Russian Disinformation Campaign Reportedly Used AI-Generated Posts and Videos to Target 2025 Moldovan Parliamentary Elections

September 7, 2025

Investigations suggest Russian operatives have employed possibly AI-generated posts, videos, and websites to manipulate the September 2025 Moldovan parliamentary elections. Networks of approximately 900 accounts on platforms like TikTok, Facebook, Instagram, Telegram, and YouTube allegedly disseminated fabricated narratives, including misogynistic remarks and false accusations against President Maia Sandu.

This incident underscores the need for responsible AI governance and harm prevention measures. To contribute to these efforts, learn more about HISPI Project Cerebellum TAIM and how you can participate in shaping safe and secure AI practices by visiting JOIN US.

Matched TAIM controls

Suggested mapping from embedding similarity (not a formal assessment). Browse all TAIM controls

Alleged deployer
storm-1679, storm-1516, russian-state-linked-actors, russian-disinformation-operators, matryoshka, influence-operation-groups
Alleged developer
unknown-generative-ai-developers
Alleged harmed parties
moldovan-voters, moldovan-democratic-institutions, maia-sandu, general-public-of-moldova, general-public, european-union, epistemic-integrity, electoral-integrity, national-security-and-intelligence-stakeholders

Source

Data from the AI Incident Database (AIID). Cite this incident: https://incidentdatabase.ai/cite/1202

Data source

Incident data is from the AI Incident Database (AIID).

When citing the database as a whole, please use:

McGregor, S. (2021) Preventing Repeated Real World AI Failures by Cataloging Incidents: The AI Incident Database. In Proceedings of the Thirty-Third Annual Conference on Innovative Applications of Artificial Intelligence (IAAI-21). Virtual Conference.

Pre-print on arXiv · Database snapshots & citation guide

We use weekly snapshots of the AIID for stable reference. For the official suggested citation of a specific incident, use the “Cite this incident” link on each incident page.