"Video: False Staging in Bucha Revealed!" claimed one of the fake news stories, which blamed Ukraine for the slaughter of hundreds of Ukrainians in a town occupied by the Russians.
The fake social media accounts were then used to spread links to the fake news stories and other pro-Russian posts and videos on Facebook and Instagram, as well as platforms including Telegram and Twitter. The network was active throughout the summer.
"On a few occasions, the operation's content was amplified by the official Facebook pages of Russian embassies in Europe and Asia," said David Agranovich, Meta's director of threat disruption. "I think this is probably the largest and most complex Russian-origin operation that we've disrupted since the beginning of the war in Ukraine this year."
The network's activities were first noticed by investigative reporters in Germany. When Meta began its investigation it found that many of the fake accounts had already been removed by Facebook's automated systems. Thousands of people were following the network's Facebook pages when they were deactivated this year.
Researchers said they couldn't directly attribute the network to the Russian government. But Agranovich noted the role played by Russian diplomats and said the operation relied on sophisticated tactics, including the use of multiple languages and carefully constructed imposter websites.
Since the war began in February, the Kremlin has used online disinformation and conspiracy theories in an effort to weaken international support for Ukraine. Groups linked to the Russian government have accused Ukraine of staging attacks, blamed the war on baseless allegations of US bioweapon development and portrayed Ukrainian refugees as criminals and rapists.
"Even though Russia is fully involved in Ukraine in the military conflict, they're able to do more than one thing at a time," said Brian Murphy, a former Department of Homeland Security intelligence chief who is now a vice president at the counter-disinformation firm Logically. "They have never stopped their sophisticated disinformation operations."
Social media platforms and European governments have tried to stifle the Kremlin's propaganda and disinformation, only to see Russia shift tactics.
A message sent to the Russian Embassy in Washington, DC, asking for a response to Meta's recent actions was not immediately returned.
Researchers at Meta Platforms Inc, which is based in Menlo Park, California, also exposed a much smaller network that originated in China and attempted to spread divisive political content in the US.
The operation reached only a tiny US audience, with some posts receiving just a single engagement. The posts also made some amateurish moves that showed they weren't American, including clumsy English language mistakes and a habit of posting during Chinese working hours.
Despite its ineffectiveness, the network is notable because it's the first identified by Meta that targeted Americans with political messages ahead of this year's midterm elections. The Chinese posts didn't support one party or the other but seemed intent on stirring up polarisation.
"While it failed, it's important because it's a new direction" for Chinese disinformation operations, said Ben Nimmo, who directs global threat intelligence for Meta.
- AP