Source: Africa Press Organisation – English (2) – Report:
Afreximbank reports strong performance for Q1 2025 in line with expectations The Group posted strong Net Income of US$215 million, a 21% increase year-on-year from US$178 million in the prior period CAIRO, Egypt, May 21, 2025/APO Group/ — African Export-Import Bank (“Afreximbank” or the “Group”) (www.Afreximbank.com) has released the consolidated financial statements of the Bank and its subsidiaries for the three months ended 31 March 2025. Financial Highlights Afreximbank Group delivered satisfactory financial performance for the first quarter of 2025, meeting expectations with solid profitability, strengthened liquidity and a resilient capital base. This performance provides a springboard for the Bank to continue playing its pivotal role of advancing the aspirations of Africa and the Caribbean for economic transformation and sustainable development in the months and years ahead. Net interest income grew by 4.53% to US$411.2 million compared to prior year, driven by growth in interest earning assets, complemented by effective management of borrowing costs, helping the Bank to cushion the marginal decline in total interest income due to softening benchmark rates. Fee income from Guarantees and Letters of Credit saw robust growth of 47% and 36% respectively, partially offsetting lower advisory fees to contribute to total unfunded income of US$26.9 million for Q1-2025. While this represented a 7.41% decrease from US$29.0 million in Q1 2024, the strong performance in Off-balance sheet assets is in line with the Bank’s strategy to grow unfunded business. The Group posted strong Net Income of US$215 million, a 21% increase year-on-year from US$178 million in the prior period. The Group’s total assets and contingent liabilities increased by 6.4%, reaching US$42.7 billion as of 31 March 2025, up from US$40.1 billion at FY’2024. On-balance sheet assets grew by 4.85% to US$37.0 billion, driven primarily by a 58% surge in cash balances to US$7.4 billion, while Off-balance sheet assets i.e. letters of credit and guarantee volumes increased by a 19% to reach US$5.7 billion at the end of Q1-2025. Net loans and advances closed Q1-2025 at US$27.8 billion, down from the FY2024 closing position reflecting early repayments from certain customers on account of improved foreign currency balances position of some sovereign borrowers. Importantly, the Loan Asset Quality remained strong, with the Non-Performing Loans (NPL) ratio at 2.44%, a modest increase from 2.33% at FY’2024 – well below the Bank’s strategic NPL ceiling of 4%. Driven by inflationary pressures and growing personnel costs, operating expenses rose by 23% to reach US$75.4 million by 31 March 2025. Despite this, Afreximbank Group maintained a healthy Cost-to-Income Ratio of 16%, below its strategic range of 17-30%. Afreximbank’s liquidity profile strengthened considerably, with liquid assets now comprising 20% of total assets, up from 13% at the close of FY’2024. This higher liquidity position was as a result of successful fund-raising, coupled with loan repayments received during the quarter. Shareholders’ funds increased by 3.4%, reaching US$7.5 billion, driven by strong internally generated capital of US$215.4 million in addition to new equity investments under the second General Capital Increase (GCI II) programme. Operating Highlights In line with the Afreximbank strategic objective of driving Industrialisation and export development, the Bank and the Government of Kenya ratified a number of initiatives designed to support the development Industrial Parks (IPs) and Special Economic Zones (SEZs) in Kenya under the US$3 billion Kenya country programme. These projects which include Dongo Kundu Industrial Park in Mombasa and Naivasha SEZ II in Mai Mahiu, are key components of Kenya’s Vision 2030 plan to boost export manufacturing and industrialisation. Afreximbank’s support for these initiatives will specifically enhance infrastructure development, attract investment, and strategically position Kenya as a key hub for African and global commerce. The rollout of the Pan-African Payments and Settlement System (PAPSS) continues to gain momentum with KCB Group in Kenya and Bank of Kigali in Rwanda launching the platform, becoming the first banks in their respective countries to offer seamless, instant, and affordable cross-border payments in local currencies across Africa. Aligned with its mandate to promote Global Africa following the recognition of the African Diaspora as the 6th region of Africa, the Bank further cemented its expansion and presence in the Caribbean with the historic groundbreaking ceremony to kick off the construction of the first ever Afreximbank African Trade Centre (AATC) outside of Africa in Bridgetown, Barbados. AATC Barbados will also host its regional office. The Barbados AATC is an authentic icon of trade embodying the ambition, resilience, and influence of leading commercial cities in Africa and the Caribbean that serve as dynamic focal points for commerce, fostering regional and global trade connections, and is expected to enhance intra-and extra-African trade, with a focus on countries of the Global South. Mr. Denys Denya, Afreximbank’s Senior Executive Vice President, commented: “Our QI 2025 results, which were in line with expectations, reflected a strong and resilient financial performance, notwithstanding continued macroeconomic challenges. With solid profitability growth, a strengthened liquidity position, and a well-capitalised balance sheet, the Group is firmly positioned to continue playing a pivotal role in advancing the aspirations of Africa and the Caribbean for economic transformation and sustainable development.” Highlights of the results for the Group are shown below:
Income statement Financial Metrics
Q1-2025
Q1-2024
Gross Income (US$ million)
784.9
753.8
Operating Income (US$ million)
474.2
423.5
Net Income (US$ million)
215.4
178.7
Return on average assets (ROAA)
2.38%
2.19%
Return on average equity (ROAE)
12%
12%
Cost-to-income ratio
16%
15%
Balance sheet financial metrics
Q1-2025
FY-2024
Total Assets (US$ billion)
37.0
35.3
Total Liabilities (US$ billion)
29.5
28.1
Shareholders’ Funds (US$ billion)
7.5
7.2
Net asset value per share (US$)
71,671
69,695
Non-performing loans ratio (NPL)
2.44%
2.33%
Cash/Total assets
20%
13%
Capital Adequacy ratio (Basel II)
26%
24%
Distributed by APO Group on behalf of Afreximbank. Media Contact: Vincent Musumba Communications and Events Manager (Media Relations) Email: press@afreximbank.com Follow us on: X: https://apo-opa.co/43pfUK5 Facebook: https://apo-opa.co/43uKQbW LinkedIn: https://apo-opa.co/4jhrbSL Instagram: https://apo-opa.co/43DKyk2 About Afreximbank: African Export-Import Bank (Afreximbank) is a Pan-African multilateral financial institution mandated to finance and promote intra- and extra-African trade. For over 30 years, the Bank has been deploying innovative structures to deliver financing solutions that support the transformation of the structure of Africa’s trade, accelerating industrialisation and intra-regional trade, thereby boosting economic expansion in Africa. A stalwart supporter of the African Continental Free Trade Agreement (AfCFTA), Afreximbank has launched a Pan-African Payment and Settlement System (PAPSS) that was adopted by the African Union (AU) as the payment and settlement platform to underpin the implementation of the AfCFTA. Working with the AfCFTA Secretariat and the AU, the Bank has set up a US$10 billion Adjustment Fund to support countries effectively participating in the AfCFTA. At the end of December 2024, Afreximbank’s total assets and contingencies stood at over US$40.1 billion, and its shareholder funds amounted to US$7.2 billion. Afreximbank has investment grade ratings assigned by GCR (international scale) (A), Moody’s (Baa1), China Chengxin International Credit Rating Co., Ltd (CCXI) (AAA), Japan Credit Rating Agency (JCR) (A-) and Fitch (BBB). Afreximbank has evolved into a group entity comprising the Bank, its equity impact fund subsidiary called the Fund for Export Development Africa (FEDA), and its insurance management subsidiary, AfrexInsure (together, “the Group”). The Bank is headquartered in Cairo, Egypt. For more information, visit: www.Afreximbank.com Forward-Looking Statements: The Bank makes written and/or oral forward-looking statements, as shown in this presentation and in other communications, from time to time. Likewise, officers of the Bank may make forward-looking statements either in writing or during verbal conversations with investors, analysts, the media, and other key members of the investment community. Statements regarding the Bank’s strategies, objectives, priorities, and anticipated financial performance for the year, constitute forward-looking statements. They are often described with words like “should”, “would”, “may”, “could”, “expect”, “anticipate”, “estimate”, “project”, “intend”, and “believe”. By their very nature, these statements require the Bank to make assumptions that are subject to risks and uncertainties, especially uncertainties related to the financial, economic, regulatory, and social environment within which the Bank operates. Some of these risks are beyond the control of the Bank and may make actual results that are obtained to vary materially from the expectations inferred from the forward-looking statements. Risk factors that could cause such differences include regulatory pronouncements, credit, market (including equity, commodity, foreign exchange, and interest rate), liquidity, operational, reputational, insurance, strategic, legal, environmental, and other known and unknown risks. As a result, when making decisions with respect to the Bank, we recommend that readers apply further assessment and should not unduly rely on the Bank’s forward-looking statements. Any forward-looking statement contained in this presentation represents the views of management only as of the date hereof and they are presented for the purpose of assisting the Bank’s investors and analysts to understand the Bank’s financial position, strategies, objectives, priorities, anticipated financial performance in relation to the current period, and, as such, may not be appropriate for other purposes. The Bank does not undertake to update any forward-looking statement, whether written or verbal, that may be made from time to time, by it or on its behalf, except as required under applicable relevant regulatory provisions or requirements.
Source: Federal Bureau of Investigation (FBI) State Crime Alerts (c)
BUFFALO, N.Y. – U.S. Attorney Michael DiGiacomo announced today that Waleed Abughanem, 33, of Lackawanna, NY, who was convicted of misprision of felony, was sentenced to serve 36 months in prison by U.S. District Judge John L. Sinatra, Jr.
Assistant U.S. Attorneys Charles M. Kruly and Maeve E. Huggins, who handled the case, stated that Abughanem is the son of Khaled Abughanem and the brother of Adham Abughanem. On September 8, 2021, Khaled and Adham Abughanem flew from Buffalo, NY, to Guadalajara, Mexico to kidnap Victim 1, who is the daughter of Khaled and the sister of Adham and Waleed. Between September 10, 2021, and April 6, 2023, Waleed, Khaled and Adham Abughanem conspired to transport Victim 1 from the Western District of New York to Cairo, Egypt, and then to Sanaa, Yemen, where they confined Victim 1 for approximately 16 months with the purpose of marrying her to a man not of her choosing.
Waleed Abughanem knew Victim 1 was being held involuntarily, and during some of this period, he was present in Yemen. When he was not present in Yemen, Waleed Abughanem instructed his wife to monitor and supervise Victim 1. In December 2022, Waleed Abughanem traveled from Yemen to the United States. When questioned by U.S. Customs and Border Protection as to the whereabouts of his siblings, Waleed Abughanem told the CBP Officer that the Victim was in the United States. By making a false statement, Waleed Abughanem concealed that Victim 1 had been kidnapped and was being involuntarily held in Yemen.
Khaled and Adham Abughanem were previously convicted by a federal jury at trial and are awaiting sentencing.
Waleed Abughanem’s sentencing is the result of an investigation by the Federal Bureau of Investigation, under the direction of Special Agent-in-Charge Matthew Miraglia, and the U.S. Department of State’s Diplomatic Security Service, under the direction of Diplomatic Security Director Carlos Matus and Deputy Assistant Secretary Paul Houston. Additional assistance was provided by the Lackawanna Police Department, under the direction of Chief Mark Packard, Customs and Border Protection, under the direction of Director of Field Operations Rose Brophy, and CPB in Boston, Massachusetts.
In recent years, the term “eldest daughter syndrome” has gained traction on social media, as many firstborn daughters share how they had to grow up faster. They often took on caregiving and supportive roles in their families.
In high-income countries, research shows that these responsibilities often bring long-term benefits. Firstborn daughters – and sons – tend to have higher educational attainment and stronger cognitive skills. They also enjoy better job prospects and salaries.
Some studies in low- and middle-income countries have found similar positive effects of being the eldest. But others have found the opposite.
In low-income contexts, economic constraints, cultural practices – such as the involvement of extended families in child-rearing – and inheritance norms may produce very different effects.
Our research brings new insights by examining these dynamics in Madagascar. It is one of the world’s poorest countries. Birth order there strongly shapes the transition to adulthood, especially for firstborn children.
Progress in understanding birth order effects in low-income countries is held back by the lack of detailed, sibling-level data. Our study used a dataset that followed individuals from the ages of 10 to 22, capturing their transition from adolescence to adulthood. It collected detailed information on education, work, health, marriage, and migration. The dataset also captured key demographic and educational details for all living full siblings of each respondent.
We found that firstborns in Madagascar transition into adulthood earlier than their younger siblings. They are more likely to leave school early. They enter the workforce sooner and marry at younger ages. For example, fourth-born children are 1.5 percentage points less likely than firstborns to have never attended school, and 1.1 percentage points more likely to complete post-secondary education.
Or, third-borns are 23% less likely to marry at age 19 than firstborns.
Our findings suggest that later-born children benefit from greater parental investment in education. This leads to better schooling outcomes and delayed entry into the labour market.
Birth order and the transition to adulthood
In Madagascar, early marriage can be a way for families to ease financial pressure. This is especially true since daughters typically join their husband’s household.
When it comes to marriage, we find that later-born children are less likely to marry early than their firstborn siblings – especially after age 17. This trend holds for both boys and girls. The difference appears earlier for girls, which aligns with their younger average age at marriage.
Interestingly, second-born girls are not significantly less likely to marry than their older sisters. This suggests that the eldest daughter does not always bear the full brunt of early marriage risk.
Firstborn daughters often take on caregiving and household roles. These responsibilities may delay their marriage slightly, as families rely on them for day-to-day support.
What explains these birth order effects?
We did not observe significant differences in cognitive skills (like reasoning) or non-cognitive traits (like personality) between firstborns and their younger siblings. Cognitive abilities were assessed through oral and written math and French tests administered at home. These findings contrast with evidence from wealthier countries, where firstborns often outperform their siblings in both cognitive and non-cognitive domains. This may result from greater early parental investment.
In Madagascar, child development may rely less on direct parental input and more on interactions within the extended family. This is consistent with the concept of fihavanana, a cultural principle that emphasises solidarity and mutual support within the extended family.
Rather than benefiting mostly from parental quality time, children – especially later-borns – may develop their cognitive and non-cognitive skills through broader social networks. These include relatives and older siblings.
We also explored whether gender preferences might help explain the differences in outcomes. For instance, if later-born children were disproportionately boys, it could suggest that parents continued having children in hopes of having a son. This could lead to more resources being allocated to that later-born boy. However, our data show an even distribution of boys and girls among later-born children. This suggests that gender-based stopping rules are unlikely to explain the patterns we observe.
Instead, our findings point to economic constraints as the main driver for firstborns transitioning into adulthood earlier than their younger siblings.
In poorer households, particularly in rural areas, firstborn children are often asked to help out financially. This often comes at the cost of their own education. Later-born children, by contrast, receive more investment in their schooling. This may compensate for their limited access to other resources, such as land.
We find no birth order advantage in wealthier households or among families where parents have some education. This again highlights poverty as a key factor shaping these patterns.
