Arabic AR Chinese (Simplified) ZH-CN English EN French FR German DE Japanese JA Portuguese PT Russian RU Spanish ES Ukrainian UK

‘State actor’ behind NotPetya cyberattack, expect ‘countermeasures’ – NATO experts

Latest news

    View the original article: https://www.rt.com/uk/395260-notpetya-cyber-attack-nato/?utm_source=rss&utm_medium=rss&utm_campaign=RSS

    NATO officials have warned that last week’s global cyberattack could result in international retaliation.

    The so-called NotPetya attack hit Ukrainian government systems, as well as networks in 64 other countries, causing an unprecedented scale of disruption.

    Read more

    ‘Petya’ reaches Australia, Cadbury plant freezes production

    NATO now argues the cyber ambush violated Ukraine’s sovereignty and countermeasures could be expected, including sabotage.

    Secretary General Jens Stoltenberg said cyber operations against a NATO member state could trigger Article 5 of the North Atlantic Treaty, demanding a collective military response. Ukraine is not a member of the bloc.

    Kiev has since pointed the finger at Russia for the attack, while NATO said it could “most likely be attributed to a state actor.”

    “A countermeasure could be, for example, a cyber operation sabotaging the offending state’s government IT systems, but it does not necessarily have to be conducted by cyber means,” NATO Cooperative Cyber Defense Center of Excellence researcher Tomas Minarik said in a statement this week.

    “If the operation could be linked to an ongoing international armed conflict, then law of armed conflict would apply, at least to the extent that injury or physical damage was caused by it, and with respect to possible direct participation in hostilities by civilian hackers,” he added.

    “But so far there are reports of neither.”

    A report from NATO showed that although the attack had cost billions of dollars to the Ukrainian state, the damage was not comparable to a military strike.

    The attack follows the recent WannaCry strike on a series of computer systems in Britain’s hospitals. It was reported that North Korean hackers were likely behind the attack.

    “It seems likely that the more sophisticated and expensive NotPetya campaign is a declaration of power; a demonstration of acquired disruptive capability and readiness to use it,” NATO cyber expert Lauri Lindstrom said.

    Now the company blamed for allowing NotPetya to slip through the system is being threatened with criminal charges. Accounting software firm MeDoc had its main system hacked and used to send out malware to the attack’s victims.

    In the same category are

    From Albertville to PyeongChang: The story of two Russian hockey triumphs On Sunday, Russian ice hockey players won Olympic gold for the second time in the post-Soviet era, and both victories came under circumstances that la...
    North Korea slams US for sanctions & ‘clouds of war’ but says it is open for talks Pyongyang has accused Washington of bringing “clouds of war” to the region by imposing “the largest-ever” sanctions during the Olympic Games, but says...
    Saudi Arabia will now allow women to join its armed forces The Kingdom of Saudi Arabia will now allow women to apply for military service in a historic move. The decision comes as part of Saudi Arabia’s Vision...
    Data of 12,000+ users of US-based cryptocurrency exchange to be disclosed to tax officials Coinbase, a US-based cryptocurrency service, has informed its users that it must provide the data of thousands of them to the Internal Revenue Service...
    2 attacks thwarted & 3 mosques closed in terrorism crackdown – French interior minister The French interior minister has revealed that authorities have thwarted two planned terrorist attacks since the start of the year. Several mosques ha...
    You could have been a millionaire: 5 best ICOs you missed so far this year No one becomes rich by stashing money under the mattress. Each and every billionaire or millionaire gets there mostly by investing. The recent boom in...

    Leave a comment

    Your email address will not be published. Required fields are marked *