Archive for the ‘Ukraine’ Category

Trump tells Russia to stop ‘destabilising’ Ukraine – BBC News


BBC News
Trump tells Russia to stop 'destabilising' Ukraine
BBC News
US President Donald Trump has called on Russia to stop "destabilising" Ukraine and other countries and end support for "hostile regimes" such as those in Syria and Iran. Speaking in the Polish capital Warsaw, Mr Trump urged Russia to "join the ...
Merkel and Trump Discuss North Korea, Middle East, UkraineU.S. News & World Report
Trump Warns Russia Must Stop Destabilizing Actions in UkraineNBC New York
The Latest: Trump-Merkel tackle NKorea, Mideast, Ukraine - Honolulu, Hawaii news, sports & weather - KITV Channel 4KITV Honolulu
National Post
all 1,281 news articles »

Read the original here:
Trump tells Russia to stop 'destabilising' Ukraine - BBC News

Ukraine EU membership ‘will become a truth’ – BBC News


BBC News
Ukraine EU membership 'will become a truth'
BBC News
Ukraine will one day become a member of the European Union, the country's vice prime-minister for European Integration has said. Ivanna Klympush-Tsintsadze told BBC's Hardtalk that reforms in Ukraine are bringing the country closer to membership.

and more »

More here:
Ukraine EU membership 'will become a truth' - BBC News

Trump, in Warsaw Speech, Criticizes Russia’s ‘Destabilizing’ Role in Ukraine, Syria – The Atlantic

President Trump called Russia a destabilizing influence in Europe and the Middle East, and urged it to join the community of responsible nations, in his strongest remarks yet against the regime of Vladimir Putin, whom he is scheduled to meet Friday in Hamburg for the first time.

His remarks in Warsaws Krasinski Square, which marks the 1944 Warsaw uprising against the Nazis, came after the U.S. agreed to sell Patriot missiles to Poland. The president also used the opportunity to reiterate the NATO commitment to mutual defense, a declaration he did not make during the NATO summit in May, prompting consternation among U.S. allies wary of Russias ambitions.

To those who would criticize our tough stance, I would point out that the United States has demonstratednot merely with its words but with its actionsthat we stand firmly behind Article 5, the mutual-defense commitment, Trump said Thursday. Words are easy, but actions are what matters. And for its own protection, Europe, and you know this, everybody knows this, everybody has to know this, Europe must do more.

Trump has repeatedly said NATO members must spend more on defensea position in line with past U.S. administrations. But he has been criticized because he appeared to suggest U.S. commitment to mutual defense was predicated on its allies defense spending.

Although Trump chided Russia for its role in Ukraine and Syria, he was more circumspect about the role Moscow played in interfering in the U.S. election.

I think it was Russia, and it could have been other people in other countries, he said at a news conference with Andrzej Duda, the Polish president, earlier Thursday. Nobody really knows for sure.

In fact, U.S. intelligence agencies say Russia almost certainly interfered in the 2016 election with a view to favor Trump, though they also say theres no evidence Moscows efforts succeeded.

Trump, in his remarks in Krasinski Square, laid out his vision of the threats faced by the West, and cited Polands historic experience, where for centuries it was alternately invaded by Russia and Germany, as a reminder that the defense of the West ultimately rests not only on means but also on the will of its people to prevail.

The fundamental question of our time is whether the West has the will to survive, Trump said. Do we have the confidence in our values to defend them at any cost? Do we have enough respect for our citizens to protect our borders? Do we have the desire and the courage to preserve our civilization in the face of those who would subvert and destroy it?

Trump has long viewed terrorism as the main threat facing the West and the Western way of life, and has wanted a coalition among like-minded nations to fight it. In this call, he has also criticized Europes open-borders policy on Syrian refugees and criticized the EU, in general, and Germany, in particular, on everything from trade to regulation. But in Thursdays remarks, Trump reserved his most pointed criticism for Russia: He condemned its actions in Ukraine, which is a major concern for Poland and other Eastern and Central European nations that are wary of Moscows attempt to reassert its dominance in its historic sphere of influence, as well its support of Syrian President Bashar al-Assad in that countrys civil war, and he urged Russia to join the community of responsible nations in our fight against common enemies and in defense of civilization itself.

In Moscow, Dmitry Peskov, the Kremlin spokesman rejected the idea Russia was destabilizing the region. He added that Russia was keenly awaiting Trumps first meeting with Putin on Friday on the sidelines of the Group of 20 meeting in Hamburg.

Trumps visit to Europe is being closely watched and provides the president an opportunity for a reset in relations with Americas closest allies, which have been labeled as tense since he attended the G7 meeting in Italy in May over, in part, his comments about NATO and climate change.

Read more:
Trump, in Warsaw Speech, Criticizes Russia's 'Destabilizing' Role in Ukraine, Syria - The Atlantic

Ukraine Scrambles to Contain New Cyber Threat After ‘NotPetya’ Attack – New York Times

M.E.Doc is used by 80 percent of Ukrainian companies and installed on about 1 million computers in the country. Interior Minister Arsen Avakov said police had blocked a second cyber attack from servers hosting the software.

The company previously denied its servers had been compromised but when asked on Wednesday whether a back door had been inserted, Chief Executive Olesya Bilousova said: "Yes, there was. And the fact is that this back door needs to be closed."

Any computer on the same network as machines using M.E.Doc was now vulnerable to another attack, she said.

"We need to pay the most attention to those computers which weren't affected (by last week's attack)," she told reporters.

"The virus is on them waiting for a signal. There are fingerprints on computers which didn't even use our product."

Dmytro Shymkiv, deputy head of Ukraine's presidential administration and a former director of Microsoft in Ukraine, said the latest evidence further pointed to an advanced and well-orchestrated attack.

