Asylum requests dip slightly after 2015 record, OECD says

People walk as they flee deeper into the remaining rebel-held areas of Aleppo, Syria December 13, 2016. REUTERS/Abdalrhman Ismail

PARIS (Reuters) – The number of people fleeing war or strife for stabler parts of the world fell marginally in 2016 from a record high in 2015, with the lion’s share of those seeking asylum doing so in Germany, the OECD said on Thursday.

In a report on broader migration trends, the Organization for Economic Co-operation and Development said that the biggest exodus of asylum-seekers was from war-ravaged Syria, followed by Afghanistan and Iraq.

Asylum request numbers continued to drop in the early months of this year, it added.

For a fourth straight year, Germany registered by far the largest number of asylum applications – 48 percent of a world total of 1.64 million in 2016.

The United States, where the bulk of asylum applications are from Latin Americans, was a distant second, registering 262,000 asylum applications.

The total number of applications dropped by one percent from 2015, said the Paris-based OECD, which noted that many of those who arrived in Germany in 2015 filed formal asylum applications in 2016.

When compared to the population of the host country, Germany registered more than 10 times as many asylum requests as the United States and four times as many as Italy, another key destination for many migrants, notably from Nigeria.

The OECD, a think-tank funded by the governments of its 35 member countries, most of them wealthy economies and relatively stable politically, suggested the slight dip in asylum requests in 2016 may be followed by a more pronounced reduction this year.

In the first six months of 2017, the total number of landings on European shores reached 85,000, around 10 times less than at the peak in the second half of 2015, it said in a statement that accompanied its report.

With two in three refugees arriving in Europe, OECD chief Angel Gurria said: “Improving the integration of immigrants and their children, including refugees, is vital to delivering a more prosperous, inclusive future for all.”

While OECD countries, primarily in Western Europe, received 1.6 million asylum requests in 2016, Turkey alone was providing temporary protection to another three million Syrians, the organization said.

(Reporting by Brian Love; Editing by Toby Davis)

Europe’s NATO members, Canada to raise defense spending in 2017

NATO Secretary-General Jens Stoltenberg addresses a news conference ahead of a NATO defence ministers meeting at the Alliance headquarters in Brussels, Belgium, June 28, 2017. REUTERS/Francois Lenoir

By Robin Emmott

BRUSSELS (Reuters) – Europe’s NATO members and Canada will jointly raise defense spending by 4.3 percent in 2017, NATO Secretary-General Jens Stoltenberg said on Wednesday, partly aimed at showing the United States they are committed to shouldering more costs.

U.S. President Donald Trump has made more expenditure his priority for NATO, using his first alliance meeting in May to scold European leaders about spending, which is at historical lows and does not meet NATO’s goal of 2 percent of GDP.

This year’s increase represents the fastest spending growth since cuts stopped three years ago. Growth was 1.8 pct in 2015 and 3.3 percent last year, but it was unclear how near the new increase takes spending to the alliance’s target.

Figures for individual allies will be released on Thursday, after approval by NATO ambassadors, but overall 2017 spending will be some $280 billion, a cumulative $46 billion jump since cuts left Europe without vital capabilities, such as refueling airborne fighter bombers.

Only four of NATO’s 27 European members – Greece, Britain, Poland and Estonia – met the spending target in 2016. Romania will do so this year, followed by Latvia and Lithuania in 2018, Stoltenberg said.

Twenty five of NATO’s 29 allies plan to lift spending this year, he said, a day before NATO defense ministers meet in Brussels to discuss greater security spending on rising threats including deterring a resurgent Russia, dealing with failed states on its borders and protecting against cyber attacks.

“To keep our nations safe, we need to keep working to increase defense spending and fairer burden-sharing across our alliance,” Stoltenberg said.

The new figures are part of a broader rise in military spending in Europe, as the United States commits billions more dollars to return troops and heavy weaponry to the continent to deter Russia, and as the European Union seeks to set up a multi-billion-euro defense fund.

“We have really shifted gears, the trend is up and we intend to keep it up,” Stoltenberg said.

He said the increase in funds would be spent on more military exercises and equipment, partly aimed at allowing NATO troops to deploy at ever faster notice, as well as salaries and pensions for personnel.

