#FactCheck - Deepfake Video Falsely Claims visuals of a massive rally held in Manipur
Executive Summary:
A viral online video claims visuals of a massive rally organised in Manipur for stopping the violence in Manipur. However, the CyberPeace Research Team has confirmed that the video is a deep fake, created using AI technology to manipulate the crowd into existence. There is no original footage in connection to any similar protest. The claim that promotes the same is therefore, false and misleading.
Claims:
A viral post falsely claims of a massive rally held in Manipur.


Fact Check:
Upon receiving the viral posts, we conducted a Google Lens search on the keyframes of the video. We could not locate any authentic sources mentioning such event held recently or previously. The viral video exhibited signs of digital manipulation, prompting a deeper investigation.
We used AI detection tools, such as TrueMedia and Hive AI Detection tool, to analyze the video. The analysis confirmed with 99.7% confidence that the video was a deepfake. The tools identified "substantial evidence of manipulation," particularly in the crowd and colour gradience , which were found to be artificially generated.



Additionally, an extensive review of official statements and interviews with Manipur State officials revealed no mention of any such rally. No credible reports were found linking to such protests, further confirming the video’s inauthenticity.
Conclusion:
The viral video claims visuals of a massive rally held in Manipur. The research using various tools such as truemedia.org and other AI detection tools confirms that the video is manipulated using AI technology. Additionally, there is no information in any official sources. Thus, the CyberPeace Research Team confirms that the video was manipulated using AI technology, making the claim false and misleading.
- Claim: Massive rally held in Manipur against the ongoing violence viral on social media.
- Claimed on: Instagram and X(Formerly Twitter)
- Fact Check: False & Misleading
Related Blogs
.webp)
Introduction
The rise of unreliable social media newsgroups on online platforms has significantly altered the way people consume and interact with news, contributing to the spread of misinformation and leading to sources of unverified and misleading content. Unlike traditional news outlets that adhere to journalistic standards, these newsgroups often lack proper fact-checking and editorial oversight, leading to the rapid dissemination of false or distorted information. Social media transformed individuals into active content creators. Social media newsgroups (SMNs) are social media platforms used as sources of news and information. According to a survey by the Pew Research Center (July-August 2024), 54% of U.S. adults now rely on social media for news. This rise in SMNs has raised concerns over the integrity of online news and undermines trust in legitimate news sources. Social media users are advised to consume information and news from authentic sources or channels available on social media platforms.
The Growing Issue of Misinformation in Social Media Newsgroups
Social media newsgroups have become both a source of vital information and a conduit for misinformation. While these platforms allow rapid news sharing and facilitate political and social campaigns, they also pose significant risks of unverified information. Misleading information, often driven by algorithms designed to maximise user engagement, proliferates in these spaces. This has led to increasing challenges, as SMNs cater to diverse communities with varying political affiliations, gender demographics, and interests. This sometimes results in the creation of echo chambers where information is not critically assessed, amplifying the confirmation bias and enabling the unchecked spread of misinformation. A prominent example is the false narratives surrounding COVID-19 vaccines that spread across SMNs, contributing to widespread vaccine hesitancy and public health risks.
Understanding the Susceptibility of Online Newsgroups to Misinformation
Several factors make social media newsgroups particularly susceptible to misinformation. Some of the factors are listed below:
- The lack of robust fact-checking mechanisms in social media news groups can lead to false narratives which can spread easily.
- The lack of expertise from admins of online newsgroups, who are often regular users without journalism knowledge, can result in the spreading of inaccurate information. Their primary goal of increasing engagement may overshadow concerns about accuracy and credibility.
- The anonymity of users exacerbates the problem of misinformation. It allows users to share unverified or misleading content without accountability.
- The viral nature of social media also leads to the vast spread of misinformation to audiences instantly, often outpacing efforts to correct it.
- Unlike traditional media outlets, online newsgroups often lack formal fact-checking processes. This absence allows misinformation to circulate without verification, making it easier for inaccuracies to go unchallenged.
- The sheer volume of user engagement in the form of posts has created the struggle to moderate content effectively imposing significant challenges.
- Social Media Platforms have algorithms designed to enhance user engagement and inadvertently amplify sensational or emotionally charged content, which is more likely to be false.
Consequences of Misinformation in Newsgroups
The societal impacts of misinformation in SMNs are profound. Political polarisation can fuel one-sided views and create deep divides in democratic societies. Health risks emerge when false information spreads about critical issues, such as the anti-vaccine movements or misinformation related to public health crises. Misinformation has dire long-term implications and has the potential to destabilise governments and erode trust in media, in both traditional and social media leading to undermining democracy. If unaddressed, the consequences could continue to ripple through society, perpetuating false narratives that shape public opinion.
