Romanian Presidential Election Undermined By Russia

Authorities in the EU member nation, Romania, have revealed details of what appears to be a major attempt to interfere in the country’s presidential elections using the social media platform TikTok, and a series of cyber attacks.

The Romanian Intelligence Service (SRI) disclosed that over 85,000 computer network intrusions were launched against election websites and IT systems throughout the first round of the NATO member state’s election process. 

Based on the disclosure by the SRI, the persistent computer network intrusions are indicative of a state-sponsored cyber unit with considerable resources and capabilities at its disposal.

In consequence, Romania’s Supreme Court has moved quickly to annul the results of the first round of the presidential election. The Court has ruled that the first round process must be rerun and in a statement said the annulment was based on Article 146(f) of the Constitution, emphasising the need to ensure the correctness and legality of the electoral process. Romania's domestic intelligence service says there are signs the effort was "co-ordinated by a state-sponsored actor", which they clearly think is Russian.

Calin Georgescu, a  critic of NATO who has previously praised Russian President Putin, was almost unknown in Romania until he won the first round of voting in the presidential elections. Georgescu, a pro-Russian candidate who wants to end Romania’s support for Ukraine amid Russia’s invasion, emerged as the front-runner on November 24 despite being a political outsider who declared zero campaign spending.

Now, Romanian intelligence agencies say that his sudden and surprise surge in popularity is down to a "highly organised" and "guerrilla" campaign on social media, sharing identical messaging and using influencers.They say it was conducted from "external locations" to bypass controls.

A separate intelligence assessment says that Romania has been identified as an "enemy state" by Moscow and a priority target for what it calls "aggressive hybrid actions".

The politically disruptive information, came into the public domain only a few days before the second round of voting, as a result of declassified documents published by the outgoing President, Klaus Iohannis. They reveal how paid content supporting Georgescu was promoted on TikTok, without being marked as election campaigning, in violation of the platform’s own rules and of Romanian electoral law.

Other candidates’ content was subject to strict controls and Georgescu insists that he spent nothing on election promotion, denying he was even campaigning. However. the intelligence documents released identify one TikTok account alone which they say made payments of $381,000 (£299,819) to users who were promoting Georgescu in the five weeks from 24th October,

The European Commission has ordered TikTok to “freeze and preserve data” amid the ongoing Romanian presidential elections and declassified intelligence “pointing to interference from Russia.”

The declassified documents released were all papers drawn up for a meeting of the security council following the first round of the presidential election. They also reveal that access data for electoral websites was stolen from legitimate users and published online “on cyber-crime platforms originating from Russia”. Separately, the intelligence agencies report some 85,000 attempted hacks in an attempt to access electoral data and change content, including on election day. 

The report says the cyber-attackers used advanced methods to remain anonymous, working in a way and on a scale "typical of state-sponsored actors".

In comment, Craig Watt, an expert Threat Intelligence Consultant at Quorum Cyber said, "This recent event demonstrates that Russia’s ‘Information Confrontation Doctrine’ continues to form the foundation of Moscow’s strategic cyber targeting as influence assets capitalise on European political divisions to influence Western demographics in the direction of NATO-scepticism."

An investigation is ongoing to determine more details about the campaign and precisely who was responsible.  "It will be critical for the western intelligence community to work together to combat these malign cyber operations that continue to attack the fabric of European democracy." Watt concludes.

Presidency.ro   |    Reuters   |    BBC   |   AlJazeera   |    CNN   |   Record   

Image: Ideogram

You Might Also Read: 

Social Media Algorithms & Their Effects [extract]:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

 


Cyber Security Intelligence: Captured Organised & Accessible


 

« US Telecoms Customer Data Stolen By Chinese Hackers 
TikTok Will Be Banned In The USA »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Tanium

Tanium

Tanium delivers Autonomous Endpoint Management (AEM) with the industry’s only true real-time platform for AI.

DataCore Software

DataCore Software

DataCore Software is a leader in Software-Defined Storage. Solutions offered include back up and disaster recovery.

Magic Software Enterprises

Magic Software Enterprises

Magic provide Mobile Device Management (MDM) for Secure Enterprise Mobility. Magic MDM overcomes the challenges of mobile device management security by protecting all of your devices, data and content

Electus Recruitment Solutions

Electus Recruitment Solutions

Electus is a leading recruitment specialist in the Engineering, Technology & Digital and Cyber & Security sectors.

Codified Security

Codified Security

Codified is a testing platform for mobile application software. We make it easier than ever for companies to detect and fix security vulnerabilities and ensure their applications are compliant.

Science Applications International Corporation (SAIC)

Science Applications International Corporation (SAIC)

SAIC is a premier technology integrator in the technical, engineering, intelligence, and enterprise information technology markets. Services and solutions include Cybersecurity.

Sandia National Laboratories

Sandia National Laboratories

Sandia National Laboratories is a premier science and engineering lab for national security and technology innovation.

Crypto4A Technologies

Crypto4A Technologies

Crypto4A quantum-ready cybersecurity solutions significantly improve protection for Cloud, loT, Blockchain, V2X, government and military application deployments.

e-End

e-End

e-End provides hard drive shredding, degaussing and data destruction solutions validated by the highest electronic certifcations to keep you compliant with GLB, SOX, FACTA, FISMA, HIPAA, COPPA, ITAR.

BIND 4.0

BIND 4.0

Bind 4.0 is an acceleration program geared toward tech startups with solutions applied to Advanced Manufacturing, Smart Energy, Health Tech or Food Tech fields.

Optimum Speciality Risks

Optimum Speciality Risks

Optimum Speciality Risks are an experienced team of cyber insurance experts, backed by Lloyds of London.

Dynics

Dynics

The Dynics ICS-Defender is an Industrial Control System Security Appliance for OT or OT/IT convergent environments.

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection (HIP) is the premier educational forum for identity-centric cybersecurity practitioners charged with defending hybrid cloud environments.

Computer Futures

Computer Futures

Computer Futures are a global specialist IT recruitment partner, matching candidates with roles across niche IT markets and core technologies.

XeneX

XeneX

XeneX Cloud Security Services address enterprise-class security challenges by enabling DevOps and Security teams to access a shared source of truth.

GetReal Security

GetReal Security

GetReal Security is the world’s leading authority on malicious digital content and deepfake protection.