NATO officials stressed that while Trump’s tough stance had put the spotlight on defense spending, Russia’s annexation of Ukraine’s Crimean peninsula in 2014 had a bigger impact, with allies agreeing to end years of defense cuts.

(Reporting by Robin Emmott Editing by Gabriela Baczynska and Louise Ireland)

Abortive Brussels attack could have been much worse: PM

Belgian soldiers patrol inside Brussels central railway station after a suicide bomber was shot dead by troops in Brussels, Belgium, June 21, 2017. REUTERS/Francois Lenoir

By Philip Blenkinsop and Charlotte Steenackers

BRUSSELS (Reuters) – A suitcase bomb packed with nails and gas bottles could have caused heavy casualties, Belgium’s prime minister said on Wednesday, a day after a soldier shot dead a Moroccan national attempting an attack on Brussels’ central station.

“We have avoided an attack that could have been a great deal worse,” Charles Michel told reporters after a national security council meeting following Tuesday evening’s incident, in which no one else was hurt.

However, no further threat was seen as imminent and the public alert level was left unchanged.

A counter-terrorism prosecutor named the dead man only by his initials, O.Z. He was a 36-year-old Moroccan citizen who lived in the Brussels borough of Molenbeek and had not been suspected of militant links. He set off his bomb on a crowded station concourse below ground at 8:44 p.m. (2.44 p.m. ET).

Walking up to a group of passengers, prosecutor Eric Van Der Sypt said, “he grabbed his suitcase, while shouting and causing a partial explosion. Fortunately, nobody was hurt.”

The suitcase, later found to contain nails and gas bottles, caught fire and then exploded a second time more violently as the man ran downstairs to the platforms.

He then ran back up to the concourse where commuters had been milling around and rushed toward a soldier shouting “Allahu akbar” — God is greater, in Arabic. The soldier, part of a routine patrol, shot him several times. Bomb disposal experts checked the body and found he was not carrying more explosives.

Police raided the man’s home overnight, Van Der Sypt said.

Molenbeek, an impoverished borough with a big Moroccan Muslim population just across Brussels’ industrial canal from its historic center, gained notoriety after an Islamic State cell based there mounted suicide attacks on Paris in November 2015 that killed 130 people. Associates of that group attacked Brussels itself four months later, killing 32 people.

Belgian policemen get out of a house after searching it, following yesterday's attack, in Brussels, Belgium June 21, 2017. REUTERS/Eric Vidal

Belgian policemen get out of a house after searching it, following yesterday’s attack, in Brussels, Belgium June 21, 2017. REUTERS/Eric Vidal

“WE WILL NOT BE INTIMIDATED”

Prime Minister Michel insisted the country, which has been the most fertile European recruiting ground for Islamic State in Syria and Iraq, would not bow to threats that have seen combat troops become a permanent fixture at public spaces in Brussels.

“We will not let ourselves be intimidated,” Michel said. “We will go on living our lives as normal.”

There was no immediate claim of responsibility and no word on how investigations are progressing into whether the man had acted alone or had help, and into any links to radical groups.

The Belgian capital, home to the headquarters of NATO and the European Union, took a heavy hit to its tourist industry last year. Visitors and residents out enjoying a hot summer’s evening on the ornate Renaissance town square, the Grand Place, close to Central Station were cleared quickly away by police.

Smoke billowed through the elegant 1930s marble hallways of the station, sending people fleeing to the surface, well aware of last year’s attacks at Brussels airport and on the metro, as well as of a string of Islamic State-inspired assaults in France, Germany, Sweden and Britain.

“Such isolated acts will continue in Brussels, in Paris and elsewhere. It’s inevitable,” Brussels security consultant Claude Moniquet, a former French agent, told broadcaster RTL.

With Islamic State under pressure in Syria, he said, attacks in Europe may increase, though many would be by “amateurs”.

Witness Nicolas Van Herrewegen, a rail worker, told Reuters: “He was talking about the jihadists and all that and then at some point he shouted: ‘Allahu akbar’ and blew up the little suitcase he had next to him. People just took off.”

Remy Bonnaffe, a 23-year-old lawyer who was waiting for a train home, photographed the flaming suitcase before the second blast, followed by gunfire, prompted him to run.

“I think we had some luck tonight,” he told Reuters.