Steps to Mitigate Misinformation in Social Media Newsgroups
- Educating users in social media literacy education can empower critical assessment of the information encountered, reducing the spread of false narratives.
- Introducing stricter platform policies, including penalties for deliberately sharing misinformation, may act as a deterrent against sharing unverified information.
- Collaborative fact-checking initiatives with involvement from social media platforms, independent journalists, and expert organisations can provide a unified front against the spread of false information.
- From a policy perspective, a holistic approach that combines platform responsibility with user education and governmental and industry oversight is essential to curbing the spread of misinformation in social media newsgroups.
Conclusion
The emergence of Social media newsgroups has revolutionised the dissemination of information. This rapid spread of misinformation poses a significant challenge to the integrity of news in the digital age. It gets further amplified by algorithmic echo chambers unchecked user engagement and profound societal implications. A multi-faceted approach is required to tackle these issues, combining stringent platform policies, AI-driven moderation, and collaborative fact-checking initiatives. User empowerment concerning media literacy is an important factor in promoting critical thinking and building cognitive defences. By adopting these measures, we can better navigate the complexities of consuming news from social media newsgroups and preserve the reliability of online information. Furthermore, users need to consume news from authoritative sources available on social media platforms.
References

Introduction
In the sprawling online world, trusted relationships are frequently taken advantage of by cybercriminals seeking to penetrate guarded systems. The Watering Hole Attack is one advanced method, which focuses on a user’s ecosystem by compromising the genuine sites they often use. This attack method is different from phishing or direct attacks as it quietly exploits the everyday browsing of the target to serve malicious content. The quiet and exact nature of watering hole attacks makes them prevalent amongst Advanced Persistent Threat (APT) groups, especially in conjunction with state-sponsored cyber-espionage operations.
What Qualifies as a Watering Hole Attack?
A Watering Hole Attack targets and infects a trusted website. The targeted website is one that is used by a particular organization or community, such as a specific industry sector. This type of cyberattack is analogous to the method of attack used by animals and predators waiting by the water’s edge for prey to drink. Attackers prey on their targets by injecting malicious code, such as an exploit kit or malware loader, into websites that are popular with their victims. These victims are then infected when they visit said websites unknowingly. This opens as a gateway for attackers to infiltrate corporate systems, harvest credentials, and pivot across internal networks.
How Watering Hole Attacks Unfold
The attack lifecycle usually progresses as follows:
- Reconnaissance - Attackers gather intelligence on the websites frequented by the target audience, including specialized communities, partner websites, or local news sites.
- Website Exploitation - Through the use of outdated CMS software and insecure plugins, attackers gain access to the target website and insert malicious code such as JS or iframe redirections.
- Delivery and Exploitation - The visitor’s browser executes the malicious code injected into the page. The code might include a redirection payload which sends the user to an exploit kit that checks the user’s browser, plugins, operating system, and other components for vulnerabilities.
- Infection and Persistence - The infected system malware such as RATs, keyloggers, or backdoors. These enable lateral and long-term movements within the organisation for espionage.
- Command and Control (C2) - For further instructions, additional payload delivery, and stolen data retrieval, infected devices connect to servers managed by the attackers.
Key Features of Watering Hole Attacks
- Indirect Approach: Instead of going after the main target, attackers focus on sites that the main target trusts.
- Supply-Chain-Like Impact: An infected industry portal can affect many companies at the same time.
- Low Profile: It is difficult to identify since the traffic comes from real websites.
- Advanced Customization: Exploit kits are known to specialize in making custom payloads for specific browsers or OS versions to increase the chance of success.
Why Are These Attacks Dangerous?
Worming hole attacks shift the battlefield to new grounds in cyber warfare on the web. They eliminate the need for firewalls, email shields, and other security measures because they operate on the traffic to and from real, trusted websites. When the attacks work as intended, the following consequences can be expected:
- Stealing Credentials: Including privileged accounts and VPN credentials.
- Espionage: Theft of intellectual property, defense blueprints, or government confidential information.
- Supply Chain Attacks: Resulting in a series of infections among related companies.
- Zero-Day Exploits: Including automated attacks using zero-day exploits for full damage.
Incidents of Primary Concern
The implications of watering hole attacks have been felt in the real world for quite some time. An example from 2019 reveals this, where a known VoIP firm’s site was compromised and used to spread data-stealing malware to its users. Likewise, in 2014, the Operation Snowman campaign—which seems to have a state-backed origin—attempted to infect users of a U.S. veterans’ portal in order to gain access to visitors from government, defense, and related fields. Rounding up the list, in 2021, cybercriminals attacked regional publications focusing on energy, using the publications to spread malware to company officials and engineers working on critical infrastructure, as well as to steal data from their systems. These attacks show the widespread and dangerous impact of watering hole attacks in the world of cybersecurity.
