Executive Summary
In 2025, the University of New South Wales (UNSW) conducted 'Capture the Narrative,' a pioneering wargame where students developed AI-driven bots to influence a simulated election on a fictional social media platform. Over four weeks, participants generated over 7 million posts, with more than 60% of content produced by these bots. The exercise demonstrated how AI can be leveraged to manipulate public opinion, resulting in a 1.78% swing that altered the election outcome. This experiment underscores the growing threat of AI-powered influence operations in real-world scenarios. (unsw.edu.au)
The relevance of this incident is heightened by the increasing use of AI in disinformation campaigns. For instance, Microsoft reported that China has begun employing generative AI to create realistic images supporting divisive U.S. political content, marking a significant evolution in influence operations. (axios.com)
Why This Matters Now
The 'Capture the Narrative' wargame highlights the urgent need for robust defenses against AI-driven disinformation. As AI technologies become more accessible, malicious actors can more easily manipulate public opinion, posing significant risks to democratic processes and societal trust.
Attack Path Analysis
Adversaries initiated the attack by exploiting unencrypted traffic to intercept sensitive data. They then escalated privileges by manipulating IAM roles to gain broader access. Utilizing east-west traffic, they moved laterally across the network to access critical systems. Command and control were established through covert channels, allowing persistent access. Data was exfiltrated via unauthorized outbound traffic to external servers. Finally, the impact included data manipulation and disruption of services.
Kill Chain Progression
Initial Compromise
Description
Adversaries exploited unencrypted traffic to intercept sensitive data in transit.
MITRE ATT&CK® Techniques
Obtain Capabilities: Artificial Intelligence
Phishing
Establish Accounts
Compromise Accounts
Develop Capabilities
Compromise Infrastructure
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
NIST Special Publication 800-53 – System Monitoring
Control ID: SI-4
PCI DSS 4.0 – Incident Response Plan
Control ID: 12.10
NYDFS 23 NYCRR 500 – Cybersecurity Program
Control ID: 500.02
Digital Operational Resilience Act (DORA) – ICT Risk Management Framework
Control ID: Article 5
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
CISA Zero Trust Maturity Model 2.0 – Identity Management
Control ID: Identity
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Government Administration
AI-powered influence operations targeting elections pose critical threats to democratic processes, requiring enhanced social media monitoring and public information security frameworks.
Political Organization
Direct exposure to AI-driven bot manipulation campaigns designed to sway electoral outcomes through sophisticated social media influence operations and narrative control.
Higher Education/Acadamia
Educational institutions face risks from AI manipulation research applications while needing cybersecurity training programs to combat influence operations and misinformation campaigns.
Broadcast Media
Media organizations must defend against AI-generated content designed to manipulate public opinion while implementing detection systems for automated influence campaigns.
Sources
- Wargame Exercise Demonstrates How Social Media Manipulation Workshttps://www.darkreading.com/cyber-risk/wargame-demonstrates-social-media-manipulationVerified
- How Fake People Became Real Influencershttps://www.theatlantic.com/podcasts/2026/04/how-fake-people-became-real-influencers/686755/Verified
- AI in the Age of Fake (Imagined) Contenthttps://www.stimson.org/2026/ai-in-the-age-of-fake-imagined-content/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it could have constrained the attacker's ability to exploit unencrypted traffic, escalate privileges, move laterally, establish covert channels, and exfiltrate data, thereby reducing the overall blast radius.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: Implementing Aviatrix CNSF would likely limit the attacker's ability to intercept unencrypted data, reducing the risk of initial compromise.
Control: Zero Trust Segmentation
Mitigation: Aviatrix Zero Trust Segmentation would likely constrain the attacker's ability to escalate privileges by enforcing strict access controls based on identity and context.
Control: East-West Traffic Security
Mitigation: Aviatrix East-West Traffic Security would likely reduce the attacker's ability to move laterally by segmenting workloads and enforcing strict communication policies.
Control: Multicloud Visibility & Control
Mitigation: Aviatrix Multicloud Visibility & Control would likely limit the attacker's ability to establish covert channels by providing comprehensive monitoring and control over network traffic.
Control: Egress Security & Policy Enforcement
Mitigation: Aviatrix Egress Security & Policy Enforcement would likely constrain the attacker's ability to exfiltrate data by controlling and monitoring outbound traffic.
While Aviatrix CNSF could limit the attacker's ability to manipulate data and disrupt services, some impact may still occur depending on the attacker's initial access and the organization's specific configurations.
Impact at a Glance
Affected Business Functions
- Public Relations
- Marketing
- Customer Engagement
- Brand Management
Estimated downtime: N/A
Estimated loss: N/A
n/a
Recommended Actions
Key Takeaways & Next Steps
- • Implement Encrypted Traffic (HPE) to secure data in transit and prevent interception.
- • Enforce Zero Trust Segmentation to limit privilege escalation and lateral movement.
- • Utilize East-West Traffic Security to monitor and control internal traffic flows.
- • Deploy Egress Security & Policy Enforcement to detect and block unauthorized outbound traffic.
- • Establish Threat Detection & Anomaly Response mechanisms to identify and respond to suspicious activities promptly.