The double burden of being firstborn
To sum up, our research shows that, in Madagascar, both male and female firstborns face an earlier transition into adulthood. They leave school and enter the labour market sooner. They marry earlier, although firstborn girls may be at slightly lower risk of early marriage than their younger sisters.
This suggests that, in poor countries, the eldest daughter syndrome is not just about emotional and care-giving responsibilities. It may also come with fewer educational opportunities, greater economic pressure, and an earlier end to childhood. A true double burden for disadvantaged girls. Economic constraints within households largely explain this pattern.
But the story is not only one of constraint. The absence of differences in cognitive and non-cognitive skills suggests that broader community ties, rooted in fihavanana and extended kinship networks, help cushion the impact of early responsibility. These collective structures may not erase inequality, but they offer a vital source of resilience.
As policymakers and practitioners look for ways to promote educational equity, it’s worth remembering that some of the most overlooked trade-offs happen within households. Reducing the weight of those trade-offs – through financial support, community-based programmes, or school retention efforts – could help ensure that the future of one child doesn’t come at the expense of another.
Claire Ricard receives funding from the program “Investissements d’avenir” (ANR-10-LABX-14-01). She’s affiliated to Université Clermont Auvergne, CNRS, IRD, CERDI, F-63000, Clermont-Ferrand and works as an Economist at IDinsight, Rabat, Morocco.
Francesca Marchetta receives funding from the program “Investissements d’avenir” (ANR-10-LABX-14-01).
She’s affiliated to Université Clermont Auvergne, CNRS, IRD, CERDI, F-63000, Clermont-Ferrand and with PEP (Partnership for Economic Policy).
Source: The Conversation – Canada – By Paco Milhiet, Visiting fellow au sein de la Rajaratnam School of International Studies ( NTU-Singapour), chercheur associé à l’Institut catholique de Paris, Institut catholique de Paris (ICP)
These recent events provide an opportunity to examine the complex historical and geopolitical entanglements surrounding St-Pierre-Miquelon and involving France, Canada and the United States.
Last French territory in the region
Visited by Indigenous Peoples for nearly 5,000 years, St-Pierre-Miquelon became known to European sailors in the late 15th century and was officially claimed for France by Jacques Cartier in 1536.
The archipelago soon emerged as a strategic base for French fishermen engaged in cod fishing and whaling. Over the ensuing centuries, the islands were fiercely contested by France and Great Britain, changing hands multiple times before being definitively restored to French control in 1816.
In the 20th century, the archipelago was at the heart of recurring fishing disputes between Canada and France.
Both these events had major economic repercussions for St-Pierre-Miquelon.
Hefty tariff
Today, the territory’s economy is small — less than 0.001 per cent of France’s GDP — and it depends heavily on public funds and external provisions, particularly from neighbouring Canada.
Nevertheless, the territory was initially included among the targets of the so-called Liberation Day tariffs announced U.S. President Donald Trump in April. It was singled out with a hefty 50 per cent import duty, temporarily making it one of the most heavily taxed territories in the world, matched only by the landlocked African country of Lesotho.
St-Pierre-Miquelon and the U.S. had a balanced trade relationship from 2010 to 2025, until a sharp discrepancy appeared in July 2024. The U.S. imported US$3.4 million worth of goods from the islands, exporting only $100,000 over the entire year.
This resulted in a reported trade imbalance of 3,300 per cent for the year 2024, which the U.S. government appears to have interpreted as evidence of a 99 per cent tariff imposed by the territory, applying the same flawed algorithm on other countries.
Why was there such a discrepancy in July 2024?
According to several reports, this statistical anomaly is actually the result of a long-standing dispute between France and Canada over fishing quotas in the waters surrounding St-Pierre-Miquelon.
Traditionally, the territory mainly exports seafood products to France and Canada, and almost none to the U.S.
While the catch was made in international waters and was technically legal, it occurred amid ongoing tensions between France and Canada over halibut stocks and the sustainability of the species in the area.
Because of these tensions, the catch was redirected to the U.S. market and sold for the aforementioned US$3.4 million, an outcome that ultimately triggered the tariffs imposed by the Trump administration.
France and Canada reached an agreement on halibut later in 2024. But their “halibut war” was just the latest example of recurring disputes between the two countries over fishing quotas in the waters off the Grand Banks of Newfoundland, one of the world’s richest fishing grounds.
The heavy tariffs imposed by the U.S. on St-Pierre-Miquelon, even though they were swiftly reversed, wer therefore an indirect consequence of the long-standing tensions between France and Canada.
A new Alcatraz?
Within days of St-Pierre-Miquelon recovering from the tariff shock, it was once again thrust into the spotlight.
It’s not the first time politicians have proposed deporting prisoners to French overseas territories.
The suggestion is aligned with France’s historical use of these territories as sites for penal colonies, most notably in Cayenne in French Guyana and New Caledonia in the South Pacific.
Wauquiez’s remarks were widely condemned as contemptuous and colonial in tone, including by members of the government.
In response, local authorities in St-Pierre-Miquelon tried to capitalize on the controversy by launching a humorous media campaign that reappropriated the OQTF acronym.
Social media ads from St-Pierre-Miquelon officials on the deportation proposal by Laurent Wauquiez. (Compiled by Paco Milhiet)
Their goal was to shift the narrative and highlight the archipelago’s appeal: low unemployment, strong public safety, outstanding natural landscapes and a peaceful, family-friendly quality of life — and, hopefully, free from hefty American tariffs.
Paco Milhiet does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.
An international award-winning author will be hosting a free talk this Saturday at Aberdeen Central Library.
Leila Aboulela will discuss her latest book ‘A New Year’, released as part of this year’s World Book Night, as well as talking about her career, inspirations and love of reading and writing.
Councillor Martin Greig, Aberdeen City Council’s culture spokesperson, said: “We are delighted to welcome such a distinguished author to our library.
“Leila’s work is hugely influential and insightful and I encourage everyone to come along and be inspired.”
Leila Aboulela said: “I am delighted to be back at the central library. Here in the early 1990s, my ambition to become a writer was first ignited.
“I attended creative writing workshops and author events which introduced me to the works of Scotland’s top writers. And of course I borrowed and read lots of books. I also made friends at the library, lifelong friends. The library will always be one of my favourite places in Aberdeen.”
The talk will be followed by a book signing, and copies of Leila’s books will be available to purchase.
Born in Cairo, Egypt, and brought up in Khartoum, Sudan, Leila began her literary career after moving to Aberdeen. Her work has received critical recognition for its depiction of the interior lives of Muslim women and the exploration of identity, migration and Islamic spirituality.
An Afternoon with Leila Aboulela will be held on Saturday 24 May at 2:30pm at Aberdeen Central Library. Booking is required to attend this event. To reserve a place, please email libraryevents@aberdeencity.gov.uk or phone 01224 070707.
Source: The Conversation – Africa – By Claire Ricard, Research Fellow at CERDI, Université Clermont Auvergne (UCA)
In recent years, the term “eldest daughter syndrome” has gained traction on social media, as many firstborn daughters share how they had to grow up faster. They often took on caregiving and supportive roles in their families.
In high-income countries, research shows that these responsibilities often bring long-term benefits. Firstborn daughters – and sons – tend to have higher educational attainment and stronger cognitive skills. They also enjoy better job prospects and salaries.
Some studies in low- and middle-income countries have found similar positive effects of being the eldest. But others have found the opposite.
In low-income contexts, economic constraints, cultural practices – such as the involvement of extended families in child-rearing – and inheritance norms may produce very different effects.
Our research brings new insights by examining these dynamics in Madagascar. It is one of the world’s poorest countries. Birth order there strongly shapes the transition to adulthood, especially for firstborn children.
Progress in understanding birth order effects in low-income countries is held back by the lack of detailed, sibling-level data. Our study used a dataset that followed individuals from the ages of 10 to 22, capturing their transition from adolescence to adulthood. It collected detailed information on education, work, health, marriage, and migration. The dataset also captured key demographic and educational details for all living full siblings of each respondent.
We found that firstborns in Madagascar transition into adulthood earlier than their younger siblings. They are more likely to leave school early. They enter the workforce sooner and marry at younger ages. For example, fourth-born children are 1.5 percentage points less likely than firstborns to have never attended school, and 1.1 percentage points more likely to complete post-secondary education. Or, third-borns are 23% less likely to marry at age 19 than firstborns.
Our findings suggest that later-born children benefit from greater parental investment in education. This leads to better schooling outcomes and delayed entry into the labour market.
Birth order and the transition to adulthood
In Madagascar, early marriage can be a way for families to ease financial pressure. This is especially true since daughters typically join their husband’s household.
When it comes to marriage, we find that later-born children are less likely to marry early than their firstborn siblings – especially after age 17. This trend holds for both boys and girls. The difference appears earlier for girls, which aligns with their younger average age at marriage.
Interestingly, second-born girls are not significantly less likely to marry than their older sisters. This suggests that the eldest daughter does not always bear the full brunt of early marriage risk. Firstborn daughters often take on caregiving and household roles. These responsibilities may delay their marriage slightly, as families rely on them for day-to-day support.
What explains these birth order effects?
We did not observe significant differences in cognitive skills (like reasoning) or non-cognitive traits (like personality) between firstborns and their younger siblings. Cognitive abilities were assessed through oral and written math and French tests administered at home. These findings contrast with evidence from wealthier countries, where firstborns often outperform their siblings in both cognitive and non-cognitive domains. This may result from greater early parental investment.
In Madagascar, child development may rely less on direct parental input and more on interactions within the extended family. This is consistent with the concept of fihavanana, a cultural principle that emphasises solidarity and mutual support within the extended family. Rather than benefiting mostly from parental quality time, children – especially later-borns – may develop their cognitive and non-cognitive skills through broader social networks. These include relatives and older siblings.
We also explored whether gender preferences might help explain the differences in outcomes. For instance, if later-born children were disproportionately boys, it could suggest that parents continued having children in hopes of having a son. This could lead to more resources being allocated to that later-born boy. However, our data show an even distribution of boys and girls among later-born children. This suggests that gender-based stopping rules are unlikely to explain the patterns we observe.
Instead, our findings point to economic constraints as the main driver for firstborns transitioning into adulthood earlier than their younger siblings.
In poorer households, particularly in rural areas, firstborn children are often asked to help out financially. This often comes at the cost of their own education. Later-born children, by contrast, receive more investment in their schooling. This may compensate for their limited access to other resources, such as land.
We find no birth order advantage in wealthier households or among families where parents have some education. This again highlights poverty as a key factor shaping these patterns.
The double burden of being firstborn
To sum up, our research shows that, in Madagascar, both male and female firstborns face an earlier transition into adulthood. They leave school and enter the labour market sooner. They marry earlier, although firstborn girls may be at slightly lower risk of early marriage than their younger sisters.
This suggests that, in poor countries, the eldest daughter syndrome is not just about emotional and care-giving responsibilities. It may also come with fewer educational opportunities, greater economic pressure, and an earlier end to childhood. A true double burden for disadvantaged girls. Economic constraints within households largely explain this pattern.
But the story is not only one of constraint. The absence of differences in cognitive and non-cognitive skills suggests that broader community ties, rooted in fihavanana and extended kinship networks, help cushion the impact of early responsibility. These collective structures may not erase inequality, but they offer a vital source of resilience.
As policymakers and practitioners look for ways to promote educational equity, it’s worth remembering that some of the most overlooked trade-offs happen within households. Reducing the weight of those trade-offs – through financial support, community-based programmes, or school retention efforts – could help ensure that the future of one child doesn’t come at the expense of another.
– Eldest daughters often carry the heaviest burdens – insights from Madagascar – https://theconversation.com/eldest-daughters-often-carry-the-heaviest-burdens-insights-from-madagascar-255785
Joint statement on the launch of a High-Level Panel on Social Protection in Fragile and Conflict Settings
Joint statement from the Panel co-chairs, Lord Collins of Highbury, Parliamentary Under Secretary of State for Foreign, Commonwealth and Development Affairs and H.E. Salah Ahmed Jama, Deputy Prime Minister, Federal Government of Somalia
Joint statement:
“Today marks the first meeting of the High-Level Panel on Social Protection in Fragile and Conflict-Affected Settings. And the beginning of our six-month mandate.
Nearly three-quarters of the world’s extreme poor live in fragile settings, where crises are lasting longer, forcing more people from their homes, and contributing to migration.
When floods, cyclones and droughts hit, when conflict breaks out, when economic shocks destroy livelihoods, social protection can provide a first line of defence, an effective locally led solution that enables the most vulnerable people to withstand, survive, recover from crisis and rebuild their lives at home. One that reduces the need for humanitarian response.
But despite its proven potential, it is often overlooked in the fragile and conflict-affected settings where it is needed most.
Over the next six months, the Panel will gather and review lessons from across sectors and regions – including through a forthcoming global public enquiry. As co-chairs, our goal is to come up with bold, practical recommendations that can drive meaningful change.”
For the first time in three years, government has proposed an inflation-linked increase to the general fuel levy.
“For the 2025/26 fiscal year, this is the only new tax proposal that I am announcing. It means from 4 June this year, the general fuel levy will increase by 16 cents per litre for petrol, and by 15 cents per litre for diesel,” Minister of Finance Enoch Godongwana said on Wednesday, in Parliament.
The general fuel levy has remained unchanged for the past three years to provide consumers with relief from high fuel price inflation.
Re-tabling the 2025 Budget Review, Godongwana said unfortunately, this tax measure alone will not close the fiscal gap over the medium term.
“The 2026 Budget will therefore need to propose new tax measures, aimed at raising R20 billion. We have allocated an additional R7.5 billion over the medium-term expenditure framework (MTEF), to increase the effectiveness of the South African Revenue Service (SARS) in collecting more revenue.
“Part of this allocation will be used to increase collections from debts owed to the fiscus. SARS has indicated that this could raise between R20 billion to R50 billion in additional revenue per year,” the Minister said.
Another part of the additional allocation to SARS will be used to improve modernisation.
This will include targeting illicit trade in tobacco and other areas, which should boost revenue over the medium term.
“As SARS utilises this investment to raise additional revenue, which I believe can be at least R35 billion, the R20 billion to close the current revenue gap will not have to be raised through taxes.
“Madam Speaker, let me call on every South African, be they individuals, small business operators or large corporates, to honour their tax obligations and contribute to building a better and more equitable nation,” the Minister said.
He thanked all the taxpayers that continue to pay their taxes while emphasising that government does not take taxpayers for granted.
“As a government, we know that we must earn the taxpayer’s trust every day, by spending public money with care and ensuring that every rand collected is spent on its intended purpose.
“We recognise the urgent need to do more to achieve this goal. We are not deaf to the public’s concern about wasteful and inefficient expenditure.
“Our commitment to collect taxes must be matched by better efficiency in how that money is spent. It must be matched by much stricter oversight that quickly identifies problems and provides timely solutions when things go wrong,” the Minister explained.
Expansion of the zero-rated basket withdrawn
Meanwhile, as a result of the withdrawal of the proposed increases in the VAT rate, the expansion of the zero-rated basket, which was included to cushion poorer households from the VAT rate increase, falls away.
