{"id":225488,"date":"2017-07-03T18:11:16","date_gmt":"2017-07-03T22:11:16","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/notpetya-malware-attacks-could-warrant-retaliation-says-nato-researcher-the-guardian.php"},"modified":"2017-07-03T18:11:16","modified_gmt":"2017-07-03T22:11:16","slug":"notpetya-malware-attacks-could-warrant-retaliation-says-nato-researcher-the-guardian","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nato-2\/notpetya-malware-attacks-could-warrant-retaliation-says-nato-researcher-the-guardian.php","title":{"rendered":"&#8216;NotPetya&#8217; malware attacks could warrant retaliation, says Nato researcher &#8211; The Guardian"},"content":{"rendered":"<p><p>  While a cyberattack can trigger an armed response from Nato,  Minrik cautioned that the damage caused by NotPetya in Ukraine  and elsewhere was not sufficient for such an escalation.  Photograph: Barbara Walton\/EPA<\/p>\n<p>    The NotPetya malware that wiped computers at organisations    including Maersk, Merck and the Ukrainian government in June    could count as a violation of sovereignty, according to a    legal researcher at Natos cybersecurity division.  <\/p>\n<p>    If the malware outbreak was state-sponsored, the Nato    researcher says, it could open the possiblity of    countermeasures. Those could come through retaliatory    cyber--attacks, or more conventional means such as sanctions,    but they must fall short of a military use of force.  <\/p>\n<p>    Tom Minrik, a researcher at the organisations Cooperative    Cyber Defence Centre of Excellence in Tallinn, Estonia, made    the comments after the Centre concluded that the malware    outbreak, which overwhelmingly hit Ukraine but also affected    more than 60 other countries, can most    likely be attributed to a state actor.  <\/p>\n<p>    While a cyber-attack can trigger an armed response from Nato,    Minrik cautioned that the damage caused by NotPetya was not    sufficient for such an escalation. The law of armed conflict    applies only if a cyber-attack causes damage with consequences    comparable to an armed attack, during an ongoing international    armed conflict, but so far there are reports of neither, he    said.  <\/p>\n<p>    However, Minrik, added, as important government systems have    been targeted, then in case the operation is attributed to a    state this could count as a violation of sovereignty.    Consequently, this could be an internationally wrongful act,    which might give the targeted states several options to respond    with countermeasures.  <\/p>\n<p>    A countermeasure is any state response which would be illegal    in typical circumstances, but can be authorised as a reaction    to an internationally wrongful act by another state. A hack    back response, for instance, could be a countermeasure, but    Nato says that such responses do not necessarily have to be    conducted by cyber means; they cannot, however, affect third    countries, nor can they amount to a use of force.  <\/p>\n<p>    The suspicion that NotPetya  so called because the malware is    superficially similar to an earlier ransomware variant called    Petya  may be the work of a state sponsored actor arose shortly    after the outbreak began in late June.  <\/p>\n<p>    While the malware appears to be ransomware (a type of program    which holds critical files hostage in exchange for payment), it    contained several flaws that prevented it from ever being an    effective moneymaker for its creators. Among other things, the    payment infrastructure was tied to one email address outside    their control, which was promptly blocked by the webmail    provider, preventing victims form ever receiving their    decryption key and unlocking their files.  <\/p>\n<p>    But the malware, which was overwhelmingly seeded to victims    through a compromised Ukrainian accounting program, did    function well as a wiper, designed simply to render systems    unusable and cause economic damage. It spread rapidly inside    business networks, using a combination of exploits stolen from    the NSA and more common weaknesses in older versions of    Windows, ensuring that whole organisations found themselves    unable to operate for days on end.  <\/p>\n<p>    Unlike WannaCry, an earlier piece of ransomware also suspected    of being the work of state-sponsored attackers (in that case,    explicitly linked to North Korea by intelligence agencies    including the NSA and GCHQ), NotPetya did not contain any    functionality enabling it to spread unconstrained across the    internet, limiting the vast majority of its damage to those    organisations directly infected by the compromised accounting    software.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View post: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.theguardian.com\/technology\/2017\/jul\/03\/notpetya-malware-attacks-ukraine-warrant-retaliation-nato-researcher-tomas-minarik\" title=\"'NotPetya' malware attacks could warrant retaliation, says Nato researcher - The Guardian\">'NotPetya' malware attacks could warrant retaliation, says Nato researcher - The Guardian<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> While a cyberattack can trigger an armed response from Nato, Minrik cautioned that the damage caused by NotPetya in Ukraine and elsewhere was not sufficient for such an escalation. Photograph: Barbara Walton\/EPA The NotPetya malware that wiped computers at organisations including Maersk, Merck and the Ukrainian government in June could count as a violation of sovereignty, according to a legal researcher at Natos cybersecurity division. If the malware outbreak was state-sponsored, the Nato researcher says, it could open the possiblity of countermeasures <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nato-2\/notpetya-malware-attacks-could-warrant-retaliation-says-nato-researcher-the-guardian.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261464],"tags":[],"class_list":["post-225488","post","type-post","status-publish","format-standard","hentry","category-nato-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/225488"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=225488"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/225488\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=225488"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=225488"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=225488"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}