Isao MATSUNAMI - Digital security in japanese journalism
Chung-Jui LAI - Polarization of Political Opinion by News Media
Stewart MACKENZIE - The edge of the Internet is becoming the center
Masayuki HATTA - Debunking toxic "Matome sites" in Japan
Sebastien BOURDEAUDUCQ, Stewart MACKENZIE - A talk about nothing (How to crea...
Rachel BLUNDY - Overview of AFP Fact Check
Dominic WAI - When would using a computer be a crime?
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Dr. Rolando Rivera Lansigan - The Privacy Act of 2012, its compliance and imp...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...

Recently uploaded (20)

PDF
Mathura Sridharan's Appointment as Ohio Solicitor General Sparks Racist Backl...
PPTX
Sir Creek Conflict: History and its importance
PPTX
Precised New Precis and Composition 2025.pptx
PDF
62 America is Mentally Ill 20.pdf Politicians Promoting Violence
PPTX
Indian ancient knowledge system, ancient geopolitics
PDF
Regional Media Representation of Kuki-Meitei Conflict - An Analysis of Peace ...
PPTX
PPT on SardarPatel and Popular Media.pptx
PDF
The Blogs_ Hamas’s Deflection Playbook _ Andy Blumenthal _ The Times of Israe...
PDF
05082025_First India Newspaper Jaipur.pdf
PDF
The Most Dynamic Lawyer to Watch 2025.pdf
PPTX
OBG. ABNORAMLTIES OF THE PUERPERIUM, BSC
PDF
Executive an important link between the legislative and people
PDF
Role of federalism in the indian society
PPTX
Bridging Horizons_ Indo-Thai Cultural and Tourism Synergy in a Competitive Asia.
PPTX
ASEANOPOL: The Multinational Police Force
PDF
Theories of federalism showcasing india .pdf
PDF
2025-07-24_CED-HWB_WIPP_ACO000000001.pdf
DOCX
Breaking Now – Latest Live News Updates from GTV News HD
PDF
JUDICIAL_ACTIVISM_CRITICAL_ANALYSIS in india.pdf
PDF
Supereme Court history functions and reach.pdf
Mathura Sridharan's Appointment as Ohio Solicitor General Sparks Racist Backl...
Sir Creek Conflict: History and its importance
Precised New Precis and Composition 2025.pptx
62 America is Mentally Ill 20.pdf Politicians Promoting Violence
Indian ancient knowledge system, ancient geopolitics
Regional Media Representation of Kuki-Meitei Conflict - An Analysis of Peace ...
PPT on SardarPatel and Popular Media.pptx
The Blogs_ Hamas’s Deflection Playbook _ Andy Blumenthal _ The Times of Israe...
05082025_First India Newspaper Jaipur.pdf
The Most Dynamic Lawyer to Watch 2025.pdf
OBG. ABNORAMLTIES OF THE PUERPERIUM, BSC
Executive an important link between the legislative and people
Role of federalism in the indian society
Bridging Horizons_ Indo-Thai Cultural and Tourism Synergy in a Competitive Asia.
ASEANOPOL: The Multinational Police Force
Theories of federalism showcasing india .pdf
2025-07-24_CED-HWB_WIPP_ACO000000001.pdf
Breaking Now – Latest Live News Updates from GTV News HD
JUDICIAL_ACTIVISM_CRITICAL_ANALYSIS in india.pdf
Supereme Court history functions and reach.pdf

Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Disinformation Age

  • 2. © 2019 Accenture. ACCENTURE SECURITY Accenture Security helps organizations build resilience from the inside out, so they can confidently focus on innovation and growth. Leveraging its global network of cybersecurity labs, deep industry understanding across client value chains and services that span the security lifecycle, Accenture protects organizations’ valuable assets, end-to-end. With services that include strategy and risk management, cyber defense, digital identity, application security and managed security, Accenture enables businesses around the world to defend against known sophisticated threats, and the unknown. Follow us @AccentureSecure on Twitter or visit us at www.accenture.com/security. This document is produced by consultants at Accenture as general guidance. It is not intended to provide specific advice on your circumstances. If you require advice or further details on any matters referred to, please contact your Accenture representative. The opinions, statements, and assessments in this report are solely those of the individual author(s) and do not constitute legal advice, nor do they necessarily reflect the views of Accenture, its subsidiaries, or affiliates. LEGAL NOTICE & DISCLAIMER Copyright © 2019 Accenture. All rights reserved.
  • 3. WHO AM I 3 Copyright © 2019 Accenture Security. All rights reserved. Mei Nelson Security Principal Geopolitical and Strategic Intelligence Team iDefense Threat Intelligence Accenture Security Accenture
  • 4. HACKER – HACKTIVIST – HACKTIVISM Copyright © 2019 Accenture Security. All rights reserved. Using hacking skills to spread a specific message and bring attention to a political or social cause or The use of malicious cyber activities by non-state actors for ideological purposes (iDefense) Hacktivist Hacker + Activist Combines traditional activist tactics with hacking techniques Hacktivism Hacker
  • 5. 5 HACKTIVISM Decline? Copyright © 2019 Accenture. All rights reserved. The Cult of the Dead Cow - the Dead Cow Died? Source: cDC Source: Google
  • 6. 6 HACKTIVISM Changing Face? Copyright © 2019 Accenture. All rights reserved. Source: Wikimedia
  • 7. 7 THE CHANGING FACE OF Hacktivism Copyright © 2019 Accenture. All rights reserved. Non-state Actors State Actors
  • 8. 8 THE CHANGING FACE OF Malicious Cyber Activities Breaking into No Breaking into Systems Systems Hacktivism Copyright © 2019 Accenture. All rights reserved.
  • 9. HACKTIVISM & THEDISINFORMATION AGE Copyright © 2019 Accenture. All rights reserved.
  • 10. Disinformation Propaganda Misinformation 10Copyright © 2019 Accenture. All rights reserved. INFORMATION OPERATIONS THREE TYPES & THREE DIMENSIONS
  • 11. DISINFORMATION OPERATIONS GOALS: THE “D” WORDS 11 DIVIDE DISCREDIT DISTRACT DENY Copyright © 2019 Accenture. All rights reserved.
  • 12. DISINFORMATION OPERATIONS METHODS 12 “WHITE” METHOD Broadcasting one’s message openly through state media “GRAY” METHOD Placing information in other sympathetic media “BLACK” METHOD Using hackers, trolls, and honeypots Copyright © 2019 Accenture. All rights reserved.
  • 13. 13 • Flooding the media with multiple versions of a story to confuse the audience • Publicizing scandalous information to discredit a critic or adversary • Distracting world opinion from negative information, by highlighting or even creating some other crisis or scandal • Using inauthentic social media profiles to inflame real- world violence by publicizing rallies of rival groups Copyright © 2019 Accenture. All rights reserved. DISINFORMATION OPERATIONS TACTICS
  • 14. 14 CYBER-ENABLED INFORMATION OPERATIONS Broadly Any information operations taking place in cyberspace, including in online media and social media Narrowly Information operations leveraging offensive cyber threat activity such as subverting secure system Copyright © 2019 Accenture. All rights reserved.
  • 15. 15 CYBER-ENABLED INFORMATION OPERATIONS Hacktivism Non-state actors for ideological purposes State-controlled hacktivism using false personas Copyright © 2019 Accenture. All rights reserved. State-encouraged hacktivism trolling
  • 16. 16 CASE STUDY: #MACRONLEAKS (PART I) • Disinformation campaign: rumors, fake news, forged documents • Offensive network intrusion: computers of Macron’s campaign staff • Spreading stolen data using trolls and bots Source: Reuters Copyright © 2019 Accenture. All rights reserved.
  • 17. CASE STUDY: #MACRONLEAKS (PART II) 17 • Spear phishing campaign • Hacktivist personas • Social media bots • Imagery board: 4chan SNAKEMACKEREL (APT 28) Copyright © 2019 Accenture. All rights reserved. Source: Fancy Bears’ Hack Team website
  • 18. 18 SKATE Copyright © 2019 Accenture. All rights reserved. CASE STUDY: ENDLESS MAYFLY & OPERATION NEWSCASTER 1. Used typo-squatted domains to create inauthentic websites 2. Promoted these domains on social media platforms using inauthentic personas 3. Hosted malicious mobile applications 4. Leveraged “ephemeral disinformation” – Burn After Reading 18
  • 19. CASE STUDY: CYBER-NATIONALISM TO FANDOM NATIONALISM 19 Cyber-nationalism Copyright © 2019 Accenture. All rights reserved. Born with nationalistic and patriotic sentiment State-influenced “Striking-back” principle: “we will not attack unless we are attacked” Following key historical dates and international events involving in state’s interests
  • 20. CASE STUDY: CYBER-NATIONALISM TO FANDOM NATIONALISM 20 Fandom Nationalism Copyright © 2019 Accenture. All rights reserved. Born with nationalistic and patriotic sentiment State-influenced “Striking-back” through social media Following international events involving in state’s interests
  • 21. CASE STUDY: CYBER-NATIONALISM TO FANDOM NATIONALISM 21 Diba Expedition Copyright © 2019 Accenture. All rights reserved. Actor: Warriors/Crusaders Weapon: Emoji packs Battlefield: Social media platforms Goal: National unity?
  • 22. WHEREISTHIS HEADING? 22Copyright © 2019 Accenture. All rights reserved.
  • 23. 23 This Photo by Unknown Author is licensed under CC BY This Photo by Unknown Author is licensed under CC BY HACKING
  • 24. A FOREVER WAR OF DECEPTION: DEEPFAKES EMERGE 24
  • 25. 25 SUGGESTIONS • Follow geopolitical events • Set social media policies • Filter inauthentic accounts • Verify claims • Investigate information sources Copyright © 2019 Accenture. All rights reserved.