Last month, the Minister requested the Speaker of the National Assembly to maintain the Value-Added Tax (VAT) rate at its current level of 15% , reversing the previously proposed 0.5 percentage point increase presented in the 12 March budget.
“Madam Speaker, compared to the March estimates, tax revenue projections have been revised down by R61.9 billion over the three years. This reflects the reversal of the VAT increase and the much weaker economic outlook.
“In this difficult environment, it remains vital that we still take actions to increase revenue to protect and bolster frontline services, while expanding infrastructure investments to drive economic activity,” the Minister said. –SAnews.gov.za
In an ongoing effort to grow the economy, government will continue to implement growth enhancing structural reforms as part of Operation Vulindlela.
“Madam Speaker, a bigger, faster-growing economy, and the larger fiscal resources that come with it, are the key to building up the fiscal room we need to meet more of our developmental goals,” Minister of Finance, Enoch Godongwana, said on Wednesday during the re-tabling of the 2025 Budget Review, in Parliament.
Through the first phase of Operation Vulindlela, bold and far-reaching reforms were implemented in the network sectors and the visa regime.
“As a result, numerous economic bottlenecks have eased, new investments unlocked, and the growth potential of the economy enabled. Yet the economy still faces constraints,” the Minister said.
Operation Vulindlela is a joint initiative of the Presidency and the National Treasury to accelerate the implementation of structural reforms and support economic recovery.
The unit monitors progress and actively supports implementation. Its aim is to fast-track the implementation of high impact reforms, addressing obstacles or delays to ensure execution on policy commitments.
The first phase of Operation Vulindlela aimed to reduce power cuts, fix the transport system, lower data costs, increase water supply, attract skills and support tourism.
The second phase of Operation Vulindlela, launched by President Cyril Ramaphosa earlier this month, will not only prioritise new areas for implementation but will also deepen the implementation of current reforms.
Upcoming reforms will focus on making it easier to find work and hire people – particularly by addressing spatial inequalities, using cities to drive economic activity and improve municipal service delivery.
The second phase will therefore focus on the following areas:
Seeing-through existing reforms in energy, water, logistics and in the visa regime.
Improving the performance of local government. This includes professionalising utilities, appointing suitably qualified people to senior positions, and reviewing the local government fiscal framework.
Harnessing digital transformation, in order to drive the adoption of digital technologies in government and build digital public infrastructure for use by all South Africans.
Addressing the apartheid legacy of spatial inequality. Reforms will include changes to housing policy and accelerating the release of publicly owned land and buildings. This will also entail clearing the backlog of title deeds for affordable housing, and a comprehensive regulatory review aimed at removing barriers to the development of low-cost housing.
Minister of Correctional Services, Dr Pieter Groenewald, says that the country’s Self-Sufficiency and Sustainability Strategic Framework (SSSF) not only creates employment opportunities for offenders in farms, bakeries, gardens, and abattoirs, but also empowers them.
“Enabling them to produce their own food has not only empowered the offenders but also resulted in considerable savings for the South African government, “ the Minister said.
The Minister believes this demonstrates how the United Nations Standard Minimum Rules for the Treatment of Prisoners, known as the Nelson Mandela Rules, can be effectively implemented.
The Minister believes that this is one of several successful examples demonstrating how the implementation of the Nelson Mandela Rules can lead to transformative outcomes.
These outcomes equip offenders with the necessary skills and experiences to become economically independent after their rehabilitation and reintegration into society. The Minister spoke at the 34th Session of the United Nations (UN) Commission on Crime Prevention and Criminal Justice (CCPCI) held in Vienna, Austria.
This as the international community also celebrated the 10th anniversary of the rules.
The revised Nelson Mandela Rules were adopted unanimously in December 2015 by the UN General Assembly and set out the minimum standards for good prison management, including ensuring that the rights of prisoners are respected.
The Minister also took the time to urge world leaders to honour the enduring legacy of President Nelson Mandela, who was in prison for 27 years for his activism against apartheid, and the ideals of dignity, justice, and human rights that he stood for.
In addition, he called for the international community to advance a more just, inclusive, and rehabilitative approach to incarceration.
“In light of rising global prison populations, systemic overcrowding, and the urgent need for more humane and effective penal systems, the 10th Anniversary of the Nelson Mandela Rules provides a timely platform to underscore the importance of prison and penal reform.”
The Minister also took the time to urge world leaders to honour the enduring legacy of President Mandela and the ideals of dignity, justice, and human rights that he stood for.
He also took the time to acknowledge the commemoration of the 10th Anniversary of the Nelson Mandela Rules at the UN General Assembly High-Level Debate, scheduled for 13 June 2025.
The theme of the debate is “A Second Chance: Addressing the Global Prison Challenge.”
The Minister expressed support for the Bangkok Rules, which complement the Nelson Mandela Rules by addressing the specific needs and circumstances of women in the criminal justice system, requiring gender-sensitive approaches to their treatment and rehabilitation.
“Together, these two sets of international standards promote a more inclusive, equitable, and human rights–based correctional system that respects the dignity of all individuals,” he explained.
He congratulated Japan on successfully adopting the Model Strategies to Reduce Reoffending, which further supports the Nelson Mandela Rules by ensuring that rehabilitation and reintegration principles are effectively realised beyond prison walls.
“We wish to express our sincere gratitude to the UNODC [United Nations Office on Drugs and Crime] for their efforts in promoting the practical application of the rules and encourage them to continue assisting Member States in seeking innovative ways to address prison management and penal reform.”
He concluded his talk by quoting Nelson Mandela, who aptly said, “No one truly knows a nation until one has been inside its jails. A nation should not be judged by how it treats its highest citizens, but its lowest ones.” – SAnews.gov.za
Work is underway to enhance government’s budget process after expenditure reviews identified tens of billions of rands in potential savings from poorly performing or inefficient programmes that can be redirected in future budgets.
“Going forward, underperforming programmes will be closed as the 2026 Medium-Term Expenditure Framework (MTEF) budget process undergoes redesign,” Finance Minister Enoch Godongwana said on Wednesday, during the re-tabling of the 2025 Budget Review in Parliament.
In its Budget Overview, National Treasury said if government achieves significant savings from implementing the recommendations of these reviews, it may mitigate the need for additional tax measures in the 2026 Budget.
Changes to improve the budget process will be implemented over time.
These reforms will be designed to strengthen government and institutional commitment to fiscal sustainability, refine budget prioritisation and the functioning of budget structures, and improve data systems and capital budgeting, monitoring and reporting.
“When an economy underperforms, as ours has over the last decade, it generates less tax revenue, while requiring increased social spending, widening budget deficits and accelerating debt accumulation.
“To be successful, our strategy of maintaining fiscal discipline, while investing in growth, demands that we prioritise high-impact expenditures. These are expenditures that deliver economic returns, while eliminating inefficiencies, wastage and leakage that too often plague government’s spending,” the Minister said.
To tackle this, National Treasury has undertaken expenditure reviews, looking at more than R300 billion in government spending since 2013, with the aim of identifying duplications, waste and inefficiencies.
“We found potential savings of R37.5 billion over time through improved oversight and operational changes through these reviews.
“New reforms will target infrastructure planning and implementation across provinces and municipalities. A data-driven approach to detect payroll irregularities will replace the more costly method of using censuses,” the Minister said.
This initiative will cross-reference administrative datasets to identify ghost workers and other anomalies across government departments.
“Part of the goal of these initiatives is to also remove the regulatory burden on business. To be successful, not just technical solutions are required. Sustained political backing, at the highest levels, is needed to overcome departmental resistance and to protect whistleblowers who expose irregularities and wastage.
“I am happy to say that this political backing has already come from President Cyril Ramaphosa, Deputy President Paul Mashatile, as well as my Cabinet colleagues.
“The President has also undertaken to establish a committee between the Presidency and Treasury to identify wasteful, inefficient and underperforming programmes.
“I call on Ministers, MECs, DGs, HoDs and every official responsible for public funds to embrace these efforts and play their part,” Godongwana said. – SAnews.gov.za
Global economic developments, including raised tariffs and trade wars, have lowered South Africa’s 2025 economic growth prospects from a predicted 1.9% Gross Domestic Product (GDP) growth in March down to a revised 1.4% in May.
This is according to Finance Minister Enoch Godongwana who delivered the Budget Speech in Parliament on Wednesday.
“[Much] has changed since our last appearance in this House. The most troubling changes are the global economic developments which have, in the short space of two months, already had a significant impact on the domestic economic outlook. The global economy is facing heightened trade tensions and elevated policy uncertainty with worrying economic consequences.
“As a small, open economy, South Africa is dependent on global trade and financial inflows. This makes us particularly exposed to the global economic developments that I have just outlined.
“As a result, we now estimate real GDP to grow at 1.4% in 2025. This is lower than the 1.9% we projected in March. Over the next two years, we project real GDP growth to rise moderately to 1.6% in 2026 and 1.8% in 2027,” Godongwana said.
Risks to South Africa’s economic outlook also remain elevated going into the future.
“These include the worsening global outlook, weaker-than-expected growth in the fourth quarter of 2024, the persistence of logistics constraints and higher borrowing costs.
“These developments are a vivid reminder that we must urgently turn the tide on our economic prospects and get our fiscal affairs in order,” he said.
South Africa’s downward revision is not unique with the global economy also reacting to trade tensions.
“The International Monetary Fund now projects global growth at 2.8% in 2025. This is 0.5 percentage points lower than the January estimate.
“Similarly, global trade is projected at 1.7% in 2025, which is also much lower than the January estimate. At the same time, inflation expectations are now above central bank targets in many advanced and emerging market economies. And new trade barriers may raise inflation and prolong the cycle of higher interest rates,” he noted.
With these challenges arising, government’s vision of fostering faster inclusive growth remains anchored on four pillars:
Maintaining macroeconomic stability,
Implementing structural reforms,
Improving state capability, and
Accelerating infrastructure investment.
“Faster, inclusive growth that creates jobs is the only path towards a more prosperous South Africa.
“Attaining this growth must be our national obsession. We all have a stake and a responsibility to work towards this goal,” Godongawana asserted. – SAnews.gov.za
Finance Minister Enoch Godongwana has told Parliament that addressing spending pressures to restore “critical frontline services and invest in infrastructure” is key to improving access to services such as health and education.
It is for this reason, Godongwana revealed, that over the medium term, government spending, excluding interest, will reach at least R6.69 trillion.
“The provincial education sector baseline over the 2025 MTEF [Medium-Term Expenditure Framework] is R1.04 trillion, and R9.5 billion will be added over the medium term to keep teachers in classrooms and hire more staff. An additional R10 billion has been added to the baseline as announced during the March 12 budget to expand access to early education is kept unchanged.
“This will increase the ECD [early childhood development] subsidy from R17 per child per day to R24. The extra funding will also support increased access to ECD for 700,000 more children, up to the age of five years,” the Minister said on Wednesday.
The budget for the provincial health sector will reach some R845 billion over the medium term to facilitate in part, the employment of hundreds of doctors who have already completed their in-service training.
“This budget will be increased by R20.8 billion over three years to employ 800 post-community service doctors and essential goods and services and reduction of accruals. This increase will also assist the sector in addressing personnel budget pressures,” he said.
Withdrawal of troops
Godongwana said funding for the deployment of South African National Defence Force (SANDF) troops in the Democratic Republic of the Congo will be reconfigured.
This in light of the announcement that the troops – who were there as part of the Southern African Development Community Mission in the Democratic Republic of Congo – will be withdrawing from the East African country.
“[The] R5 billion we had proposed to allocate to the Department of Defence for its participation in the SADC mission in the DRC is reduced. But the allocation for 2025/26 has been increased from R1.8 billion to R3 billion.
“This will cover the immediate costs of an orderly and safe withdrawal of our troops and mission equipment,” he said.
The spending allocations for early retirement, allocations for the Passenger Rail Agency of South Africa (PRASA) and the municipal trading entity reforms announced earlier this year remain “but at a slightly lower level than anticipated in the March 12 budget”.
“The spending choices we are proposing today demonstrate the government’s determination to bolster the state capability needed to deliver quality, reliable and sustainable core services,” Godongwana said. – SAnews.gov.za
Increases to all social grants, barring the Social Relief of Distress (SRD) grant, will not be affected by the re-tabled budget.
This according to National Treasury’s 2025 Budget Overview released on Wednesday.
The number of social grant beneficiaries – excluding those receiving the SRD grant – is expected to rise to 19.3 million people by March 2028.
The grant increases for 2025/26 are as follows:
Old age grant will increase from R2185 to R2315
War veterans grant will increase from R2205 to R2335
Disability grant will go up from R2185 to R2315
Foster care grant rises from R1180 to R1250
Care dependency grant will increase from R2185 to R2315
Child support grant will go up from R530 to R560
The grant-in-aid will increase from R530 to R560
“The increase in the social grants budget of R1.6 billion in 2025/26 remains. The temporary COVID-19 Social Relief of Distress grant will be extended until 31 March 2026, with R35.2 billion allocated to maintain the current R370 per month per beneficiary, including administration costs,” National Treasury said.
While delivering the Budget Speech in Parliament on Wednesday, Finance Minister Enoch Godongwana said government is “actively exploring various options to better integrate” the SRD grant with employment opportunities.
“This includes considering a job-seeker allowance and other measures, as part of the review of Active Labour Market Programmes.
“Our goal is to not only provide immediate relief. It is also to create pathways to employment, empowering our citizens to build better futures for themselves and their families,” Godongwana said. – SAnews.gov.za
Infrastructure investment remains a key component in driving economic growth and government has maintained its R1 trillion allocation for infrastructure investment over the medium term to support this growth.
This according to Finance Minister Enoch Godongwana, who delivered the Budget Speech in Parliament on Wednesday.
“[Quality] infrastructure investment expands the productive capacity of the economy and responds to the diverse needs of the citizens. Infrastructure is also a rich source of jobs in construction, engineering, and related industries across a range of skill levels.
“It is for these reasons that infrastructure is the fourth pillar of the growth strategy, and this budget demonstrates our resolve to change the composition of spending from consumption to investment. Allocations towards capital payments remain the fastest-growing area of spending by economic classification. Public infrastructure spending over three years will exceed the R1 trillion mark,” Godongwana said.
Spending will focus on “maintaining and repairing existing infrastructure, building new infrastructure, and acquiring equipment and machinery” primarily in transport and logistics, energy and water and sanitation.
“Of the R402 billion for transport and logistics, R93.1 billion is for the South African National Roads Agency to keep the 24 000-kilometer national road network in active maintenance and rehabilitation. R53.1 billion is for the maintenance and refurbishment of provincial roads.
“R66.3 billion is allocated to PRASA, out of which R18.2 billion is for the rolling stock fleet renewal programme and R12.3 billion is provisionally allocated for the renewal of the signalling system. The spending will sustain progress in rebuilding the infrastructure to provide affordable commuter rail services. This will enable PRASA to increase passenger trips from 60 million in 2024/25 to 186 million by the end of the MTEF [Medium Term Expenditure Framework] period.