"I am looking through the analysis that has been done on the M.E.Doc server, and from what I'm seeing, that's worrying. Worrying is a very light word for this," he said. "How many back doors are still open? We don't know."

He also said M.E.Doc's servers had not been updated since 2013, providing some indication as to how the hackers were able to access the system.

Intellect Service said Shymkiv's comments referred to a disk used to store M.E.Doc's software updates.

SMOKESCREEN

Cyber security experts said that while hackers have previously been known to insert viruses into software updates - thus tricking computers and system administrators into installing the malware on their own systems - the attack on Ukraine is the largest and most disruptive such assault to date.

"We are in a new phase of cyber security and the way that sophisticated actors behave," said Leo Taddeo, a former FBI cyber investigator and executive with cyber security firm Cyxtera Technologies. "I can't think of a supply chain attack that has been this thorough."

Investigators still are trying to establish who was behind last week's attack. Ukrainian politicians were quick to blame Russia, which denied it. A Trump administration official said the U.S. government was not yet ready to accuse Russia.

Security experts from U.S.-based Cisco Systems Inc. said they had examined Intellect's machines at its invitation and determined that an attacker had used a password stolen from an employee to log in on company computer.

After escalating the access rights of that user, the attacker rewrote configuration files, directing customers seeking updates to tampered versions stored elsewhere, at a French web hosting company.

The software with the back doors could spread through other means and the attackers might have used those back doors to install other tools, said Craig Williams, senior technical leader for Cisco's Talos intelligence unit. But since the infected machines were instructed to check in with a command machine that has been taken offline, they do not pose the greatest remaining risk.

Instead, the big worry is what else might have been pushed out by earlier tainted updates, Williams said. With Intellect's servers disabled for now, it cannot push out "clean" updates to fix what customers have installed.

Williams said Talos believed the hackers were connected to previous attacks on Ukraine's electric system and that it was "tempting" to ascribe the new attack to a national government, since there did not appear to be a profit motive.

"This wasnt made for any other purpose but to destabilize businesses in the Ukraine," Williams said.

Technology news site Motherboard reported on Wednesday that people claiming to be behind the attack had posted a message online offering to unlock all encrypted files for a bitcoin payment of $256,000. Reuters was unable to confirm the report.

Shymkiv said the assault was designed to look like a ransomware attack in order to disguise its true objective.

"Initially everybody thought, including me, that it was just an attack with a virus," he said. "It was not an attack with a virus, it was opening a back door, which was a hack of the computer networks on a broad scale and then eliminating the results with a virus."

"It's like a robber, you get to the house, you steal everything, and then you burn it."

(Additional reporting by Pavel Polityuk in Kiev, Jim Finkle in Toronto, Dustin Volz and Jonathan Landay in Washington D.C., and Joseph Menn in San Francisco; Editing by Gareth Jones and Bill Trott)

Read the original here:
Ukraine Scrambles to Contain New Cyber Threat After 'NotPetya' Attack - New York Times

Hackers who targeted Ukraine clean out bitcoin ransom wallet … – The Guardian

transferred to a second wallet on Tuesday night. Photograph: Bloomberg/Bloomberg via Getty Images

The hackers behind the NotPetya ransomware, which wiped computers in more than 60 countries in late June, have moved more than 8,000 worth of bitcoins out of the account used to receive the ransoms.

The transfer has added credence to messages purporting to be from the attackers offering to decrypt every single infected computer for a one-off payment of 200,000, after security researchers suggested they may be state-sponsored actors.

It is possible to see the movement of the ransom payments thanks to the public nature of the bitcoin currency: all transfers are recorded on the public blockchain, although the real-world identities of the individuals or organisations behind a particular payment address can be near-impossible to discern.

Currently, the blockchain records that the bulk of the ransom money, 7,872 worth of bitcoin, was simply transferred to a second wallet on Tuesday night, but two smaller payments, of 200 each, went to accounts used by two text-sharing websites, Pastebin and DeepPaste.

Around 10 minutes before the payments were made, someone made posts on both those sites claiming to be able to decrypt hard disks infected with the malware in exchange for a payment of 100 bitcoins.

The 200,000 offer has created more uncertainty about the motivations behind the ransomware. While it originally appeared to be created with the intention of earning a lot of money through ransom payments, researchers quickly pointed out that a number of features of the software made it appear that the ransom element was a smokescreen, with the real goal being widespread damage.

Significantly, the majority of infections occurred in Ukraine, due to the main attack vector being a compromised version of an accounting program, ME Doc, used to file taxes in the nation. That has led to many, including the Ukrainian government, suspecting Russian involvement as part of the ongoing cyberwar between the two countries.

Hackers offering to decrypt files for money suggests that the cash motivation may be more significant than thought but that too could be misdirection.

While the hackers continue to play games, the Ukrainian cybercrime unit is continuing its investigation. On Wednesday, it announced that it had seized ME Docs servers after new activity was detected there, and said it had acted to immediately stop the uncontrolled proliferation of malware.

Cyber police spokeswoman Yulia Kvitko suggested that ME Doc had sent or was preparing to send a new update and added that swift action had prevented any further damage. Our experts stopped (it) on time, she said.

It wasnt immediately clear how or why hackers might still have access to ME Docs servers. The company has not returned messages from reporters, but in several statements took to Facebook to dispute allegations that its poor security helped seed the malware epidemic.

Cyber police chief Coonel Serhiy Demydiuk previously said that ME Docs owners would be brought to justice, but Kvitko said there had been no arrests.

Read the original here:
Hackers who targeted Ukraine clean out bitcoin ransom wallet ... - The Guardian