(Additional reporting by Clement Rossignol, Francesco Guarascio, Jan Strupczewski, Elizabeth Miles and Alastair Macdonald; Writing by Alastair Macdonald; Editing by Angus MacSwan)

Patriotic Russians may have staged cyber attacks on own initiative: Putin

A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture

ST PETERSBURG, Russia (Reuters) – President Vladimir Putin said on Thursday that patriotic Russian hackers may have staged cyber attacks against countries that had strained relations with Moscow on their own initiative, but said the Russian state had never been involved in such hacking.

Putin, speaking to international media at an economic forum in St Petersburg, was answering a question about allegations Moscow might try to interfere in this year’s German elections.

Moscow’s attitude toward cyber crime is under intense scrutiny after U.S. intelligence officials alleged that Russian hackers had tried to help Republican Donald Trump win the White House, something Russia has flatly denied.

“If they (hackers) are patriotically-minded, they start to make their own contribution to what they believe is the good fight against those who speak badly about Russia. Is that possible? Theoretically it is possible,” said Putin.

Likening hackers to free-spirited artists acting according to their moods, he said cyber attacks could be made to look like they had come from Russia when they had not.

Putin also said he was personally convinced that hackers could not materially alter election campaigns in Europe, America or elsewhere.

“On a state level we haven’t been involved in this (hacking), we aren’t planning to be involved in it. Quite the opposite, we are trying to combat it inside our country,” said Putin.

(Reporting by Denis Pinchuk; Writing by Alexander Winning; Editing by Andrew Osborn)

Trump pulling U.S. out of Paris climate deal: source

FILE PHOTO: The Eiffel tower is illuminated in green with the words "Paris Agreement is Done", to celebrate the Paris U.N. COP21 Climate Change agreement in Paris, France, November 4, 2016. REUTERS/Jacky Naegelen/File Photo

By Valerie Volcovici

WASHINGTON (Reuters) – President Donald Trump will follow through on a campaign pledge to pull the United States out of a global pact to fight climate change, a source briefed on the decision told Reuters, a move that should rally his support base at home while deepening a rift with U.S. allies.

Trump, who has previously called global warming a hoax, did not confirm the decision in a post on Twitter, saying only, “I will be announcing my decision on the Paris Accord over the next few days.”

Trump had refused to endorse the landmark climate change accord at a summit of the G7 group of wealthy nations on Saturday, saying he needed more time to decide. He then tweeted that he would make an announcement this week.

The decision will put the United States in league with Syria and Nicaragua as the world’s only non-participants in the Paris Climate Agreement. It could have sweeping implications for the deal, which relies heavily on the commitment of big polluter nations to reduce emissions of gases scientists blame for sea level rise, droughts and more frequent violent storms.

The accord, agreed on by nearly 200 countries in Paris in 2015, aims to limit planetary warming in part by slashing carbon dioxide and other emissions from the burning of fossil fuels. Under the pact, the United States committed to reducing its emissions by 26 to 28 percent from 2005 levels by 2025.

Axios news outlet, which first reported the withdrawal, said details of the pullout are being worked out by a team that includes EPA Administrator Scott Pruitt. The choice is between a formal withdrawal that could take three years or leaving the U.N. treaty that the accord is based on, which would be quicker but more extreme, according to the Axios report.

The decision to withdraw from the climate accord was influenced by a letter from 22 Republican U.S. senators, including Majority Leader Mitch McConnell, calling for an exit, Axios reported.

Former President Barack Obama, who helped broker the accord, praised the deal during a trip to Europe this month.

The United States is the world’s second-biggest carbon dioxide emitter behind China.

Supporters of the climate pact are concerned that a U.S. exit could lead other nations to weaken their commitments or also withdraw, softening an accord that scientists have said is critical to avoiding the worst impacts of climate change.

Canada, the European Union, and China have said they will honor their commitments to the pact even if the United States withdraws. A source told Reuters that India had also indicated it would stick by the deal.

PROMISE KEPT

Trump had vowed during his campaign to “cancel” the Paris deal within 100 days of becoming president, as part of an effort to bolster U.S. oil and coal industries. That promise helped rally supporters sharing his skepticism of global efforts to police U.S. carbon emissions.

After taking office, however, Trump faced pressure to stay in the deal from investors, international powers and business leaders, including some in the coal industry. He also had to navigate a split among his advisers on the issue.

