Romanian Presidential Election Undermined By Russia

Authorities in the EU member nation, Romania, have revealed details of what appears to be a major attempt to interfere in the country’s presidential elections using the social media platform TikTok, and a series of cyber attacks.

The Romanian Intelligence Service (SRI) disclosed that over 85,000 computer network intrusions were launched against election websites and IT systems throughout the first round of the NATO member state’s election process. 

Based on the disclosure by the SRI, the persistent computer network intrusions are indicative of a state-sponsored cyber unit with considerable resources and capabilities at its disposal.

In consequence, Romania’s Supreme Court has moved quickly to annul the results of the first round of the presidential election. The Court has ruled that the first round process must be rerun and in a statement said the annulment was based on Article 146(f) of the Constitution, emphasising the need to ensure the correctness and legality of the electoral process. Romania's domestic intelligence service says there are signs the effort was "co-ordinated by a state-sponsored actor", which they clearly think is Russian.

Calin Georgescu, a  critic of NATO who has previously praised Russian President Putin, was almost unknown in Romania until he won the first round of voting in the presidential elections. Georgescu, a pro-Russian candidate who wants to end Romania’s support for Ukraine amid Russia’s invasion, emerged as the front-runner on November 24 despite being a political outsider who declared zero campaign spending.

Now, Romanian intelligence agencies say that his sudden and surprise surge in popularity is down to a "highly organised" and "guerrilla" campaign on social media, sharing identical messaging and using influencers.They say it was conducted from "external locations" to bypass controls.

A separate intelligence assessment says that Romania has been identified as an "enemy state" by Moscow and a priority target for what it calls "aggressive hybrid actions".

The politically disruptive information, came into the public domain only a few days before the second round of voting, as a result of declassified documents published by the outgoing President, Klaus Iohannis. They reveal how paid content supporting Georgescu was promoted on TikTok, without being marked as election campaigning, in violation of the platform’s own rules and of Romanian electoral law.

Other candidates’ content was subject to strict controls and Georgescu insists that he spent nothing on election promotion, denying he was even campaigning. However. the intelligence documents released identify one TikTok account alone which they say made payments of $381,000 (£299,819) to users who were promoting Georgescu in the five weeks from 24th October,

The European Commission has ordered TikTok to “freeze and preserve data” amid the ongoing Romanian presidential elections and declassified intelligence “pointing to interference from Russia.”

The declassified documents released were all papers drawn up for a meeting of the security council following the first round of the presidential election. They also reveal that access data for electoral websites was stolen from legitimate users and published online “on cyber-crime platforms originating from Russia”. Separately, the intelligence agencies report some 85,000 attempted hacks in an attempt to access electoral data and change content, including on election day. 

The report says the cyber-attackers used advanced methods to remain anonymous, working in a way and on a scale "typical of state-sponsored actors".

In comment, Craig Watt, an expert Threat Intelligence Consultant at Quorum Cyber said, "This recent event demonstrates that Russia’s ‘Information Confrontation Doctrine’ continues to form the foundation of Moscow’s strategic cyber targeting as influence assets capitalise on European political divisions to influence Western demographics in the direction of NATO-scepticism."

An investigation is ongoing to determine more details about the campaign and precisely who was responsible.  "It will be critical for the western intelligence community to work together to combat these malign cyber operations that continue to attack the fabric of European democracy." Watt concludes.

Presidency.ro   |    Reuters   |    BBC   |   AlJazeera   |    CNN   |   Record   

Image: Ideogram

You Might Also Read: 

Social Media Algorithms & Their Effects [extract]:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

 


Cyber Security Intelligence: Captured Organised & Accessible


 

« US Telecoms Customer Data Stolen By Chinese Hackers 
TikTok Will Be Banned In The USA »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Assured Enterprises

Assured Enterprises

Assured Enterprises provides comprehensive cyber risk identification, management and mitigation across all platforms.

Cobalt Labs

Cobalt Labs

Pen Testing as a Service for Modern SaaS Businesses. Cobalt is redefining the modern pen test for companies who want serious hacker-like testing built into their development cycle.

OpenText

OpenText

OpenText is a leader in Enterprise Information Management software and a portfolio of related solutions for Information Governance, Compliance, Information Security and Privacy.

Valtori

Valtori

Government ICT Centre Valtori provides sector-independent ICT services for the central government, while taking into account the special requirements related to security and preparedness.

Findcourses.com

Findcourses.com

Findcourses is a dedicated education search engine designed to make it easy for our learners to search and find exactly what they need from our community of trusted training providers.

Envelop Risk

Envelop Risk

Envelop Risk is a global specialty cyber insurance firm, combining decades of insurance industry expertise with sophisticated cyber and artificial intelligence-based analytics.

Inspira Enterprise

Inspira Enterprise

Inspira Enterprise is a leading digital transformation company with expertise in Cyber Security, Internet of Things (IOT), Blockchain, Big Data & Analytics, Intelligent Automation and Cloud Computing.

Qascom

Qascom

Qascom is an engineering company offering security solutions in satellite navigation and space cybersecurity. We are one of the European key players in GNSS authentication and security.

Financial Services Information Sharing and Analysis Center (FS-ISAC)

Financial Services Information Sharing and Analysis Center (FS-ISAC)

The Financial Services Information Sharing and Analysis Center is the only global cyber intelligence sharing community solely focused on financial services.

Indevis

Indevis

Indevis provides IT security, datacenter and network solutions, accompanied by professional consulting, management and support services.

DH2i Company

DH2i Company

DH2i is a leading provider of multi-platform Software Defined Perimeter and Smart Availability software enabling customers to create an entire IT infrastructure that is always-secure and always-on.

Transparity Cyber

Transparity Cyber

Transparity Cyber is dedicated to cybersecurity. As part of the Transparity Group we’re an established name in the Microsoft Cloud landscape, with a focus on cybersecurity excellence.

RAD Security

RAD Security

RAD Security (formerly KSOC) is a cloud native security company that empowers engineering and security teams to drive innovation so they can focus on growth versus security problems.

Synergy ECP

Synergy ECP

Synergy ECP has a talented, dedicated staff to provide a broad range of services to the defense and intelligence industries.

UFS Technology

UFS Technology

UFS, the bank technology outfitter for community banks, provides purpose-built, bank-exclusive technology services and solutions including cybersecurity.

C5 Technology

C5 Technology

C5 Technology specialises in the provision of networking, security, and infrastructure services to enterprises and government agencies.