Roskomnadzor Removes 1.7K Election Misinformation Materials

No time to read?
Get a summary

Roskomnadzor announced that around 1,700 materials containing misinformation about Russia’s presidential elections were removed. The information was conveyed by TASS, citing the department’s press service. The ministry explained that specialists also took down fake websites and accounts that pretended to be linked to the Central Election Commission and the election commissions of Russia’s federal subjects during the campaign period.

Earlier, Servicepipe reported that during February and the first half of March, cyberattacks launched by Ukrainian-linked actors against Russian resources surged by a factor of nearly 4.6. This trend underscores the persistent struggle between hostile digital activities and election-related infrastructure across the broader region.

Since the start of 2024, there has been a noticeable rise in phishing campaigns that rely on QR codes, targeting Russians through social networks and messaging apps. In these schemes, attackers circulate promotional content that contains a QR code, directing users to phishing sites. When individuals enter personal data on these pages, attackers can access confidential information and, in many cases, seize control of online accounts. This pattern highlights a shift toward visually convincing, code-based lures that exploit the trust users place in familiar digital channels.

In many instances, the initial phase of these campaigns involved redirecting victims to malicious sites that imitate well-known video services. The goal is to harvest credentials, payment details, or other sensitive data by creating a sense of legitimacy and immediacy. The evolving tactic reflects a broader trend in cybercrime, where attackers blend credible branding with deceptive technical infrastructure to lower the guard of everyday users.

Experts emphasize the importance of cautious online behavior during extended electoral periods, noting that multilingual and region-specific disinformation campaigns often piggyback on real-world political conversations. Users are urged to verify the provenance of election-related content, cross-check information with official channels, and refrain from clicking on unfamiliar links or scanning unfamiliar QR codes encountered in unsolicited messages. Robust cybersecurity practices, such as enabling multifactor authentication, using password managers, and keeping software up to date, can significantly reduce the risk of credential theft and account compromise. Governments and platforms are likewise advised to maintain transparent reporting mechanisms and timely warnings when credible threats are identified, so citizens can distinguish between legitimate electoral information and manipulative material.

In parallel, security researchers continue to track the technical footprints of these campaigns, including the domains hosting fraudulent resources, the common patterns in phishing pages, and the distribution networks that deliver deceptive content to unsuspecting users. By sharing actionable indicators of compromise and providing guidance for safe online conduct, the digital community aims to curb the spread of misleading narratives and mitigate the impact on public trust during elections.

No time to read?
Get a summary
Previous Article

Visa Inquiry Expands, Examining Abuse, Documentation Gaps, and Mediation

Next Article

Ancient Turkish Piercing Beliefs: Early Body Modifications and Symbolism