Cybersecurity researchers have uncovered an extensive network of digital PR firms orchestrating a sophisticated influence operation campaign through hundreds of inauthentic news websites promoting pro-China narratives globally.
Figure 1: GLASSBRIDGE ecosystem
Named "GLASSBRIDGE" by Google's Threat Intelligence Group (TAG), the operation involves four distinct companies that operate networks of fake news sites and newswire services designed to appear as independent media outlets while publishing coordinated content aligned with Chinese state interests.
"These firms bulk-create and operate hundreds of domains posing as independent news websites from dozens of countries," said Vanessa Molter, a researcher at Google TAG. "In reality, they're publishing thematically similar, inauthentic content that emphasizes narratives aligned to the political interests of the People's Republic of China."
Key findings from the investigation include:
Shanghai Haixun Technology emerged as the most prolific operator, with over 600 policy-violating domains removed from Google News
Times Newswire and Shenzhen Haimai Yunxiang Media controlled over 100 websites targeting 30+ countries
DURINBRIDGE operated 200+ fake news sites publishing both general news and pro-China narratives
Shenzhen Bowen Media managed 100+ domains impersonating local news outlets across multiple continents
Figure 3: “Secret History of Tsai Ing-Wen,” on DURINBRIDGE-operated inauthentic news site
Figure 4: Narratives about then-candidate Lai Ching-te promoted by DRAGONBRIDGE prior to the Taiwanese presidential election
The operation targeted audiences in numerous countries including Australia, France, Germany, India, Japan, Malaysia, Singapore, the United States and others through localized content in multiple languages.
"By using private PR firms, the actors behind these information operations gain plausible deniability, obscuring their role in the dissemination of coordinated inauthentic content," explained Ryan Serabian, a senior analyst at Mandiant who contributed to the investigation.
The websites mix legitimate local news content copied from real outlets with articles republished from Chinese state media, press releases, and targeted narratives on topics like Taiwan, the South China Sea, COVID-19, and other issues aligned with Beijing's political interests.
Google has taken enforcement action by blocking over 1,000 GLASSBRIDGE-operated websites from appearing in Google News features and Google Discover for violating policies against deceptive behavior and requirements for editorial transparency.
While researchers cannot definitively attribute who commissioned these services, they assess the firms may be taking direction from a shared customer orchestrating the distribution of pro-China content through this network of imitation news websites.
The discovery of GLASSBRIDGE highlights how information operations increasingly leverage legitimate-appearing commercial firms and news services to spread coordinated messaging while maintaining deniability - a tactic also observed in Russian campaigns.
"These inauthentic news sites illustrate how information operations actors have embraced methods beyond social media in an attempt to spread their narratives," noted Molter. "By posing as independent local news outlets, they can tailor content to specific regional audiences while concealing the coordinated nature of the operation."
Google has stated it will continue monitoring GLASSBRIDGE activity and blocking policy-violating content as part of its ongoing efforts to combat coordinated influence operations across its platforms.
Visit our website to get cybersecurity updates like this, thesecmaster.com, and our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium, and Instagram and subscribe to receive tips like this.
You may also like these articles:
Chinese Threat Actor SilkSpecter Launches Massive Phishing Campaign Against Holiday Shoppers
T-Mobile Confirms Breach in Chinese Cyber-Espionage Campaign
Microsoft Strikes Back Seizes Over 240 Phishing Websites in Major Crackdown
How BackdoorDiplomacy APT Group Uses Turian Backdoor To Carryout Cyber Espionage Campaign?
Anthony Denis a Security News Reporter with a Bachelor's in Business Computer Application. Drawing from a decade of digital media marketing experience and two years of freelance writing, he brings technical expertise to cybersecurity journalism. His background in IT, content creation, and social media management enables him to deliver complex security topics with clarity and insight.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.