Trump aides including Steve Bannon, Stephen Miller, lawyer Don McGahn and Peter Navarro, along with EPA chief Pruitt, argued hard for leaving the accord. They said the deal would require the U.S. government to regulate greenhouse gas emissions, which would hurt business.

Trump’s administration has already begun the process of killing Obama-era climate regulations.

The “stay-in” camp, which included Trump’s daughter Ivanka, chief economic adviser Gary Cohn, and Energy Secretary Rick Perry, had argued the United States could reduce its voluntary emission-cuts targets while still keeping a voice within the accord.

Oil majors Shell and Exxon Mobil have also supported the Paris pact, along with a number of Republican lawmakers. Several big coal companies, including Cloud Peak Energy, had publicly urged Trump to stay in the deal as a way to help protect the industry’s mining interests overseas, though others asked Trump to exit the accord to help ease regulatory pressures on domestic miners.

Trump has repeatedly expressed doubts about climate change, at times calling it a hoax to weaken U.S. industry. An overwhelming majority of scientists, however, say climate change is driven by human use of fossil fuels.

(Additional reporting by Doina Chiacu)

Good atmosphere but nothing new in EU talks with Erdogan, sources say

Turkish President Tayyip Erdogan delivers a speech during a graduation ceremony at an Imam Hatip religious school association in Istanbul, Turkey, May 26, 2017. REUTERS/Murad Sezer

By Gabriela Baczynska

BRUSSELS (Reuters) – Talks last week between the heads of European Union institutions and Turkey’s president, Tayyip Erdogan, were held in a “good atmosphere” but produced no new agreements, officials in Brussels said, playing down comments by the Turkish leader.

Tensions between Turkey and the EU run high over rights and security issues, but the bloc depends on the help of NATO ally Ankara on migration and the conflict in Syria.

After meeting European Council President Donald Tusk and European Commission President Jean-Claude Juncker last week in Brussels, Erdogan was quoted as saying he had been presented with a new 12-month timetable for renewing ties.

But senior EU officials voiced caution and some scepticism, saying no formal deadlines were set. The EU has a list of mid- and high-level meetings it hopes to hold with Turkey this year, they said, but any improvement in bilateral ties would depend on Erdogan’s resolving at least some of many points of contention.

They include the EU’s worry that Turkey’s anti-terror laws are too broad and used to persecute Erdogan critics, as demonstrated in Ankara’s sweeping security crackdown following a botched coup almost a year ago.

Other concerns relate to the treatment of the Kurds, the media and academics, as well as Erdogan moving to assume even more powers following an April referendum.

The pre-referendum campaign produced new spats with EU members Germany and the Netherlands, whose authorities Erdogan likened to Nazis when they had prevented Turkish politicians from campaigning in their countries.

Despite the often harsh rhetoric, senior EU officials said the atmosphere of the meeting was “good” and “constructive”.

“It was definitely not hostile, but both sides pretty much restated their well-known positions,” one of the sources said.

Turkey complains about slow progress in its stalled EU accession talks, discussions on visa-free travel for Turks to the EU and disbursement of EU funds to Syrian refugees living in Turkey.

The bloc says Erdogan must first address concerns over human rights and rule of law, and should work with the Council of Europe – a European rights watchdog of which Turkey is a member – on that..

The EU says progress in talks over reuniting the ethnically split Cyprus is also key to unlocking other area, including ideas to beef up an existing customs union between Turkey and the EU.

Erdogan has suggested Turkey could hold a referendum on continuing EU accession talks, and possibly another on reinstating the death penalty. Restoring capital punishment would end Turkey’s bid to join the EU.

EU leaders will discuss their ties and especially their cooperation with Turkey on migration when in Brussels on June 22-23. Calls from the European Parliament to formally halt Turkey’s accession talks have so far not reached critical mass.

“We have no choice,” one of the sources said when asked if the EU was looking to working more with Turkey after the top-level talks with Erdogan.

(Reporting by Gabriela Baczynska, editing by Larry King)

China hit by cyber virus, Europe warns of more attacks

A hooded man holds a laptop computer as blue screen with an exclamation mark is projected on him in this illustration picture taken on May 13, 2017.