“The energy sector will invest R219.2 billion on strengthening the electricity supply network, from generation to transmission and distribution. The water and sanitation sector will spend R156.3 billion on expanding our water resource and service infrastructure, including dams, bulk infrastructure to service mines, factories and farms,” Godongwana explained.
Reforms for private sector participation
The Minister announced that new regulations for public-private partnerships (PPPs), which were gazetted earlier this year, are expected to take effect next month.
“These will reduce the procedural complexity of undertaking PPPs, increasing the deal flow and allowing government to leverage its limited resources to fast-track infrastructure provision. The National Treasury has developed enabling guidelines and frameworks to support the new regulations.
“Specifically, the unsolicited proposals framework will create clear rules for managing proposals from the private sector. And the framework for fiscal commitments and contingent liabilities will strengthen fiscal risk governance. These guidelines and frameworks will be published in the next few weeks,” he said.
Furthermore, the process of issuing the first infrastructure bonds in 2025/26 remains in place.
“We are also exploring alternative financing instruments to allow pension funds, commercial banks, development banks and international financial institutions to participate in financing our infrastructure plans.
“These reforms are how we plan to leverage infrastructure investment to ease supply side constraints to the economy and improve access to social services the people get,” Godongwana said.
Employment boost
Meanwhile, in the 2025 Budget Overview, National Treasury said additional funding of some R8.8 billion has been allocated to public employment programmes (PEPs).
“Although the number of people employed was 16.8 million in the first quarter of 2025, South Africa’s unemployment rate remained very high at 32.9%.
“Public employment programmes are crucial to address persistently high unemployment,” National Treasury noted.
Key beneficiaries for the additional funding include:
The Department of Basic Education: R5.8 billion for the basic education schools employment initiative.
The Department of Sport, Arts and Culture: R350 000 000 for the creative industry stimulus.
The Department of Trade, Industry and Competition: R1.3 billion for the Social Employment Fund.
“In addition, National Treasury and the Presidency, working with other state institutions, have begun a comprehensive review of active labour market programmes, PEPs and the social support system to improve efficiency and effectiveness.
“With these efforts, government hopes to make significant strides in reducing unemployment,” the overview read. – SAnews.gov.za
President Cyril Ramaphosa’s engagement with United States President Donald Trump is expected to get underway at 5:30pm South African time – starting with a welcome of the visiting President at the Oval Office.
The Oval Office is the official workspace used exclusively by the President of the U.S. in Washington, D.C.
The two leaders aim to rebuild and strengthen their relations amid ongoing tensions, including the recent resettlement of white Afrikaners in America.
According to The Presidency of SA, President Trump is set to welcome South Africa’s Head of State at 5:30pm. This will be followed by President Ramaphosa signing the visitors’ book at 5:35pm.
At 5:45pm, the two leaders will participate in a working lunch, leading to their bilateral meeting scheduled for 6:45pm, which will include an opportunity for media interaction.
President Ramaphosa is expected to depart from the White House at 6:30pm.
Ahead of the meeting this afternoon, the President attended the 2025 Budget Speech virtually.
The South African delegation to Washington D.C. consists of several Cabinet Ministers, notable business figures, and prominent South Africans.
Included in the delegation are Minister of International Relations and Cooperation Ronald Lamola, Minister in the Presidency Khumbudzo Ntshavheni, Minister of Trade, Industry and Competition Ebrahim Patel, and Minister of Agriculture John Steenhuisen.
President Ramaphosa has leveraged President Trump’s passion for golf by inviting South African pro golfers Ernie Els and Retief Goosen to join the trip.
In addition, the President will be accompanied by Johann Rupert, the Founder of Richemont and Chairman of Remgro.
The delegation also includes Vice President of Business Unity South Africa (BUSA) Adrian Gore and President of the Congress of South African Trade Unions (COSATU) Zingiswa Losi.
They are currently in Washington, D.C. to offer strategic support to President Ramaphosa and the South African delegation.
Meanwhile, President Trump will be flanked by several key officials during his event.
These include Vice President JD Vance, Defence Secretary Pete Hegseth, Commerce Secretary Howard Lutnick, Deputy Secretary of State Christopher Landau, Chief of Staff Susie Wiles, Special Government Employee Elon Musk, and Dr Massad Boulos, who serves as a Senior Advisor for Africa as well as on Arab and Middle Eastern Affairs.
SAnews reported this morning that discussions will focus on revitalising bilateral relations, rethinking economic cooperation, and exploring new trade and investment opportunities that align with South Africa’s development goals.
President Ramaphosa arrived in the United States on Monday, landing at Andrews Air Force Base to a warm reception.
A red carpet was laid out, and ceremonial guards held the South African and United States flags as he was escorted to his motorcade, signaling the start of his visit with the honours fitting for a Head of State.
Upon his arrival at the hotel, he was greeted by the South African delegation and members of the media.
Since then, he has been engaging with his Ministers, including Mcebisi Jonas, the Special Envoy to the United States and the official representative of the President and the South African government.
Speaking to the media on Tuesday, the President appeared cheerful and optimistic.
He expressed that he was “ready and hopeful” for productive discussions at the Oval Office.
For the latest coverage on President Ramaphosa’s visit to the United States, follow SAgovnews on X, formerly known as Twitter. – SAnews.gov.za
Minister of Finance, Enoch Godongwana, will this afternoon, return to Parliament to re-table the 2025 Budget Review.
This decision follows the Minister’s recent announcement and subsequent request to the Speaker of the National Assembly to maintain the Value-Added Tax rate at its current level of 15 percent, reversing the previously proposed 0.5 percentage point increase presented in the 12 March budget.
“The revised budget will adhere to all established technical processes and consultations as set out in the Money Bills and Related Matters Act. This includes formal consultations with the Financial and Fiscal Commission, thorough consultations with all political parties within the Government of National Unity as well as Cabinet approval before presentation to Parliament,” National Treasury said.
Godongwana will deliver the 2025 Budget Speech during the National Assembly plenary at the Cape Town International Convention Centre at 2pm.
The National Treasury has worked on a new fiscal framework that will maintain the trajectory toward debt stabilisation, a crucial element in strengthening our public finances.
This process included:
Revising economic assumptions using the latest available data.
Generating a updated fiscal projects.
Recalculating revenue projections and tax implications.
Determining appropriate borrowing strategies.
Consolidating these elements into a coherent and sustainable fiscal framework.
This joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This includes those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. Since 2022, Western logistics entities and IT companies have faced an elevated risk of targeting by the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (85th GTsSS), military unit 26165—tracked in the cybersecurity community under several names (see “Cybersecurity Industry Tracking”). The actors’ cyber espionage-oriented campaign, targeting technology companies and logistics entities, uses a mix of previously disclosed tactics, techniques, and procedures (TTPs). The authoring agencies expect similar targeting and TTP use to continue.
Executives and network defenders at logistics entities and technology companies should recognize the elevated threat of unit 26165 targeting, increase monitoring and threat hunting for known TTPs and indicators of compromise (IOCs), and posture network defenses with a presumption of targeting.
This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors’ wide scale targeting of IP cameras in Ukraine and bordering NATO nations.
The following authors and co-sealers are releasing this CSA:
United States National Security Agency (NSA)
United States Federal Bureau of Investigation (FBI)
United Kingdom National Cyber Security Centre (NCSC-UK)
Germany Federal Intelligence Service (BND) Bundesnachrichtendienst
Germany Federal Office for Information Security (BSI) Bundesamt für Sicherheit in der Informationstechnik
Germany Federal Office for the Protection of the Constitution (BfV) Bundesamt für Verfassungsschutz
Czech Republic Military Intelligence (VZ) Vojenské zpravodajství
Czech Republic National Cyber and Information Security Agency (NÚKIB) Národní úřad pro kybernetickou a informační bezpečnost
Czech Republic Security Information Service (BIS) Bezpečnostní informační služba
Poland Internal Security Agency (ABW) Agencja Bezpieczeństwa Wewnętrznego
Poland Military Counterintelligence Service (SKW) Służba Kontrwywiadu Wojskowego
United States Cybersecurity and Infrastructure Security Agency (CISA)
United States Department of Defense Cyber Crime Center (DC3)
United States Cyber Command (USCYBERCOM)
Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)
Canadian Centre for Cyber Security (CCCS)
Danish Defence Intelligence Service (DDIS) Forsvarets Efterretningstjeneste
Estonian Foreign Intelligence Service (EFIS) Välisluureamet
Estonian National Cyber Security Centre (NCSC-EE) Küberturvalisuse keskus
French Cybersecurity Agency (ANSSI) Agence nationale de la sécurité des systèmes d’information
Netherlands Defence Intelligence and Security Service (MIVD) Militaire Inlichtingen- en Veiligheidsdienst
For over two years, the Russian GRU 85th GTsSS, military unit 26165—commonly known in the cybersecurity community as APT28, Fancy Bear, Forest Blizzard, BlueDelta, and a variety of other identifiers—has conducted this campaign using a mix of known tactics, techniques, and procedures (TTPs), including reconstituted password spraying capabilities, spearphishing, and modification of Microsoft Exchange mailbox permissions. In late February 2022, multiple Russian state-sponsored cyber actors increased the variety of cyber operations for purposes of espionage, destruction, and influence—with unit 26165 predominately involved in espionage. [1] As Russian military forces failed to meet their military objectives and Western countries provided aid to support Ukraine’s territorial defense, unit 26165 expanded its targeting of logistics entities and technology companies involved in the delivery of aid. These actors have also targeted Internet-connected cameras at Ukrainian border crossings to monitor and track aid shipments. Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 17. See Appendix A: MITRE ATT&CK tactics and techniques for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques. This advisory uses the MITRE D3FEND® framework, version 1.0.
Description of Targets
The GRU unit 26165 cyber campaign against Western logistics providers and technology companies has targeted dozens of entities, including government organizations and private/commercial entities across virtually all transportation modes: air, sea, and rail. These actors have targeted entities associated with the following verticals within NATO member states, Ukraine, and at international organizations:
Defense Industry
Transportation and Transportation Hubs (ports, airports, etc.)
Maritime
Air Traffic Management
IT Services
In the course of the targeting lifecycle, unit 26165 actors identified and conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access [T1199].
The actors also conducted reconnaissance on at least one entity involved in the production of industrial control system (ICS) components for railway management, though a successful compromise was not confirmed [TA0043].
The countries with targeted entities include the following, as illustrated in Figure 1:
Bulgaria
Czech Republic
France
Germany
Greece
Italy
Moldova
Netherlands
Poland
Romania
Slovakia
Ukraine
United States
Figure 1: Countries with Targeted Entities
Initial Access TTPs
To gain initial access to targeted entities, unit 26165 actors used several techniques to gain initial access to targeted entities, including (but not limited to):
The actors abused vulnerabilities associated with a range of brands and models of small office/home office (SOHO) devices to facilitate covert cyber operations, as well as proxy malicious activity via devices with geolocation in proximity to the target [T1665]. [2]
Credential Guessing/Brute Force
Unit 26165 actors’ credential guessing [T1110.001] operations in this campaign exhibit some similar characteristics to those disclosed in the previous CSA “Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments.” [3] Based on victim network investigations, the current iteration of this TTP employs a similar blend of anonymization infrastructure, including the use of Tor and commercial VPNs [T1090.003]. The actors frequently rotated the IP addresses used to further hamper detection. All observed connections were made via encrypted TLS [T1573].
Spearphishing
GRU unit 26165 actors’ spearphishing emails included links [T1566.002] leading to fake login pages impersonating a variety of government entities and Western cloud email providers’ webpages. These webpages were typically hosted on free third-party services or compromised SOHO devices and often used legitimate documents associated with thematically similar entities as lures. The subjects of spearphishing emails were diverse and ranged from professional topics to adult themes. Phishing emails were frequently sent via compromised accounts or free webmail accounts [T1586.002, T1586.003]. The emails were typically written in the target’s native language and sent to a single targeted recipient.
Some campaigns employed multi-stage redirectors [T1104] verifying IP-geolocation [T1627.001] and browser fingerprints [T1627] to protect credential harvesting infrastructure or provide multifactor authentication (MFA) [T1111] and CAPTCHA relaying capabilities [T1056]. Connecting endpoints failing the location checks were redirected to a benign URL [T1627], such as msn.com. Redirector services used include:
Webhook[.]site
FrgeIO
InfinityFree
Dynu
Mocky
Pipedream
Mockbin[.]org
The actors also used spearphishing to deliver malware (including HEADLACE and MASEPIE) executables [T1204.002] delivered via third-party services and redirectors [T1566.002], scripts in a mix of languages [T1059] (including BAT [T1059.003] and VBScript [T1059.005]) and links to hosted shortcuts [T1204.001].
CVE Usage
Throughout this campaign, GRU unit 26165 weaponized an Outlook NTLM vulnerability (CVE-2023-23397) to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations [T1187]. [4],[5] These actors also used a series of Roundcube CVEs (CVE-2020-12641, CVE-2020-35730, and CVE-2021-44026) to execute arbitrary shell commands [T1059], gain access to victim email accounts, and retrieve sensitive data from email servers [T1114].
Since at least fall 2023, the actors leveraged a WinRAR vulnerability (CVE-2023-38831) allowing for the execution of arbitrary code embedded in an archive as a means of initial access [T1659]. The actors sent emails with malicious attachments [T1566.001] or embedded hyperlinks [T1566.002] that downloaded a malicious archive prepared using this CVE.
Post-Compromise TTPs
After an initial compromise using one of the above techniques, unit 26165 actors conducted contact information reconnaissance to identify additional targets in key positions [T1589.002]. The actors also conducted reconnaissance of the cybersecurity department [T1591], individuals responsible for coordinating transport [T1591.004], and other companies cooperating with the victim entity [T1591.002].
The actors used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment [TA0008]. Multiple Impacket scripts were used as .exe files, in addition to the python versions, depending on the victim environment. The actors also moved laterally within the network using Remote Desktop Protocol (RDP) [T1021.001] to access additional hosts and attempt to dump Active Directory NTDS.dit domain databases [T1003.003] using native Active Directory Domain Services commands, such as in Figure 2: Example Active Directory Domain Services command:
C:Windowssystem32ntdsutil.exe "activate instance ntds" ifm "create full C:temp[a-z]{3}" quit quit
Figure 2: Example Active Directory Domain Services command
Additionally, GRU unit 26165 actors used the tools Certipy and ADExplorer.exe to exfiltrate information from the Active Directory. The actors installed python [T1059.006] on infected machines to enable the execution of Certipy. Accessed files were archived in .zip files prior to exfiltration [T1560]. The actors attempted to exfiltrate archived data via a previously dropped OpenSSH binary [T1048].