Detection Issues
Due to the following reasons, traditional approaches to security fail to detect watering hole attacks:
- Use of Authentic Websites: Attacks involving trusted and popular domains evade detection via blacklisting.
- Encrypted Traffic: Delivering payloads over HTTPS conceals malicious scripts from being inspected at the network level.
- Fileless Methods: Using in-memory execution is a modern campaign technique, and detection based on signatures is futile.
Mitigation Strategies
To effectively neutralize the threat of watering hole attacks, an organization should implement a defense-in-depth strategy that incorporates the following elements:
- Patch Management and Hardening -
- Conduct routine updates on operating systems, web browsers, and extensions to eliminate exploit opportunities.
- Either remove or reduce the use of high-risk elements such as Flash and Java, if feasible.
- Network Segmentation - Minimize lateral movement by isolating critical systems from the general user network.
- Behavioral Analytics - Implement Endpoint Detection and Response (EDR) tools to oversee unusual behaviors on processes—for example, script execution or dubious outgoing connections.
- DNS Filtering and Web Isolation - Implement DNS-layer security to deny access to known malicious domains and use browser isolation for dangerous sites.
- Threat Intelligence Integration - Track watering hole threats and campaigns for indicators of compromise (IoCs) on advisories and threat feeds.
- Multi-Layer Email and Web Security - Use web gateways integrated with dynamic content scanning, heuristic analysis, and sandboxing.
- Zero Trust Architecture - Apply least privilege access, require device attestation, and continuous authentication for accessing sensitive resources.
Incident Response Best Practices
- Forensic Analysis: Check affected endpoints for any mechanisms set up for persistence and communication with C2 servers.
- Log Review: Look through proxy, DNS, and firewall logs to detect suspicious traffic.
- Threat Hunting: Search your environment for known Indicators of Compromise (IoCs) related to recent watering hole attacks.
- User Awareness Training: Help employees understand the dangers related to visiting external industry websites and promote safe browsing practices.
The Immediate Need for Action
The adoption of cloud computing and remote working models has significantly increased the attack surface for watering hole attacks. Trust and healthcare sectors are increasingly targeted by nation-state groups and cybercrime gangs using this technique. Not taking action may lead to data leaks, legal fines, and break-ins through the supply chain, which damage the trustworthiness and operational capacity of the enterprise.
Conclusion
Watering hole attacks demonstrate how phishing attacks evolve from a broad attack to a very specific, trust-based attack. Protecting against these advanced attacks requires the zero-trust mindset, adaptive defenses, and continuous monitoring, which is multicentral security. Advanced response measures, proactive threat intelligence, and detection technologies integration enable organizations to turn this silent threat from a lurking predator to a manageable risk.
References
- https://www.fortinet.com/resources/cyberglossary/watering-hole-attack
- https://en.wikipedia.org/wiki/Watering_hole_attack
- https://www.proofpoint.com/us/threat-reference/watering-hole
- https://www.techtarget.com/searchsecurity/definition/watering-hole-attack

Introduction
After the tragic bomb blast at RedFort on November 10, 2025, there is a trail of misinformation and false narratives spread rapidly across social media platforms, messaging and news channels. It can not only unfold into a public misunderstanding but can also incite panic, communal tensions and endanger lives. To prevent all of these from happening, we, as responsible citizens, can play a critical role by verifying information before sharing it with friends, family, or colleagues. This article provides guidance on practical, evidence-based strategies to navigate the information landscape and protect yourself and your community from the harm caused by misinformation and disinformation.
Digital Scams in the Aftermath of the Blast
Cybercriminals increased their activity in the hours after the Red Fort explosion, using the country’s sorrow as a chance to take advantage of fear.
Numerous allegations surfaced of residents receiving threatening calls that falsely claimed they were “digitally arrested” or that their phones, bank accounts, or Aadhaar were being “seized for investigation”, accusing them of being involved in the explosion. These fictitious intimidation calls sent innocent people into worry, anxiety, and doubt spirals.
The pattern is common after major national crises:
- Fear rises.
- People seek urgent answers.
- Cybercriminals exploit the confusion.
Knowing this makes it easier for us to remain watchful. No law enforcement organisation uses phone conversations, WhatsApp communications, or threats of “digital detention” to make arrests or conduct investigations.
Verify breaking news from trusted official channels
Whenever a crisis like bomb blasts occurs, people look for information on social media, news channels, and YouTube channels to stay fully informed about the situation. This is a very chaotic moment, and due to the lack of government verification of the initial information, false news spread rapidly.