By Cate Cadell and Guy Faulconbridge

BEIJING/LONDON (Reuters) – The WannaCry “ransomware” cyber attack hobbled Chinese traffic police and schools on Monday as it rolled into Asia for the new work week, while authorities in Europe said they were trying to prevent hackers from spreading new versions of the virus.

In Britain, where the virus first raised global alarm when it caused hospitals to divert ambulances on Friday, it gained traction as a political issue just weeks before a general election. The opposition Labour Party accused the Conservative government of leaving the National Health Service vulnerable.

Shares in firms that provide cyber security services rose with the prospect that companies and governments would have to spend more money on defenses.

Some victims were ignoring official advice and paying the $300 ransom demanded by the cyber criminals to unlock their computers, which was due to double to $600 on Monday for computers hit by Friday’s first wave.

Brian Lord, managing director of cyber and technology at cybersecurity firm PGI, said victims had told him “the customer service provided by the criminals is second to none”, with helpful advice on how to pay: “One customer said they actually forgot they were being robbed.”

Although the virus’s spread was curbed over the weekend in most of the world, France, where carmaker Renault was among the world’s highest profile victims, said more attacks were likely.

“We should expect similar attacks regularly in the coming days and weeks,” said Giullaume Poupard, head of French government cyber security agency ANSSI. “Attackers update their software … other attackers will learn from the method and will carry out attacks.”

Companies and governments spent the weekend upgrading software to limit the spread of the virus. Monday was the first big test for Asia, where offices had already mostly been closed for the weekend before the attack first arrived.

British media were hailing as a hero a 22-year-old computer security whiz who appeared to have helped stop the attack from spreading by discovering a “kill switch” – an internet address which halted the virus when activated.

SPREAD SLOWING

China appeared over the weekend to have been particularly vulnerable, raising worries about how well the world’s second largest economy would cope when it opened for business on Monday. However, officials and security firms said the spread was starting to slow.

“The growth rate of infected institutions on Monday has slowed significantly compared to the previous two days,” said Chinese Internet security company Qihoo 360. “Previous concerns of a wide-scale infection of domestic institutions did not eventuate.”

Qihoo had previously said the attack had infected close to 30,000 organizations by Saturday evening, more than 4,000 of which were educational institutions.

The virus hit computers running older versions of Microsoft software that had not been recently updated. Microsoft released patches last month and on Friday to fix a vulnerability that allowed the worm to spread across networks.

In a blog post on Sunday, Microsoft & President Brad Smith appeared to tacitly acknowledge what researchers had already widely concluded: the attack made use of a hacking tool built by the U.S. National Security Agency that had leaked online in April.

Infected computers appear to largely be out-of-date devices that organizations deemed not worth the price of upgrading. Some have also been machines involved in manufacturing or hospital functions, difficult to patch without disrupting operations.

“The government’s response has been chaotic, to be frank,” the British Labour Party’s health spokesman Jon Ashworth said. “They’ve complacently dismissed warnings which experts, we now understand, have made in recent weeks.”

“The truth is, if you’re going to cut infrastructure budgets and if you’re not going to allow the NHS to invest in upgrading its IT, then you are going to leave hospitals wide open to this sort of attack.”

Britain’s National Health Service (NHS) is the world’s fifth largest employer after the U.S. and Chinese militaries, Walmart and McDonald’s. The government says that under a previous Labour administration the trusts that run local hospitals were given responsibility to manage their own computer systems.

WARNINGS GIVEN

Asked if the government had ignored warnings over the NHS being at risk from cyber attack, Prime Minister Theresa May told Sky News: “No. It was clear [that] warnings were given to hospital trusts.”

An official from Cybersecurity Administration China (CAC) told local media on Monday that while the ransomware was still spreading and had affected industry and government computer systems, the spread was slowing.

Chinese government bodies from transport, social security, industry watchdogs and immigration said they had suspended services ranging from processing applications to traffic crime enforcement.

It was not immediately clear whether those services were suspended due to attacks, or for emergency patching to prevent infection.

“If a system supports some kind of critical processes those systems typically are very hard to patch … We don’t have a precedent for something of this scale (in China),” said Marin Ivezic, a cybersecurity expert at PwC in Hong Kong.

Affected bodies included a social security department in the city of Changsha, the exit-entry bureau in Dalian, a housing fund in Zhuhai and an industry watchdog in Xuzhou.