Incident response investigations revealed that the actors would take steps to locate and exfiltrate lists of Office 365 users and set up sustained email collection. The actors used manipulation of mailbox permissions [T1098.002] to establish sustained email collection at compromised logistics entities, as detailed in a Polish Cybercommand blog. [6]
After initial authentication, unit 26165 actors would change accounts’ folder permissions and enroll compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access [T1556.006]. The actors leveraged python scripts to retrieve plaintext passwords via Group Policy Preferences [T1552.006] using Get-GPPPassword.py and a modified ldap-dump.py to enumerate the Windows environment [T1087.002] and conduct a brute force password spray [T1110.003] via Lightweight Directory Access Protocol (LDAP). The actors would additionally delete event logs through the wevtutil utility [T1070.001].
After gaining initial access to the network, the actors pursued further access to accounts with access to sensitive information on shipments, such as train schedules and shipping manifests. These accounts contained information on aid shipments to Ukraine, including:
sender,
recipient,
train/plane/ship numbers,
point of departure,
destination,
container registration numbers,
travel route, and
cargo contents.
In at least one instance, the actors attempted to use voice phishing [T1566.004] to gain access to privileged accounts by impersonating IT staff.
Malware
Unit 26165’s use of malware in this campaign ranged from gaining initial access to establishing persistence and exfiltrating data. In some cases, the attack chain resulted in multiple pieces of malware being deployed in succession. The actors used dynamic link library (DLL) search order hijacking [T1574.001] to facilitate malware execution. There were a number of known malware variants tied to this campaign against logistics sector victims, including:
While other malware variants, such as OCEANMAP and STEELHOOK, [8] were not directly observed targeting logistics or IT entities, their deployment against victims in other sectors in Ukraine and other Western countries suggest that they could be deployed against logistics and IT entities should the need arise.
Persistence
In addition to the abovementioned mailbox permissions abuse, unit 26165 actors also used scheduled tasks [T1053.005], run keys [T1547.001], and placed malicious shortcuts [T1547.009] in the startup folder to establish persistence.
Exfiltration
GRU unit 26165 actors used a variety of methods for data exfiltration that varied based on the victim environment, including both malware and living off the land binaries. PowerShell commands [T1059.001] were often used to prepare data for exfiltration; for example, the actors prepared zip archives [T1560.001] for upload to their own infrastructure.
The actors also used server data exchange protocols and Application Programming Interfaces (APIs) such as Exchange Web Services (EWS) and Internet Message Access Protocol (IMAP) [T1114.002] to exfiltrate data from email servers. In multiple instances, the actors used periodic EWS queries [T1119] to collect new emails sent and received since the last data exfiltration [T1029]. The actors typically used infrastructure in close geographic proximity to the victim. Long gaps between exfiltration, the use of trusted and legitimate protocols, and the use of local infrastructure allowed for long-term collection of sensitive data to go undetected.
Connections to Targeting of IP Cameras
In addition to targeting logistics entities, unit 26165 actors likely used access to private cameras at key locations, such as near border crossings, military installations, and rail stations, to track the movement of materials into Ukraine. The actors also used legitimate municipal services, such as traffic cams.
The actors targeted Real Time Streaming Protocol (RTSP) servers hosting IP cameras primarily located in Ukraine as early as March 2022 in a large-scale campaign, which included attempts to enumerate devices [T1592] and gain access to the cameras’ feeds [T1125]. Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers, primarily hosting IP cameras [T1090.002]. The DESCRIBE requests were crafted to obtain access to IP cameras located on logically distinct networks from that of the routers that received the request. The requests included Base64-encoded credentials for the RTSP server, which included publicly documented default credentials and likely generic attempts to brute force access to the devices [T1110]. An example of an RTSP request is shown in Figure 3.
Successful RTSP 200 OK responses contained a snapshot of the IP camera’s image and IP camera metadata such as video codec, resolution, and other properties depending on the IP camera’s configuration.
From a sample available to the authoring agencies of over 10,000 cameras targeted via this effort, the geographic distribution of victims showed a strong focus on cameras in Ukraine and border countries, as shown in Table 1:
Table 1: Geographic distribution of targeted IP cameras
Country
Percentage of Total Attempts
Ukraine
81.0%
Romania
9.9%
Poland
4.0%
Hungary
2.8%
Slovakia
1.7%
Others
0.6%
Mitigation Actions
General Security Mitigations
Architecture and Configuration
Employ appropriate network segmentation [D3-NI] and restrictions to limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions [D3-AMED].
Consider Zero Trust principles when designing systems. Base product choices on how those products can solve specific risks identified as part of the end-to-end design. [9]
Ensure that host firewalls and network security appliances (e.g., firewalls) are configured to only allow legitimately needed data flows between devices and servers to prevent lateral movement [D3-ITF]. Alert on attempts to connect laterally between host devices or other unusual data flows.
Use automated tools to audit access logs for security concerns and identify anomalous access requests [D3-RAPA].
For organizations using on-premises authentication and email services, block and alert on NTLM/SMB requests to external infrastructure [D3-OTF].
Utilize endpoint, detection, and response (EDR) and other cybersecurity solutions on all systems, prioritizing high value systems with large amounts of sensitive data such as mail servers and domain controllers [D3-PM] first.
Perform threat and attack modeling to understand how sensitive systems may be compromised within an organization’s specific architecture and security controls. Use this to develop a monitoring strategy to detect compromise attempts and select appropriate products to enact this strategy.
Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly [D3-SFA].
Enable optional security features in Windows to harden endpoints and mitigate initial access techniques [D3-AH]:
Enable attack surface reduction rules to prevent executable content from email [D3-ABPI].
Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA% [D3-EAL].
Unless users are involved in the development of scripts, limit the local execution of scripts (such as batch scripts, VBScript, JScript/JavaScript, and PowerShell [10]) to known scripts [D3-EI], and audit execution attempts.
Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode [D3-ACH].
Where feasible, implement allowlisting for applications and scripts to limit execution to only those needed for authorized activities, blocking all others by default [D3-EAL].
Consider using open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters [D3-PSA].
Use services that provide enhanced browsing services and safe link checking [D3-URA]. Significant reductions in successful spearphishing attempts were noted when email providers began offering link checking and automatic file detonation to block malicious content.
Where possible, block logins from public VPNs, including exit nodes in the same country as target systems, or, if they need to be allowed, alert on them for further investigation. Most organizations should not need to allow incoming traffic, especially logins to systems, from VPN services [D3-NAM].
Educate users to only use approved corporate systems for relevant government and military business and avoid the use of personal accounts on cloud email providers to conduct official business. Network administrators should also audit both email and web request logs to detect such activity.
Many organizations may not need to allow outgoing traffic to hosting and API mocking services, which are frequently used by GRU unit 26165. Organizations should consider alerting on or blocking the following services, with exceptions allowlisted for legitimate activity [D3-DNSDL].
*.000[.]pe
*.1cooldns[.]com
*.42web[.]io
*.4cloud[.]click
*.accesscan[.]org
*.bumbleshrimp[.]com
*.camdvr[.]org
*.casacam[.]net
*.ddnsfree[.]com
*.ddnsgeek[.]com
*.ddnsguru[.]com
*.dynuddns[.]com
*.dynuddns[.]net
*.free[.]nf
*.freeddns[.]org
*.frge[.]io
*.glize[.]com
*.great-site[.]net
*.infinityfreeapp[.]com
*.kesug[.]com
*.loseyourip[.]com
*.lovestoblog[.]com
*.mockbin[.]io
*.mockbin[.]org
*.mocky[.]io
*.mybiolink[.]io
*.mysynology[.]net
*.mywire[.]org
*.ngrok[.]io
*.ooguy[.]com
*.pipedream[.]net
*.rf[.]gd
*.urlbae[.]com
*.webhook[.]site
*.webhookapp[.]com
*.webredirect[.]org
*.wuaze[.]com
Heuristic detections for web requests to new subdomains, including of the above providers, may uncover malicious phishing activity [D3-DNRA]. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims.
Identity and Access Management
Organizations should take measures to ensure strong access controls and mitigate against common credential theft techniques:
Use MFA with strong factors, such as passkeys or PKI smartcards, and require regular re-authentication [D3-MFA]. [11], [12] Strong authentication factors are not guessable using dictionary techniques, so they resist brute force attempts.
Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts [D3-JFAPA].
Separate privileged accounts by role and alert on misuse of privileged accounts [D3-UAP]. For example, email administrator accounts should be different from domain administrator accounts.
Reduce reliance on passwords; instead, consider using services like single sign-on [D3-TBA].
For organizations using on-premises authentication and email services, plan to disable NTLM entirely and migrate to more robust authentication processes such as PKI certificate authentication.
Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts [D3-CH]. [13]
Use account throttling or account lockout [D3-ANET]:
Throttling is preferred to lockout. Throttling progressively increases time delay between successive login attempts.
Account lockout can leave legitimate users unable to access their accounts and requires access to an account recovery process.
Account lockout can provide a malicious actor with an easy way to launch a Denial of Service (DoS).
If using lockout, then allowing 5 to 10 attempts before lockout is recommended.
Use a service to check for compromised passwords before using them [D3-SPP]. For example, “Have I Been Pwned” can be used to check whether a password has been previously compromised without disclosing the potential password.
Change all default credentials [D3-CRO] and disable protocols that use weak authentication (e.g., clear-text passwords or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication [D3-ACH] [D3-ET]. Always configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. [13]
IP Camera Mitigations
The following mitigation techniques for IP cameras can be used to defend against this type of malicious activity:
Ensure IP cameras are currently supported. Replace devices that are out of support.
Apply security patches and firmware updates to all IP cameras [D3-SU].
Disable remote access to the IP camera, if unnecessary [D3-ITF].
Ensure cameras are protected by a security appliance, if possible, such as by using a firewall to prevent communication with the camera from IP addresses not on an allowlist [D3-NAM].
If remote access to IP camera feeds is required, ensure authentication is enabled [D3-AA] and use a VPN to connect remotely [D3-ET]. Use MFA for management accounts if supported [D3-MFA].
Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers [D3-NI].
Turn off other ports/services not in use (e.g., FTP, web interface, etc.) [D3-ACH].
If supported, enable authenticated RTSP access only [D3-AA].
Review all authentication activity for remote access to make sure it is valid and expected [D3-UBA]. Investigate any unexpected or unusual activity.
Audit IP camera user accounts to ensure they are an accurate reflection of your organization and that they are being used as expected [D3-UAP].
Configure, tune, and monitor logging—if available—on the IP camera.
Indicators of Compromise (IOCs)
Note: Specific IoCs may no longer be actor controlled, may themselves be compromised infrastructure or email accounts, or may be shared infrastructure such as public VPN or Tor exit nodes. Care should be taken when basing triaging logs or developing detection rules on these indicators. GRU unit 26165 almost certainly uses extensive further infrastructure and TTPs not specifically listed in this report.
Utilities and scripts
Legitimate utilities
Unauthorized or unusual use of the following legitimate utilities can be an indication of a potential compromise:
ntdsutil – A legitimate Windows executable used by threat actors to export contents of Active Directory
wevtutil – A legitimate Windows executable used by threat actors to delete event logs
vssadmin – A legitimate Windows executable possibly used by threat actors to make a copy of the server’s C: drive
ADexplorer – A legitimate window executable to view, edit, and backup Active Directory Certificate Services
OpenSSH – The Windows version of a legitimate open source SSH client
schtasks – A legitimate Windows executable used to create persistence using scheduled tasks
whoami – A legitimate Windows executable used to retrieve the name of the current user
tasklist – A legitimate Windows executable used to retrieve the list of running processes
hostname – A legitimate Windows executable used to retrieve the device name
arp – A legitimate Windows executable used to retrieve the ARP table for mapping the network environment
systeminfo – A legitimate Windows executable used to retrieve a comprehensive summary of device and operating system information
net – A legitimate Windows executable used to retrieve detailed user information
wmic – A legitimate Windows executable used to interact with Windows Management Instrumentation (WMI), such as to retrieve letters assigned to logical partitions on storage drives
cacls – A legitimate Windows executable used to modify permissions on files
icacls – A legitimate Windows executable used to modify permissions to files and handle integrity levels and ownership
ssh – A legitimate Windows executable used to establish network shell connections
reg – A legitimate Windows executable used to add to or modify the system registry
Note: Additional heuristics are needed for effective hunting for these and other living off the land (LOTL) binaries to avoid being overwhelmed by false positives if these legitimate management tools are used regularly. See the joint guide, Identifying and Mitigating Living Off the Land Techniques, for guidance on developing a multifaceted cybersecurity strategy that enables behavior analytics, anomaly detection, and proactive hunting, which are part of a comprehensive approach to mitigating cyber threats that employ LOTL techniques.
Malicious scripts
Certipy – An open source python tool for enumerating and abusing Active Directory Certificate Services
Get-GPPPassword.py – An open source python script for finding insecure passwords stored in Group Policy Preferences
ldap-dump.py – A script for enumerating user accounts and other information in Active Directory
Hikvision backdoor string: “YWRtaW46MTEK”
Suspicious command lines
While the following utilities are legitimate, and using them with the command lines shown may also be legitimate, these command lines are often used during malicious activities and could be an indication of a compromise:
edge.exe “-headless-new -disable-gpu”
ntdsutil.exe “activate instance ntds” ifm “create full C:temp[a-z]{3}” quit quit
Disclaimer: These IP addresses date June 2024 through August 2024. The authoring agencies recommend organizations investigate or vet these IP addresses prior to taking action, such as blocking.
June 2024
July 2024
August 2024
192[.]162[.]174[.]94
207[.]244[.]71[.]84
31[.]135[.]199[.]145
79[.]184[.]25[.]198
91[.]149[.]253[.]204
103[.]97[.]203[.]29
162[.]210[.]194[.]2
31[.]42[.]4[.]138
79[.]185[.]5[.]142
91[.]149[.]254[.]75
209[.]14[.]71[.]127
46[.]112[.]70[.]252
83[.]10[.]46[.]174
91[.]149[.]255[.]122
109[.]95[.]151[.]207
46[.]248[.]185[.]236
83[.]168[.]66[.]145
91[.]149[.]255[.]19
64[.]176[.]67[.]117
83[.]168[.]78[.]27
91[.]149[.]255[.]195
64[.]176[.]69[.]196
83[.]168[.]78[.]31
91[.]221[.]88[.]76
64[.]176[.]70[.]18
83[.]168[.]78[.]55
93[.]105[.]185[.]139
64[.]176[.]70[.]238
83[.]23[.]130[.]49
95[.]215[.]76[.]209
64[.]176[.]71[.]201
83[.]29[.]138[.]115
138[.]199[.]59[.]43
70[.]34[.]242[.]220
89[.]64[.]70[.]69
147[.]135[.]209[.]245
70[.]34[.]243[.]226
90[.]156[.]4[.]204
178[.]235[.]191[.]182
70[.]34[.]244[.]100
91[.]149[.]202[.]215
178[.]37[.]97[.]243
70[.]34[.]245[.]215
91[.]149[.]203[.]73
185[.]234[.]235[.]69
70[.]34[.]252[.]168
91[.]149[.]219[.]158
192[.]162[.]174[.]67
70[.]34[.]252[.]186
91[.]149[.]219[.]23
194[.]187[.]180[.]20
70[.]34[.]252[.]222
91[.]149[.]223[.]130
212[.]127[.]78[.]170
70[.]34[.]253[.]13
91[.]149[.]253[.]118
213[.]134[.]184[.]167
70[.]34[.]253[.]247
91[.]149[.]253[.]198
70[.]34[.]254[.]245
91[.]149[.]253[.]20
Detections
Customized NTLM listener
rule APT28_NTLM_LISTENER {
meta:
description = "Detects NTLM listeners including APT28's custom one"
( any of ($sysinternals_*) and any of ($psexec_*) )
or
( 2 of ($network_*) and 2 of ($psexec_*))
)
}
The cybersecurity industry provides overlapping cyber threat intelligence, IOCs, and mitigation recommendations related to GRU unit 26165 cyber actors. While not all encompassing, the following are the most notable threat group names related under MITRE ATT&CK G0007 and commonly used within the cybersecurity community:
Note: Cybersecurity companies have different methods of tracking and attributing cyber actors, and this may not be a 1:1 correlation to the U.S. government’s understanding for all activity related to these groupings.
