Reuters reports on UK publicly attributing and blaming Russia for last years NotPetya attack, which crippled multiple UK government agencies and businesses:

The so-called NotPetya attack in June started in Ukraine where it crippled government and business computers before spreading around the world, halting operations at ports, factories and offices.

Britain’s foreign ministry said the attack originated from the Russian military.

“The decision to publicly attribute this incident underlines the fact that the UK and its allies will not tolerate malicious cyber activity,” the ministry said in a statement.

“The attack masqueraded as a criminal enterprise but its purpose was principally to disrupt,” it said.

“Primary targets were Ukrainian financial, energy and government sectors. Its indiscriminate design caused it to spread further, affecting other European and Russian business.”

UK is showing the current US administration how to play hardball politics against Russia. Since the US is not publicly condemning Russia for their bad behavior, our allies will have to fill in that gap until the administration changes its tune.

From the ZDNet reports on a huge ransomware attack against shipping giant Maersk:

Maersk has revealed that a devastating ransomware attack which struck businesses across Europe in 2017 required close to a “complete infrastructure” overhaul and the reinstallation of thousands of machines.

In total, Maersk reinstalled 4,000 servers, 45,000 PCs, and 2,500 applications in what the chairman called a “heroic effort” over ten days, one in which the executive said may have usually taken up to six months to implement.

Hagemann said the ransomware attack was a “very significant wake-up call for Maersk, and you could say, a very expensive one.”

“We were basically average when it came to cybersecurity, like many companies,” the executive said. “This was a wake-up call not just to become good, but to have cybersecurity as a competitive advantage.”

What a complete and utter disaster for Maersk. What is most interesting to me, and what I would really like to know, is how this was even able to cause such devastation to mission critical corporate IT assets.