Energy giant PetroChina  said payment systems at some of its petrol stations were hit, although it had been able to restore most of the systems.

Elsewhere in Asia, the impact seems to have been more limited. Japan’s National Police Agency reported two breaches of computers in the country on Sunday – one at a hospital and the other case involving a private person – but no loss of funds.

Industrial conglomerate Hitachi Ltd. said the attack had affected its systems at some point over the weekend, leaving them unable to receive and send e-mails or open attachments in some cases.

In India, the government said it had only received a few reports of attacks on systems and urged those hit not to pay attackers any ransom. No major Indian corporations reported disruptions to operations.

At Indonesia’s biggest cancer hospital, Dharmais Hospital in Jakarta, around 100-200 people packed waiting rooms after the institution was hit by cyber attacks affecting scores of computers. By late morning, some people were still filling out forms manually, but the hospital said 70 percent of systems were back online.

South Korea’s presidential Blue House office said nine cases of ransomware were found in the country, but did not provide details on where the cyber attacks were discovered. A coal port in New Zealand shut temporarily to upgrade its systems.

(Writing by Peter Graff, editing by Peter Millership)

Global cyber attack slows but experts see risk of fresh strikes

An ambulance waits outside the emergency department at St Thomas' Hospital in central London, Britain May 12, 2017. REUTERS/Stefan Wermuth

By Jeremy Wagstaff and Eric Auchard

SINGAPORE/FRANKFURT (Reuters) – A global cyber attack described as unprecedented in scale forced a major European automaker to halt some production lines while hitting schools in China and hospitals in Indonesia on Saturday, though it appeared to die down a day after its launch.

Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, the cyber assault has infected tens of thousands of computers in nearly 100 countries, with Britain’s health system suffering the worst disruptions.

Cyber extortionists tricked victims into opening malicious malware attachments to spam emails that seemed to contain invoices, job offers, security warnings and other legitimate files.

Once inside the targeted network, so-called ransomware made use of recently revealed spy tools to silently infect other out-of-date machines without any human intervention. This, security experts said, marked an unprecedented escalation in the risk of fresh attacks spreading in the coming days and weeks.

The ransomware encrypted data on the computers, demanding payments of $300 to $600 to restore access. Researchers observed some victims paying via the digital currency bitcoin, though no one knows how much may have been transferred to extortionists because of the largely anonymous nature of such transactions.

Researchers with security software maker Avast said they had observed 126,534 ransomware infections in 99 countries, with Russia, Ukraine and Taiwan the top targets.

The hackers, who have not come forward to claim responsibility or otherwise been identified, took advantage of a worm, or self-spreading malware, by exploiting a piece of NSA spy code known as “Eternal Blue” that was released last month by a hackers group known as the Shadow Brokers, according to researchers with several private cyber security firms.

Renault said it had halted auto production at several sites including Sandouville in northwestern France and Renault-owned Dacia plants in Romania on Saturday to prevent the spread of ransomware in its systems.

Nissan’s manufacturing plant in Sunderland, northeast England, was also affected by the cyber assault though “there has been no major impact on our business”, a spokesman for the Japanese carmaker said.German rail operator Deutsche Bahn [DBN.UL] said some electronic signs at stations announcing arrivals and departures were infected, with travelers posting pictures showing some bearing a message demanding a cash payment to restore access.

“UNPRECEDENTED” ATTACK EASES

Europol’s European Cybercrime Center said it was working closely with country investigators and private security firms to combat the threat and help victims. “The recent attack is at an unprecedented level and will require a complex international investigation to identify the culprits,” it said in a statement.

Some experts said the threat had receded for now, in part because a British-based researcher, who declined to give his name, registered a domain that he noticed the malware was trying to connect to, and so limited the worm’s spread.

“We are on a downward slope, the infections are extremely few, because the malware is not able to connect to the registered domain,” said Vikram Thakur, principal research manager at Symantec.

“The numbers are extremely low and coming down fast.”

But the attackers may yet tweak the code and restart the cycle. The researcher in Britain widely credited with foiling the ransomware’s proliferation told Reuters he had not seen any such tweaks yet, “but they will (happen).”

Researchers said the worm deployed in the latest attack, or similar tools released by Shadow Brokers, are likely to be used for fresh assaults not just with ransomware but other malware to break into firms, seize control of networks and steal data.