Further Reference
To search for the presence of malicious email messages targeting CVE-2023-23397, network defenders may consider using the script published by Microsoft: https://aka.ms/CVE-2023-23397ScriptDoc.
The information and opinions contained in this document are provided "as is" and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.
Purpose
This document was developed in furtherance of the authoring agencies’ cybersecurity missions, including their responsibilities to identify and disseminate threats and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.
Contact
United States organizations
National Security Agency (NSA)
Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI)
U.S. organizations are encouraged to reporting suspicious or criminal activity related to information in this advisory to CISA via the agency’s Incident Reporting System, its 24/7 Operations Center (report@cisa.gov or 888-282-0870), or your local FBI field office. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment user for the activity; the name of the submitting company or organization; and a designated point of contact.
Department of Defense Cyber Crime Center (DC3)
United Kingdom organizations
Germany organizations
Czech Republic organizations
Poland organizations
Australian organizations
Visit cyber.gov.au or call 1300 292 371 (1300 CYBER 1) to report cybersecurity incidents and access alerts and advisories.
Canadian organizations
Estonia organizations
French organizations
French organizations are encouraged to report suspicious activity or incident related to information found in this advisory by contacting ANSSI/CERT-FR by email at cert-fr@ssi.gouv.fr or by phone at: 3218 or +33 9 70 83 32 18.
See Table 2 through Table 14 for all the threat actor tactics and techniques referenced in this advisory.
Conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access.
Sent requests with Base64-encoded credentials for the RTSP server, which included publicly documented default credentials, and likely were generic attempts to brute force access to the devices.
Abused SOHO devices to facilitate covert cyber operations, as well as proxy malicious activity, via devices with geolocation in proximity to the target.
External actors could send specially crafted emails that cause a connection from the victim to an untrusted location of the actor’s control, leaking the Net-NTLMv2 hash of the victim that the actor could then relay to another service to authenticate as the victim.
An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16 and 1.4.x before 1.4.10, where a plaintext email message with JavaScript in a link reference element is mishandled by linkref_addindex in rcube_string_replacer.php.
Roundcube Webmail before 1.4.4 allows arbitrary code execution via shell metacharacters in a configuration setting for im_convert_path or im_identify_path in rcube_image.php.
Appendix C: MITRE D3FEND Countermeasures
Table 16: MITRE D3FEND countermeasures
Countermeasure Title
ID
Details
Network Isolation
Employ appropriate network segmentation. Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers.
Access Mediation
Limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions. Configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access.
Inbound Traffic Filtering
Implement host firewall rules to block connections from other devices on the network, other than from authorized management devices and servers, to prevent lateral movement.
Resource Access Pattern Analysis
Use automated tools to audit access logs for security concerns and identify anomalous access requests.
Outbound Traffic Filtering
Block NTLM/SMB requests to external infrastructure.
Platform Monitoring
Install EDR/logging/cybersecurity solutions onto high value systems with large amounts of sensitive data such as mail servers and domain controllers.
System File Analysis
Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly.
Application Hardening
Enable optional security features in Windows to harden endpoints and mitigate initial access techniques.
Application-based Process Isolation
Enable attack surface reduction rules to prevent executable content from email.
Executable Allowlisting
Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA%.
Execution Isolation
Unless users are involved in the development of scripts, limit the execution of scripts (such as batch, JavaScript, and PowerShell) to known scripts.
Application Configuration Hardening
Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode. Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication. Turn off other ports/services not in use (e.g., FTP, web interface, etc.).
Process Spawn Analysis
Use open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters.
URL Reputation Analysis
Use services that provide enhanced browsing services and safe link checking.
Network Access Mediation
Do not allow incoming traffic, especially logins to systems, from public VPN services. Where possible, logins from public VPNs, including exit nodes in the same country as target systems, should be blocked or, if allowed, alerted on for further investigation. Ensure cameras and other Internet of Things devices are protected by a security appliance, if possible.
Do not allow outgoing traffic to hosting and API mocking services frequently used by malicious actors.
Domain Name Reputation Analysis
Heuristic detections for web requests to new subdomains may uncover malicious phishing activity. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims.
Multi-factor Authentication
Use MFA with strong factors and require regular re-authentication, especially for management accounts.
Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts.
User Account Permissions
Separate privileged accounts by role and alert on misuse of privileged accounts. Audit user accounts on all devices to ensure they are an accurate reflection of your organization and that they are being used as expected.
Token-based Authentication
Reduce reliance on passwords; instead, consider using services like single sign-on.
Credential Hardening
Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts.
Authentication Event Threshholding
Use account throttling or account lockout. Throttling progressively increases time delay between successive login attempts. If using account lockout, allow between 5 to 10 attempts before lockout.
Strong Password Policy
Use a service to check for compromised passwords before using them.
Credential Rotation
Change all default credentials.
Encrypted Tunnels
Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols). Use a VPN for remote connections to devices.
Software Update
Apply security patches and firmware updates to all devices. Ensure devices are currently supported. Replace devices that are end-of-life.
Agent Authentication
Ensure authentication is enabled for remote access to devices. If supported on IP cameras, enable authenticated RTSP access only.
User Behavior Analysis
Review all authentication activity for remote access to make sure it is valid and expected. Investigate any unexpected or unusual activity.
In coordination with the Federal Government of Somalia, U.S. Africa Command (AFRICOM) conducted airstrikes against al Shabaab on May 17, 2025.
The airstrikes occurred approximately 200 km north of Mogadishu near Mabaax, Somalia.
Al Shabaab has proven both its will and capability to attack U.S. forces.
AFRICOM, alongside the Federal Government of Somalia and Somali Armed Forces, continues to take action to degrade al Shabaab’s ability to plan and conduct attacks that threaten the U.S. homeland, our forces, and our citizens abroad.
Specific details about units and assets will not be released to ensure continued operations security.
VICTORIA, Seychelles, May 21, 2025 (GLOBE NEWSWIRE) — MEXC, a leading global cryptocurrency exchange, today announced an industry-disrupting partnership with The Open Network (TON) that introduces a $1 million reward pool campaign and fundamentally challenges established exchange revenue models. Launching today and running through June 20, the “TON Triumph” campaign eliminates all trading fees on TON pairs while offering staking returns that dwarf typical yields by up to 100 times.
In an unprecedented move that signals a significant shift in exchange competition strategies, MEXC will offer new users access to staking opportunities with up to 400% APR on TON tokens—creating what analysts describe as the most aggressive user acquisition campaign in the cryptocurrency exchange sector this year.
“This partnership represents a strategic inflection point for both the TON ecosystem and the broader exchange landscape,” said Tracy Jin, COO of MEXC. “By eliminating all typical entry costs into TON trading for a full month while simultaneously offering returns that outpace all competitors, we’re not simply running a promotion—we’re fundamentally changing how users engage with emerging Layer-1 ecosystems.”
Campaign Transforms Market Access and Investment Returns
The 30-day campaign introduces multiple disruptive elements that directly challenge other exchanges’ TON market dominance:
Zero-Fee Trading Structure: Complete elimination of fees on TON/USDT, TON/USDC, and TON/EUR spot pairs, TONUSDT futures, and all TON/USDE network withdrawals—removing traditional revenue mechanisms that have defined exchange business models.
Industry-Leading APR: New users can stake TON tokens to earn up to 400% APR, positioning the offering at 100 times higher than typical cryptocurrency staking returns and several hundred times above traditional banking products.
Democratized Trading Access: Zero-fee structure gives retail traders access to the same economics previously available only to professional and institutional traders, significantly leveling the playing field.
Limited-Time, First-Come Allocation: High-yield staking pools operate on a first-come, first-served basis with participants limited to 250 TON tokens per user, creating immediate urgency for early participation.
The campaign also includes passive rewards of up to 8% daily APR for USDE holders, spot trading rewards from a pool of 32,500 TON, and a futures trading competition with 100,000 USDT in bonuses.
TON Ecosystem Expansion and Infrastructure Advancement
This partnership is pivotal for The Open Network, which continues to gain momentum through its connection to Telegram’s 900+ million users and growing developer ecosystem.
The collaboration represents a significant leap forward in TON’s accessibility and adoption curve. By drastically reducing barriers to entry while providing exceptional incentives, the campaign accelerates the integration of new participants into the TON ecosystem, coinciding precisely with the network’s rapidly expanding technical capabilities and use cases.
The campaign also showcases MEXC’s platform capabilities, demonstrating advanced infrastructure that can handle zero-fee trading across multiple markets simultaneously while managing high-volume staking operations with variable APR structures.
Time-Sensitive Opportunity with Global Access
The $1 million in rewards is available exclusively during the 30-day window, with certain high-value components like the 400% APR staking pool starting on May 21th and operating on a capped allocation basis. MEXC has created a streamlined onboarding process that allows new users to complete registration and KYC verification in minutes, with the campaign accessible to eligible participants globally through both web and mobile interfaces.
About MEXC Founded in 2018, MEXC is committed to being “Your Easiest Way to Crypto.” Serving over 40 million users across 170+ countries, MEXC is known for its broad selection of trending tokens, everyday airdrop opportunities, and low trading fees. Our user-friendly platform is designed to support both new traders and experienced investors, offering secure and efficient access to digital assets. MEXC prioritizes simplicity and innovation, making crypto trading more accessible and rewarding. MEXC Official Website| X | Telegram |How to Sign Up on MEXC
About TON The Open Network (TON) is a fully decentralized layer-1 blockchain designed for mass adoption. Originally conceived by Telegram and now developed by the open TON Community, the network offers exceptional scalability, accessibility, and ease of use.
Risk Disclaimer: The information provided in this article regarding cryptocurrencies does not constitute investment advice. Given the highly volatile nature of the cryptocurrency market, investors are encouraged to carefully assess market fluctuations, the fundamentals of projects, and potential financial risks before making any trading decisions.
Disclaimer: This is a paid post and is provided by MEXC. The statements, views, and opinions expressed in this content are solely those of the content provider and do not necessarily reflect the views of this media platform or its publisher. We do not endorse, verify, or guarantee the accuracy, completeness, or reliability of any information presented. We do not guarantee any claims, statements, or promises made in this article. This content is for informational purposes only and should not be considered financial, investment, or trading advice. Investing in crypto and mining-related opportunities involves significant risks, including the potential loss of capital. It is possible to lose all your capital. These products may not be suitable for everyone, and you should ensure that you understand the risks involved. Seek independent advice if necessary. Speculate only with funds that you can afford to lose. Readers are strongly encouraged to conduct their own research and consult with a qualified financial advisor before making any investment decisions. However, due to the inherently speculative nature of the blockchain sector—including cryptocurrency, NFTs, and mining—complete accuracy cannot always be guaranteed. Neither the media platform nor the publisher shall be held responsible for any fraudulent activities, misrepresentations, or financial losses arising from the content of this press release. In the event of any legal claims or charges against this article, we accept no liability or responsibility. Globenewswire does not endorse any content on this page.
Legal Disclaimer: This media platform provides the content of this article on an “as-is” basis, without any warranties or representations of any kind, express or implied. We assume no responsibility for any inaccuracies, errors, or omissions. We do not assume any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information presented herein. Any concerns, complaints, or copyright issues related to this article should be directed to the content provider mentioned above.
Source: Organization for Security and Co-operation in Europe – OSCE
Headline: Model OSCE in Andorra: Empowering young professionals to engage in peace and security
From 19 to 21 May, the OSCE Secretariat in collaboration with the Government of Andorra, the US Mission to the OSCE, and University of Andorra co-organized the first-ever Model OSCE in Sant Julià de Lòria, Andorra.
The three-day event brought together 25 young people with diverse backgrounds from Andorra, Algeria, the United States of America, Japan and Morocco, offering them a unique opportunity to strengthen their soft skills and deepen their understanding of peace and security issues through peer-to-peer learning on multilateralism, international relations and diplomacy.
The programme featured sessions on the OSCE’s mandate, history, structure, and decision-making processes, as well as its co-operation with OSCE Partners. It also included discussions on Finland’s priorities on 2025 Chairpersonship, the Youth and Security Agenda, the role of women in diplomacy and multilateralism, and hands-on training in negotiation and mediation.
In her opening remarks, Andorra’s Minister of Foreign Affairs, H.E. Imma Tor Faus emphasized the country’s ongoing support of youth engagement in international affairs: “After hosting the OSCE activities in 2022 focused on Youth and Security, today’s event reaffirms Andorra’s strong and ongoing commitment to the OSCE’s Youth and Security Agenda. We are proud to support the efforts of the Office of the Secretary-General, both politically and financially, to advance this vital work. The Model OSCE reflects the values we stand for and aligns closely with our priority of promoting youth participation in international organizations.”
Omar Cardentey, Head of Public Affairs for the US. Mission to the OSCE also shared his personal experience in working in the multilateral settings and encouraged young participants to never give up or doubt their ability to make an impact.
The Model OSCE echoed the motto “nothing about youth without youth”, underscoring the crucial role of young people in building sustainable and peaceful societies.
One participant, Lisa Cruz Lackner from Andorra, captured the spirit of the event: “Capacity-building initiatives like this are more than trainings. They create a unique space for dialogue, understanding, and mutual learning. When we come together with different experiences, perspectives, and identities, we don’t just learn about the issues—we learn how to listen, negotiate, and collaborate beyond borders. These events empower us not only to understand global challenges, but to see ourselves as part of the solution. In a setting like the Model OSCE, you quickly realize that diversity is not a challenge to overcome—it is the key to building more inclusive, effective and lasting approaches to peace and security.”
Participants also engaged in exchanges with young diplomats and parliamentarians from Andorra and Malta, gaining firsthand insights into diplomatic careers. The event encouraged collaborative learning and dialogue throughout its session.
The Model OSCE was held as part of the Extra-budgetary Project “Accelerating the implementation of the Youth and Security Agenda in the OSCE region”, which aims to empower young people to shape a more secure and co-operative future across the OSCE region.
We use the term “Renaissance man” very loosely these days, for anybody even slightly multi-talented. But Lesotho-born jazz drummer, novelist and development scholar Morabo Morojele was the genuine article.
