Arabic AR Chinese (Simplified) ZH-CN English EN French FR German DE Japanese JA Portuguese PT Russian RU Spanish ES Ukrainian UK

‘State actor’ behind NotPetya cyberattack, expect ‘countermeasures’ – NATO experts

Latest news

    View the original article: https://www.rt.com/uk/395260-notpetya-cyber-attack-nato/?utm_source=rss&utm_medium=rss&utm_campaign=RSS

    NATO officials have warned that last week’s global cyberattack could result in international retaliation.

    The so-called NotPetya attack hit Ukrainian government systems, as well as networks in 64 other countries, causing an unprecedented scale of disruption.

    Read more

    ‘Petya’ reaches Australia, Cadbury plant freezes production

    NATO now argues the cyber ambush violated Ukraine’s sovereignty and countermeasures could be expected, including sabotage.

    Secretary General Jens Stoltenberg said cyber operations against a NATO member state could trigger Article 5 of the North Atlantic Treaty, demanding a collective military response. Ukraine is not a member of the bloc.

    Kiev has since pointed the finger at Russia for the attack, while NATO said it could “most likely be attributed to a state actor.”

    “A countermeasure could be, for example, a cyber operation sabotaging the offending state’s government IT systems, but it does not necessarily have to be conducted by cyber means,” NATO Cooperative Cyber Defense Center of Excellence researcher Tomas Minarik said in a statement this week.

    “If the operation could be linked to an ongoing international armed conflict, then law of armed conflict would apply, at least to the extent that injury or physical damage was caused by it, and with respect to possible direct participation in hostilities by civilian hackers,” he added.

    “But so far there are reports of neither.”

    A report from NATO showed that although the attack had cost billions of dollars to the Ukrainian state, the damage was not comparable to a military strike.

    The attack follows the recent WannaCry strike on a series of computer systems in Britain’s hospitals. It was reported that North Korean hackers were likely behind the attack.

    “It seems likely that the more sophisticated and expensive NotPetya campaign is a declaration of power; a demonstration of acquired disruptive capability and readiness to use it,” NATO cyber expert Lauri Lindstrom said.

    Now the company blamed for allowing NotPetya to slip through the system is being threatened with criminal charges. Accounting software firm MeDoc had its main system hacked and used to send out malware to the attack’s victims.

    In the same category are

    Kim remains skeptical about Washington’s security pledge upon de-nuclearization – Moon North Korean leader Kim Jong-un finds it hard to trust US President Donald Trump’s assertions that the US would not seek to undermine his rule after P...
    ‘I’d give it a D’: English teacher picks apart White House letter for ‘bad grammar’ After receiving a letter signed by US President Donald Trump, a retired English teacher checked its grammar and posted her corrections online, earning...
    Turkey & Gazprom agree on construction of land portion of Europe-bound Turkish Stream Russian state energy giant Gazprom and the Turkish government have reached a deal on the construction of the land-based part of the Turkish Stream bra...
    Russian tightrope walker stuns St. Petersburg as he crosses Neva River over open bridge (VIDEO) To mark the birthday of Russia’s ‘northern capital' of St. Petersburg, one daredevil crossed the Neva River balancing on a tightrope 40 meters (131 ft...
    Kazakhstan tries to get back $22bn in frozen assets Kazakhstan has asked an appeals court to overturn a decision that saw BNY Mellon freeze assets worth more than $22 billion held in the bank by the cou...
    Yulia Skripal looks so well everything Britain said about poisoning is in doubt – Putin The fact neither of those poisoned in Salisbury died and one seems to have recovered well after what Britain called an exposure to a Russian military-...

    Leave a comment

    Your email address will not be published. Required fields are marked *