Finance chiefs from the Group of Seven rich countries were to commit on Saturday to joining forces to fight the growing threat of international cyber attacks, according to a draft statement of a meeting they are holding in Italy.

“Appropriate economy-wide policy responses are needed,” the ministers said in their draft statement, seen by Reuters.

HOSPITALS IN FIRING LINE

In Asia, some hospitals, schools, universities and other institutions were affected, though the full extent of the damage is not yet known because it is the weekend.

“I believe many companies have not yet noticed,” said William Saito, a cyber security adviser to Japan’s government. “Things could likely emerge on Monday” as staff return to work.

China’s information security watchdog said “a portion” of Windows systems users in the country were infected, according to a notice posted on the official Weibo page of the Beijing branch of the Public Security Bureau on Saturday. Xinhua state news agency said some secondary schools and universities were hit.

In Vietnam, Vu Ngoc Son, a director of Bkav Anti Malware, said dozens of cases of infection had been reported there, but he declined to identify any of the victims.

South Korea’s Yonhap news agency reported a university hospital had been affected, while a communications official in Indonesia said two hospitals there had been hit.

The most disruptive attacks were reported in Britain, where hospitals and clinics were forced to turn away patients after losing access to computers on Friday.

International shipper FedEx Corp said some of its Windows computers were also breached. “We are implementing remediation steps as quickly as possible,” a FedEx statement said.

Telecommunications company Telefonica was among many targets in Spain. Portugal Telecom and Telefonica Argentina both said they were also targeted.

Only a small number of U.S.-headquartered organizations were hit because the hackers appear to have begun the campaign by focusing on targets in Europe, said Thakur.

By the time they turned their attention to the United States, spam filters had identified the new threat and flagged the ransomware-laden emails as malicious, he added.

MICROSOFT BOLSTERS WINDOWS DEFENCES

Private security firms identified the ransomware as a new variant of “WannaCry” that had the ability to automatically spread across large networks by exploiting a known bug in Microsoft’s Windows operating system.

“This is one of the largest global ransomware attacks the cyber community has ever seen,” said Rich Barger, director of threat research with Splunk, one of the firms that linked WannaCry to the NSA.

The Shadow Brokers released Eternal Blue as part of a trove of hacking tools that they said belonged to the U.S. spy agency.

The attack targeted Windows computers that had not installed patches released by Microsoft in March, or older machines running software that Microsoft no longer supports and for which patches did not exist, including the 16-year-old Windows XP system, researchers said.

Microsoft said it pushed out automatic Windows updates to defend existing clients from WannaCry. It had issued a patch on March 14 to protect them from Eternal Blue. Late on Friday, Microsoft also released patches for a range of long discontinued software, including Windows XP and Windows Server 2003.

“Today our engineers added detection and protection against new malicious software known as Ransom:Win32.WannaCrypt,” Microsoft said in a statement on Friday, adding it was working with customers to provide additional assistance.

POLITICALLY SENSITIVE TIMING

The spread of the ransomware capped a week of cyber turmoil in Europe that began when hackers posted a trove of campaign documents tied to French candidate Emmanuel Macron just before a run-off vote in which he was elected president of France.

On Wednesday, hackers disrupted the websites of several French media companies and aerospace giant Airbus. The hack happened four weeks before a British general election in which national security and the management of the state-run National Health Service are important issues.

Authorities in Britain have been braced for cyber attacks in the run-up to the election, as happened during last year’s U.S. election and on the eve of the French run-off vote on May 7.

But those attacks – blamed on Russia, which has repeatedly denied them – followed a different modus operandi involving penetrating the accounts of individuals and political organizations and then releasing hacked material online.

On Friday, Russia’s interior and emergencies ministries, as well as its biggest bank, Sberbank, said they were targeted by ransomware. The interior ministry said about 1,000 computers had been infected but it had localized the virus.

Although cyber extortion cases have been rising for several years, they have to date affected small- to mid-sized organizations. “Seeing a large telco like Telefonica get hit is going to get everybody worried,” said Chris Wysopal, chief technology officer with cyber security firm Veracode.