He not only worked across multiple fields, but achieved impressively in all. Morojele died on 20 May, aged 64.
As a researcher into South African jazz, I encountered him initially through his impressive live performances. I was surprised to hear about his first novel and then – as a teacher of writing – bowled over by its literary power.
Celebrating a life such as Morojele’s matters, because a pan-African polymath like him cut against the grain of a world of narrow professional boxes, where borders are increasingly closing to “foreigners”.
This was a man who not only played the jazz changes, but wrote – and lived – the social and political ones.
The economist who loved jazz
Born on 16 September 1960 in Maseru, Lesotho, Morojele schooled at the Waterford Kamhlaba United World College in Swaziland (now Eswatini) before being accepted to study at the London School of Economics.
In London in the early 1980s the young economics student converted his longstanding jazz drumming hobby into a professional side gig. There was a vibrant African diasporic music community, respected by and often sharing stages with their British peers. Morojele worked, among others, in the bands of South African drummer Julian Bahula and Ghanaian saxophonist George Lee. With Lee’s outfit, Dadadi, he recorded Boogie Highlife Volume 1 in 1985.
Studies completed and back in Lesotho, Morojele founded the small Afro-jazz group Black Market and later the trio Afro-Blue. He worked intermittently with other Basotho music groups including Sankomota, Drizzle and Thabure while building links with visiting South African artists. For them neighbouring Lesotho provided less repressive stages than apartheid South Africa.
Morojele relocated to Johannesburg in 1995 and picked up his old playing relationship with Lee, by then also settled there. His drum prowess caught the eye of rising star saxophonist Zim Ngqawana. With bassist Herbie Tsoaeli and pianist Andile Yenana, he became part of the reedman’s regular rhythm section.
The three rhythm players developed a close bond and a distinctive shared vision, which led to their creating a trio and an independent repertoire. Later they were joined by saxophonist Sydney Mnisi and trumpeter Marcus Wyatt to form the quintet Voice.
Voice was often the resident band at one of Johannesburg’s most important post-liberation jazz clubs: the Bassline. Although the 1994-founded venue was just a cramped little storefront in a bohemian suburb, it provided a stage for an entire new generation of indigenous jazz and pan-African music in its nine years. Voice was an important part of that identity, audible on their second recording.
Morojele on drums for Andile Yenana.
Morojele also recorded with South African jazz stars like Bheki Mseleku and McCoy Mrubata. He appeared on stage with everyone from Abdullah Ibrahim to Feya Faku.
His drum sound had a tight, disciplined, almost classical swing, punctuated visually by kinetic energy, and sonically by hoarse, breathy vocalisations. Voice playing partner Marcus Wyatt recalls:
The first time I played with you, I remember being really freaked out by those vocal sound effects coming from the drum kit behind me, but the heaviness of your swing far outweighed the heaviness of the grunting. That heavy swing was in everything you did – the way you spoke, the way you loved, the way you drank, the way you wrote, the way you lived your life.
Wyatt also recalls a gentle, humble approach to making music together, but spiced with sharp, unmuted honesty – “You always spoke your mind” – and intense, intellectual after-show conversations about much more than music.
Because Morojele had never abandoned his other life as a development scholar and consultant. He was travelling extensively and engaging with (and acutely feeling the hurt of) the injustices and inequalities of the world. Between those two vocations, a third was insinuating itself into the light: that of writer.
I came to writing almost by accident … I’ve always enjoyed writing (but) I never grew up thinking I was going to be a writer.
In 2006, after what he described in interviews as a series of false starts, he produced a manuscript that simply “wrote itself”, How We Buried Puso.
Starting with the preparations for a brother’s funeral, the novel – set in Lesotho – reflects on the diverse personal and societal meanings of liberation in the “country neighbouring” (South Africa) and at home. How new meanings for old practices are forged, and how the personal and the political intertwine and diverge. All set to Lesotho’s lifela music. The book was shortlisted for the 2007 M-Net Literary Award.
There was an 18-year hiatus before Morojele’s second novel, 2023’s The Three Egg Dilemma. Now that he was settled again in Lesotho, music was less and less a viable source of income, and development work filled his time. “I suppose,” he said, “I forgot I was a writer.” But, in the end, that book “also wrote itself, because I didn’t have an outline … it just became what it is almost by accident.”
In 2022, a serious health emergency hit; he was transported to South Africa for urgent surgery.
The Three Egg Dilemma, unfolding against an unnamed near-future landscape that could also be Lesotho, broadens his canvas considerably.
The setting could as easily be any nation overtaken by the enforced isolation of a pandemic or the dislocation of civil war and military dictatorship, forcing individuals to rethink and re-make themselves. And complicated by the intervention of a malign ghost: a motif that Morojele said had been in his mind for a decade.
For this powerful second novel, Morojele was joint winner of the University of Johannesburg prize for South African writing in English.
He was working on his third fiction outing – a collection of short stories – at the time of his death.
The beauty of his work lives on
Morojele’s creative career was remarkable. What wove his three identities – musician, development worker and writer – together were his conscious, committed pan-Africanism and his master craftsman’s skill with sound: the sound of his drums and the sound of his words as they rose off the page.
Through the books, and the (far too few) recordings, that beauty lives with us still. Robala ka khotso (Sleep in peace).
Gwen Ansell does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.
After 18 months of punishing airstrikes, raids and an increasingly restrictive siege in Gaza, the United Nations on May 20, 2025, issued one of its most urgent warnings yet about the ongoing humanitarian crisis: an estimated 14,000 babies were at risk of death within the next 48 hours without an immediate influx of substantial aid, especially food.
The assessment came a day after Israel allowed the first trickle of aid back into Gaza following its nearly three-month total blockade imposed on March 2. But on the first day of that resumption, the U.N. Office for the Coordination of Humanitarian Affairs reported that only nine trucks were allowed into Gaza, when around 500 are required every day. The U.N. called it “a drop in the ocean of what is urgently needed.”
Israel’s control of food and aid into Gaza has been a consistent theme throughout the past 18 months. Indeed, just two weeks after Israel’s massive military campaign in the Gaza Strip began in late 2023, Oxfam International reported that only around 2% of the usual amount of food was being delivered to residents in the territory and warned against “using starvation as a weapon of war.”
Amid the broader destruction to lives and infrastructure, there is now barely a food system to speak of in Gaza.
Since October 2023, Israeli bombs have destroyed homes, bakeries, food production factories and grocery stores, making it harder for people in Gaza to offset the impact of the reduced imports of food.
A handful of trucks loaded with humanitarian aid for the Gaza Strip are seen at the Kerem Shalom crossing in southern Israel on May 20, 2025. AP Photo/Maya Alleruzzo
But as much as things have worsened in the past 18 months, food insecurity in Gaza and the mechanisms that enable it did not start with Israel’s response to the Oct. 7 attack by Hamas.
Multiple factors contributed to this preexisting food insecurity, not least the blockade of Gaza imposed by Israel and enabled by Egypt since 2007. All items entering the Gaza Strip, including food, became subject to Israeli inspection, delay or denial.
Basic foodstuff was allowed, but because of delays at the border, it could spoil before it entered Gaza.
By placing restrictions on food imports, Israel has claimed to be trying to put pressure on Hamas by making life difficult for the people in Gaza. “The idea is to put the Palestinians on a diet, but not to make them die of hunger,” said one Israeli government adviser in 2006.
To enable this, the Israeli government commissioned a 2008 study to work out exactly how many calories Palestinians would need to avoid malnutrition. The report was released to the public only following a 2012 legal battle. Echoes of this sentiment can be seen in the Israeli decision in May 2025 to allow only “the basic amount of food” to reach Gaza to purportedly ensure “no starvation crisis develops.”
The long-running blockade also increased food insecurity by preventing meaningful development of an economy in Gaza.
Displaced Palestinians fleeing amid ongoing Israeli military operations in the Gaza Strip arrive in Jabalia in northern Gaza on May 18, 2025. AP Photo/Jehad Alshrafi
The U.N. cites the “excessive production and transaction costs and barriers to trade with the rest of the world” imposed by Israel as the primary cause of severe underdevelopment in the occupied territories, including Gaza. As a result, in late 2022 the unemployment rate in Gaza stood at around 50%. This, coupled with a steady increase in the cost of food, made affording food difficult for many Gazan households, rendering them dependent on aid, which fluctuates frequently.
Hampering self-sufficency
More generally, the blockade and the multiple rounds of destruction of parts of the Gaza Strip have made food sovereignty in the territory nearly impossible.
Even prior to the latest war, Gaza’s fishermen were regularly shot at by Israeli gunboats if they ventured farther in the Mediterranean Sea than Israel permits. Because the fish closer to the shore are smaller and less plentiful, the average income of a fisherman in Gaza has more than halved since 2017.
Much of Gaza’s farmland has been rendered inaccessible to Palestinians as a result of post-October 2023 actions by Israel.
And the infrastructure needed for adequate food production – greenhouses, arable lands, orchards, livestock and food production facilities – has been destroyed or heavily damaged. International donors hesitate to rebuild facilities, knowing they cannot guarantee their investment will last more than a few years before being bombed again.
The latest ongoing siege has only further crippled the ability of Gaza to be food self-sufficient. By May 2025, nearly 75% of croplands had been destroyed, along with significant amounts of livestock. Less than one-third of agricultural wells used for irrigation remain functional.
Starvation as weapon of war
The use of starvation as a weapon is strictly forbidden under the Geneva Conventions, a set of statutes that govern the laws of warfare. Starvation has been condemned by U.N. Resolution 2417, which decried the use of deprivation of food and basic needs of the civilian population and compelled parties in conflict to ensure full humanitarian access.
Israeli Prime Minister Benjamin Netanyahu has said publicly that Israel was permitting aid now only because allies were pressuring him over “images of mass famine.” This stance suggests that Israel will not soon increase aid beyond what his government deems politically acceptable.
While there is more evidence than ever before that Israel is using food as a weapon of war, there is also, I believe, ample evidence that this was the reality long before Oct. 7, 2023.
In the meantime, the implications for Palestinians in Gaza have never been more dire.
More death is certain to follow. On May 12, the Integrated Food Security Phase Classification, a global system created to track food insecurity, released an alarming report on projections of food insecurity in Gaza.
It warned that by September 2025, half a million people in Gaza – 1 in 5 of the population – will be facing starvation and that the entire population will experience acute food insecurity at crisis level, or worse.
Editor’s note: Parts of this story were originally contained in an article published by The Conversation U.S. on Feb. 15, 2024.
Yara M. Asi does not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.
Automated payment innovation fuels accelerated adoption of Flywire’s Third-Party Invoicing and 529 Disbursement solutions
BOSTON, May 21, 2025 (GLOBE NEWSWIRE) — Flywire Corporation (Flywire) (Nasdaq: FLYW) – a global payments enablement and software company – announced today that more than 100 colleges and universities in the United States that use Flywire’s Student Financial Software (SFS) collected more than $320 million in past-due tuition to keep more than 161,000 at-risk students enrolled. These results are part of the ongoing commitment that Flywire is making to its higher education clients in the U.S. to help them accelerate revenue, while optimizing for student success.
Faced with mounting pressure to create more sustainable revenue streams, U.S. higher education institutions have adopted Flywire’s SFS solution to better streamline the student journey and address education affordability by providing more dynamic payment plans and accelerating past-due collections to help retain students. The return on investment from Flywire’s Collection Management offering of SFS is particularly strong, as it helps institutions avoid the costly process of sending students to collections, which typically charges on average 20% to collect past-due tuition owed. As one example, Purdue University – a Flywire client for cross-border tuition payments and digital 529 disbursements since 2021 – went live with Flywire’s Collection Management offering of SFS in March of 2024 to automate communications and payment plans to collect more past-due tuition faster. Within months, Purdue saved more than 300 students from going to collections, and recovered more than $1 million in revenue that would otherwise have been written off.
“I can’t imagine how much extra work we’d have to be doing if we were still doing collections the old way. It’s kind of a lifesaver. Our write-offs will go down because of Flywire.” – Chad Lester, Associate Bursar, Account Resolution and Loan Administration, Purdue University
Ongoing innovation also solves payment challenges around 529 disbursements and third-party payments
Flywire’s U.S. clients have also begun adopting its third-party invoicing solution, which streamlines the payment experience for third-party sponsors paying a student’s tuition and fees, as well as its 529 disbursements, which digitizes the otherwise manual process of 529 plan payment checks. Since the inception of its 529 solution, Flywire has digitized over $2 billion in tuition payments by eliminating the manual processing of more than 502,000 checks for institutions in the U.S., with more than 750 institutions in the U.S. signed on for the solution. This expansion of these payment capabilities demonstrates Flywire’s commitment to addressing every aspect of the student payment journey, extending its expertise beyond cross-border transactions to deliver comprehensive payment solutions that help clients work smarter.
“When I first started with Flywire, they were just payments. Now they’ve put 529 solutions in, again a big problem in our university, all the checks. They’ve put in collections and now third-party invoicing. Everything they do makes our jobs easier.” – Janet Hicks, Associate Controller, Student Accounting Services, University of South Florida
Strengthening partnerships to enhance capabilities for clients and embed deeper within broader education ecosystem
Flywire directly integrates with a number of leading technology providers, from large ERPs like Ellucian, to Admission and Enrollment Providers like CommonApp, and other software systems. Through these integrations, Flywire is helping institutions improve operational efficiency to ultimately provide better staff and student experiences.
To strengthen its footprint in the U.S., Flywire has recently partnered with some of the largest and most recognized education technology providers to provide:
Tuition insurance throughGradGuard to provide Flywire’s higher education clients in the U.S. access to an integrated policy disclosure process that assures greater financial literacy of students and their families
Streamlined payment experience throughBlackBaud to provide international students enables a seamless payment experience, and help independent schools streamline incoming payments, including tuition and enrollment fees
Digital delivery of student loan payments funded and managed by some of the largest banks and loan providers in India, including Credila and State Bank of India
Strengthened international recruitment network of more than 20,000 key recruitment counselors such as IDP, KC Overseas and more to help institutes diversify their recruitment efforts and streamline enrollment from international students.
Resources
Meet with Flywire at NAFSA 2025, May 26 – May 30, Booth #626 and join Flywire’s sessions with NYU, IDP, ICEF, AIRC, INTO and GeNEOus to learn more about how Flywire is powering the global education ecosystem.
To learn more about Flywire’s solutions for the U.S. higher education industry, visit here
The Flywire Fusion U.S. Education Client Conference & Awards Ceremony is taking place October 20-22 at the Lansdowne Resort in historic Leesburg, Virginia. Save your spot here.
About Flywire
Flywire is a global payments enablement and software company. We combine our proprietary global payments network, next-gen payments platform and vertical-specific software to deliver the most important and complex payments for our clients and their customers.
Flywire leverages its vertical-specific software and payments technology to deeply embed within the existing A/R workflows for its clients across the education, healthcare and travel vertical markets, as well as in key B2B industries. Flywire also integrates with leading ERP systems, such as NetSuite, so organizations can optimize the payment experience for their customers while eliminating operational challenges.