Where to seek verified information:
a. Press Information Bureau (PIB): The official government news agency that, from time to time, clarifies viral news.
b. Delhi Police Official Channels: Check social media handles of Delhi Police.
c. Ministry of Home Affairs (MHA): MHA is responsible for internal security, and gives information about this information through official press releases and notifications.
d. Major Credible news outlets: Some news channels can be trusted with news, as they typically verify information before publishing, like The Hindu, Indian Express.
What to do:
Cross-check every unverified social media post and news that you come across from credible news channels and official government press releases.
Verify Images and videos using reverse search tools
Recently, many social media handles have been sharing old photos of different bomb blasts from Ukraine, Israel, and Palestine in the name of the Red Fort blasts. While it can create a false narrative, the same should be verified before sharing.
Reliable fact-checking resources and how to use them.
Every country has dedicated fact-checking organisations that systematically verify viral claims.
Fact-checking organisations based in India:
a. PIB Fact Check (https://factcheck.pib.gov.in/ )
· It is the official fact-checking unit of the PIB, which focuses on demystifying government-related misinformation.
· email: socialmedia@pib.gov.in
· Telegram: http://t.me/PIB_FactCheck
· Follow it on: Twitter (@PIBFactCheck), Facebook, Instagram, Telegram and WhatsApp.
How to use these resources:
· Whenever you come across any viral post, use exact keywords or quotes to find those on these resources.
· Look for the verdict (true, false, misleading), then share the verified fact-checks with your network to debunk false narratives.
Practice Digital Hygiene and Be Cautious When Sharing
Digital hygiene refers to the practices and habits individuals adopt to maintain a healthy and secure digital lifestyle. Simple digital practices can restrict the spread of misinformation. A vigilant individual can reduce the spread of misinformation. It can be done by below steps
i. Check URLs and Links: We can verify the URLs and links of any news and websites using different tools to check the credibility of any news
ii. How to Evaluate the Trustworthiness of Sources:
· Verify if the account sharing the information has a blue checkmark on most platforms.
· Examine the account's background, whether it is a recognised media source, an official government profile, or a newly created anonymous account?
· Approach posts featuring intense emotional language ("URGENT!", "SHOCKING!", "MUST SHARE!") with scepticism.
· Refrain from posting screenshots of tweets or posts while providing a link to the source, allowing others to confirm its validity.
iii. Before You Distribute:
· Question yourself: "Am I certain this is accurate based on a reliable source?"
· Avoid the temptation to share breaking news immediately; hold off until it has been confirmed by government sources.
· If you're uncertain, include a comment such as "I haven't confirmed this yet; please consult reliable sources" instead of sharing unverified information.
· Reflect on the consequences, as it might lead to panic, provoke communal violence, or damage an individual's reputation
6. How to report misinformation to platforms and authorities?
While it is important to verify news before sharing it to prevent fake news, it is also important to report it to reduce misinformation and the violence caused due to it. On social media like Facebook, Instagram, Twitter/X, WhatsApp, and Telegram, anyone can report the same on the platform.
Reporting to the Government Authorities:
a. PIB Fact Check WhatsApp (+91 8799711259):
Send Screenshots or texts of suspected government-related misinformation for verification, and then an automated acknowledgement is generated.
b. Delhi Police Cyber Crime Unit
Cyber Crimes such as Email Frauds, Social Media Crimes, Mobile App-related crimes, Business Email Compromise, Data Theft, Ransomware, Net Banking/ ATM Frauds and fake calls frauds, insurance frauds, lottery scam, bitcoin, cheating scams, online transactions frauds can be reported to the Delhi Police Cyber Crime Unit.
7. Quick checklist: What to do When You See Breaking News
· Wait before sharing any breaking news.
· Go through official channels like PIB and other official channels like MHA.
· If not available there, then cross-reference it from 2-3 credible news sources for the same information.
· Check timestamps and metadata, and compare metadata dates with claims about when events occurred.
· In case you find any information, news or any social media posts as misleading, then report the same.
CyberPeace Resolves: Pause. Reflect. Then Respond
Misinformation becomes the infection that spreads the fastest when people are confused and afraid. Every citizen is urged by CyberPeace to remain composed, stand tall, and not panic, particularly in times of national emergency.
Prior to experiencing an emotional response to any concerning call, message, or widely shared news:
Pause. Reflect. Acknowledge.
- Pause before sharing or responding.
- Reflect on whether the information is from a credible source.
- Acknowledge what you know—and what is just rumour.
CyberPeace is still dedicated to helping people and communities deal with online dangers, safeguard mental health, and dispel false information with clarity and truth.