(Additional reporting by Kiyoshi Takenaka, Jim Finkle, Eric Auchard, Jose Rodriguez, Alistair Smout, Andrea Shalal, Jack Stubbs, Antonella Cinelli, Dustin Volz, Kate Holton, Andy Bruce, Michael Holden, David Milliken, Rosalba O’Brien, Julien Toyer, Tim Hepher, Luiza Ilie, Patricia Rua, Axel Bugge, Sabine Siebold and Eric Walsh, Engen Tham, Fransiska Nangoy, Soyoung Kim, Mai Nguyen; editing by Mark Heinrich)

Facebook warns of fake news danger ahead of British election

A woman looks out of a window at the Big Ben clock tower in London, Britain,

LONDON (Reuters) – Facebook has launched a British newspaper advertising campaign to warn users of the dangers of fake news, in the latest drive by the social media giant to tackle malicious information ahead of a national election.

Facebook has come under intense pressure to tackle the spread of false stories, which came to prominence during the U.S. presidential election last year when many inaccurate posts were widely shared on it and other social media services.

Ahead of the June 8 parliamentary election in Britain, it urged its users in the country to be skeptical of headlines that look unbelievable and to check other sources before sharing news that may not be credible. It said it would also delete bogus profiles and stop promoting posts that show signs of being implausible.

“We have developed new ways to identify and remove fake accounts that might be spreading false news so that we get to the root of the problem,” said Simon Milner, Facebook’s director of policy for the UK.

The effort builds on the company’s recently expanded campaigns to identify fake news and crack down on automated profile pages that post commercial or political spam.

Facebook suspended 30,000 accounts in France ahead of the first round of its presidential election last month and uses outside fact-checkers in the country. It has also previously taken out full-page ads in German newspapers to educate readers on how to spot fake news.

With the headline “Tips for spotting false news”, the adverts in Britain listed 10 ways to identify whether a story was genuine or not, including looking closely at a URL, investigating the source, looking for unusual formatting and considering the authenticity of the photo.

Facebook said it had taken action against tens of thousands of fake accounts in Britain after identifying patterns of activity such as whether the same content is being repeatedly posted.

“With these changes, we expect we will also reduce the spread of material generated through inauthentic activity, including spam, misinformation, or other deceptive content that is often shared by creators of fake accounts,” Facebook said.

Social media sites including Twitter and YouTube are also facing pressure in Europe where governments are threatening new laws and fines unless the companies move more quickly to remove extremist content.

Facebook has hired more staff to speed up the removal of videos showing murder, suicide and other violent acts.

(Reporting by Kate Holton; Editing by Janet Lawrence)

Dos, don’ts and geo-fencing: Europe proposes rules for small drones

A drone flies as Belgian police officers showcase the use of drones deployed over traffic accidents occurring on highways, in Ranst near Antwerp, Belgium, January 18, 2017. REUTERS/Francois Lenoir

BERLIN (Reuters) – Europe’s aviation safety authorities have proposed rules for operating small drones that include requirements for geo-fencing technology to prevent them from straying into banned areas and a “dos and don’ts” leaflet to be inserted in retail packaging.

With demand booming, both for hobby and commercial use, European regulators have been looking for ways to ensure drones can be safely operated, while allowing the industry to grow.

Fears have been raised over the use of drones near airports in particular, with a number of pilots reporting near collisions with drones, and the European Aviation Safety Agency (EASA) has set up a task force to look into the risk of drone strikes.

EASA’s proposals include requirements for drones to be remotely identifiable, to be fitted with geo-fencing technology to prevent them from entering prohibited zones such as airports and nuclear sites, and a requirement for people operating drones weighing more than 250 grams to register themselves.

EASA hopes such measures will address privacy concerns, as well as safety risks.

The design requirements for small drones will be implemented using the CE product legislation commonly used across Europe.

Along with the CE marking, drones will be identified according to their class, and a “dos and don’ts” leaflet will be in all product boxes.

“Based on the drone class, an operator will know in which area he can operate and what competence is required,” EASA said in a statement.

The proposal is now open for comment from May 12 until Aug. 12 and EASA will submit its final opinion to the European Commission at the end of 2017.

The regulation of drones weighing less than 150 kg is currently up to individual EU member states, resulting in a fragmented regulatory framework.

Makers of commercial drones include China’s DJI and France’s Parrot <PARRO.PA>.

(Reporting by Victoria Bryan; Editing by Mark Potter)