Flywire supports more than 4,600 clients with diverse payment methods in more than 140 currencies across more than 240 countries and territories around the world. The company is headquartered in Boston, MA, USA with global offices. For more information, visit www.flywire.com. Follow Flywire on X , LinkedIn and Facebook.
Forward-Looking Statements
This release contains forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995, including, but not limited to, statements regarding Flywire’s expectations regarding the benefits of its education clients and business, Flywire’s business strategy and plans, market growth and trends. Flywire intends such forward-looking statements to be covered by the safe harbor provisions for forward-looking statements contained in Section 21E of the Securities Exchange Act of 1934 and the Private Securities Litigation Reform Act of 1995. In some cases, you can identify forward-looking statements by terms such as, but not limited to, “believe,” “may,” “will,” “potentially,” “estimate,” “continue,” “anticipate,” “intend,” “could,” “would,” “project,” “target,” “plan,” “expect,” or the negative of these terms, and similar expressions intended to identify forward-looking statements. Such forward-looking statements are based upon current expectations that involve risks, changes in circumstances, assumptions, and uncertainties. Important factors that could cause actual results to differ materially from those reflected in Flywire’s forward-looking statements include, among others, the factors that are described in the “Risk Factors” and “Management’s Discussion and Analysis of Financial Condition and Results of Operations” sections of Flywire’s Annual Report on Form 10-K for the year ended December 31, 2024 and Quarterly Report on Form 10-Q for the quarter ended March 31, 2025, which are on file with the Securities and Exchange Commission (SEC) and available on the SEC’s website athttps://www.sec.gov/. The information in this release is provided only as of the date of this release, and Flywire undertakes no obligation to update any forward-looking statements contained in this release on account of new information, future events, or otherwise, except as required by law.
The USS Forrest Sherman (DDG 98) visited Algiers on a port visit this week. The three-day visit demonstrated the ongoing friendship and security cooperation between the U.S. and Algeria, building off prior port visit stopovers in Algiers and Oran in 2023 by the USNS Trenton (T-EPF 5).
Source: The Conversation – UK – By Fiona Murphy, Assistant Professor in Refugee and Intercultural Studies, Dublin City University
There’s a particular kind of story that’s rarely executed well – one without heroes, without lessons, without even the cold comfort of a villain you can confidently point at and say: there, that’s the evil. Vincent Delecroix’s Small Boat – a slim, bruising novel translated with quiet precision by Helen Stevenson – is that kind of story.
Small Boat, which was shortlisted for the 2025 International Booker Prize, centres on a real horror: the drowning of 27 people in the English Channel on November 24 2021. They were crowded into an inflatable dinghy in the dark, reaching out over crackling radio lines, asking – in French, in English, in Kurdish – for help. They didn’t get it.
What is known – not imagined in Delecroix’s pages – is that both French and British coastguards received their calls. And both hesitated, passing responsibility back and forth like a poisoned parcel. People died while operators discussed jurisdiction. The Cranston Inquiry, established to examine the failures of that night, is ongoing, its transcripts and testimonies peeling back the layers of bureaucratic neglect.
Delecroix doesn’t give us the migrants’ stories directly. He focuses instead on a fictional French coastguard operator, a woman who spent that night on the radio, doing (or not doing) what her training, her weariness, her own justifications allowed. In the aftermath, she is questioned – not in a court, but in a room filled with mirrors. She faces a policewoman who looks like her, thinks like her, speaks with her same clipped, professional cadence.
She listens back to recordings of her own voice on the rescue line promising help that would not come, offering assurances she did not believe. She is left to reckon with the unbearable fact that someone, somewhere (was it her?) spoke the words: “You will not be saved.”
She isn’t especially monstrous. She’s tired. She’s professional. She has a young daughter at home and an ex-partner who sneers at her work. She runs on the beach to decompress. In one of the novel’s most arresting turns, she compares herself to a mass-produced tin opener: efficient, functional, affectless. Delecroix draws her with enough delicacy that we cannot quite hate her. And that, of course, is far more unsettling.
Reading Small Boat, I thought – as one inevitably does – of Hannah Arendt’s banality of evil. Not evil as grand spectacle or ideology, but as administration, the quiet conviction that one is simply fulfilling a role. Arendt coined the phrase watching the trial of Adolf Eichmann, one of the chief Nazi organisers of the Holocaust. Eichmann organised the trains but claimed never to have hated the passengers. What Arendt saw was not a monster but a functionary – and that, of course, was the point.
I thought too about my own work as an anthropologist researching forced displacement across Ireland, Turkey and Australia. I’ve sat with people whose lives are shaped not by violence in its cinematic form, but by violence as policy: the hotel room without a kitchen, the letter that never arrives, the bed that’s taken away with no warning.
I’ve heard a senior Irish official describe the state’s provision of housing and support for asylum seekers as “sufficient”. Meanwhile people, stateless and waiting, are asked to prove their vulnerability again and again until even their grief is suspect.
Institutional indifference
The institutionalisation of indifference: that’s the real story here. The smugness of protocols. The liturgy of duty rosters and shift reports. It wasn’t evil that let those people drown in the Channel – it was ordinary people in warm offices, citing rules, filling forms, following scripts.
We can see the birth of such indifference in policies like the UK’s abandoned Rwanda plan, which casually proposed outsourcing asylum itself, as if refuge were a commodity.
Delecroix’s brilliance lies in showing how violence at the border is carried out not by villains, but by workers. By women with mortgages, men on night shifts, people who’ve learned to sort calls for help by urgency, credibility, accent. “Sorting,” the narrator explains, “is perhaps the most important part of the job.” Not all distress calls are equal. And the assumption – always lurking, never spoken – is that some lives are more likely to be saved.
At one point, the narrator’s colleague Julien answers calls from migrants by quoting Pascal: “Vous êtes embarqués.” You are already embarked. A fatalist shrug disguised as wisdom. As if to say: you should have thought of all this before you left. The shrug does the work of a policy, the quotation the work of a wall.
And yet, the narrator cannot fully perform indifference. She is haunted by the sea. She remembers loving it as a child. Now, it terrifies her. She feels it watching her, pursuing her, wanting to surge past the shore and swallow the continent whole. She runs along the beach to quiet her mind – a run that is almost the same length as the journey those on the dinghy tried to make.
If Small Boat has a flaw, it’s that it sometimes flirts with making guilt into its own form of lyricism. But this too may be deliberate. It is easier, perhaps, to feel sorry than to feel implicated. And far easier to narrate moral confusion than to prevent its causes.
What Delecroix has written is not a redemption story. It’s not a psychological thriller. It is a chamber piece for one voice and many ghosts. There are no grand gestures here. Just small refusals, small failures. And the small, flickering boats of each human life, drifting toward – or away from – one another in the dark.
In a world ever more brutal towards those who flee war, hunger and despair, Delecroix’s novel is a necessary and merciless indictment. It reminds us that the shipwreck is not theirs alone. It is ours too.
Fiona Murphy does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.
Source: Africa Press Organisation – English (2) – Report:
KIGALI, Rwanda, May 21, 2025/APO Group/ —
On a BAL career night (www.BAL.NBA.com), Pieter Prinsloo recorded a game-high 30 points and 11 rebounds, Teafale Lenard Jr. added 20 points, six rebounds and five assists, and Made By Basketball (MBB, South Africa) defeated Nairobi City Thunder (Kenya) 75-74 when the BAL Nile Conference resumed at BK Arena in Kigali on Tuesday afternoon. MBB overcame an 18-point deficit in the second half and it came down to a dramatic three-pointer from Robinson Opong, his second in the game, to get Sam Vincent’s team one-point ahead with just over three seconds left.
The Thunder were led by Evans Ganapamo (21 points) and Tylor Ongwae (20 points), but were shooting 36 percent from the floor and could not hold to the lead late in the fourth. It was MBB’s first win in the competition (1-2) as they look for a slot in the upcoming BAL Playoffs and Finals back home in Pretoria (June 6-14). After three games in Kigali, the Thunder (0-3) are still searching for a win.
In the second game, Al Ahli Tripoli (Libya) beat APR (Rwanda) 90-68, becoming the only undefeated team in the Nile Conference. Jean Jacques Boissy and Naseim Badrush combined for 52 points, 11 rebounds and six steals for Al Ahli, while Obadiah Noel and Chasson Randle scored 18 points each for APR, who were missing Aliou Diarra due to injury. After three games, Al Ahli (3-0) sits on top of the Nile Conference, with APR (2-1) losing their first game in the competition.
The BAL continues on Thursday when Al Ahli takes on Nairobi at 4 p.m. CAT and APR faces MBB at 7 p.m. CAT.
POSTGAME PRESS CONFERENCE:
MBB vs Nairobi City Thunder (https://apo-opa.co/3YT6kOi) (MBB: Head Coach Sam Vincent; Teafale Lenard Jr.; Thunder: Head Coach Bradley Thomas; Evans Ganapamo)
Al Ahli Tripoli vs APR (https://apo-opa.co/3H3wUy0) (Tripoli: Head Coach AbouAbou Charca Joseph Fouad; Deon Thompson; APR: Head Coach James Maye Jr.; Obadiah Noel)
Source: Africa Press Organisation – English (2) – Report:
ABIDJAN, Ivory Coast, May 21, 2025/APO Group/ —
As the United States imposes higher tariffs with global ramifications, African Development Bank Group (www.AfDB.org) President Dr. Akinwumi Adesina has warned that these measures could trigger significant economic disruptions across Africa, affecting numerous nations and accelerating a strategic shift in global partnerships.
In an exclusive interview with CNN’s Christiane Amanpour, Dr Adesina revealed that 47 of Africa’s 54 countries will be impacted directly by the new U.S. trade policies, with potential declines in export revenues and foreign exchange reserves.
“When those currencies weaken, two things will happen: first, you will find that most of these countries are import-dependent. So, you’re going to find that high inflation becomes a problem,” said Adesina. “And secondly, you find that the cost of actually servicing a lot of their debt, which is foreign currency debt, but in local currencies, is going to get worse.”
Almost all African countries have been hit by higher tariffs announced by the Trump administration, with at least 22 nations facing up to a whopping 50 percent for almost all their products. Among the hardest hit countries are Lesotho, Madagascar, Mauritius, Botswana, Angola, Algeria, and South Africa.
The impacts of these higher tariffs are further exacerbated by significant cuts to USAID programs, which have already begun affecting access to essential medical supplies and humanitarian services in many countries, raising serious concerns about the future trajectory of U.S.-Africa relations.
Africa’s Strategic Response
Despite the challenges, Adesina emphasized that Africa cannot afford a trade confrontation with the United States, noting that the continent accounts for only 1.2 percent (approximately $34 billion) of America’s global trade—with a trade surplus of just $7.2 billion.
Instead, he proposed a pragmatic three-point strategy for the continent: Engage the U.S. through flexible and constructive trade negotiations, diversify export markets to reduce dependency on any single partner, and accelerate the African Continental Free Trade Area implementation to unlock the potential $3.4 trillion market.
He stressed the need to expand Africa’s domestic market and boost domestic savings to develop consumption as a bigger share of its GDP, leveraging its massive population growth. More importantly, the continent must take advantage of the increasing external interest in its natural resources, such as cobalt and lithium, to negotiate a better trade and investment deal.
Addressing speculation that Africa may shift more decisively toward China in response to the higher U.S. tariffs, Adesina dismissed any notion of binary alignment. “U.S is a key ally of Africa—and so is China,” he stated. “Africa is building bridges, not isolating itself.”
He stressed that Africa seeks balanced, transparent, and mutually beneficial partnerships with all major global players, including the U.S., China, the European Union, and the Gulf states. “I think at the end of the day, we want to make sure that whatever deals that are being done with Africa are transparent, fair, equitable, and led by Africa and in Africa’s interests,” Adesina reiterated.
Beyond Aid: Driving Africa’s Self-Reliance
Dr. Adesina, who concludes his second and final term as president of the Bank in September, firmly rejected the long-standing paradigm of foreign aid dependency. “The era of aid as we’ve known it is completely gone,” he declared, calling instead for bold investments in domestic resource mobilization, infrastructure, and value-added industrialization.
He said aid must be turned into concessional financing to allow multilateral financial institutions like the African Development Bank to do more for the continent by mobilizing more private capital to develop and derisk projects.
While Africa represents nearly 20 percent of the global population and under three percent of global GDP, the Bank Group chief pointed to a resilient and transformative growth narrative: ten of the world’s twenty fastest-growing economies are in Africa.
He highlighted flagship initiatives under the African Development Bank’s “High 5” agenda that have impacted more than 565 million people through investments in power, food security, industrialization, regional integration, and initiatives to improve the quality of life of the people of Africa.
Over the past decade, the African Development Bank has invested more than $55 billion in infrastructure to bolster economic integration across Africa, alongside other critical investments to drive inclusive growth. It is by far the largest financier of infrastructure across Africa.
Adesina also cited the great potential of the Mission 300 project, a joint initiative by the World Bank and the African Development Bank to connect 300 million people in Africa to electricity by 2030. “Because without electricity, what can you do? You can’t industrialize, you can’t add value, you can’t be competitive in the dark,” he said.
He highlighted the achievements of the Africa Investment Forum, launched in 2018 by the Bank and eight other partners, saying it has since mobilized more than $225 billion in investment interest to the continent. The Forum is a multi-stakeholder, multi-disciplinary platform that advances projects to bankable stages, raises capital, and accelerates deals to financial closure.
Adesina believes that despite its challenges, Africa is the largest greenfield investment destination in the world, and it remains “the investor’s dream.”
“We got hydropower. We have a massive youth population that can become the labor force of the world. Sixty-five percent of the arable land left in the world to feed almost 9.5 billion people by 2050 is in Africa, so what Africa does with it will determine the future of food in the world,” he affirmed.
Mahe, Seychelles, May 21, 2025 (GLOBE NEWSWIRE) — BitMart Research, the research arm of BitMart Exchange, has released a comprehensive analysis spotlighting two rapidly emerging forces in the MEME token issuance landscape: Believe and LetsBonk.fun. As competition in the meme economy intensifies, these platforms are reshaping token creation through innovative launch mechanics, deep community integrations, and disruptive incentive structures. The report examines Believe’s algorithmic, social-influence–driven token generation on X, and LetsBonk.fun’s seamless in-app token deployment rooted in the Solana ecosystem. With explosive user growth, increasing market capitalizations, and novel monetization models, both platforms are challenging incumbents like Pumpfun and setting new standards for community-led, creator-first Web3 ecosystems.
1.Believe
Introduction to Believe
Believe is a MEME token issuance platform founded by Ben Pasternak. Formerly known as Clout.me—with a “celebrity token” model—the project rebranded to focus squarely on “social assetization.” Its core mechanism allows any user to tweet on X in the format $TICKER+NAME and mention @launchcoin. The system then uses an algorithm to assess the user’s social influence and, if criteria are met, automatically triggers a smart-contract–based token deployment. Approved tokens first enter a bonding-curve issuance phase and receive a $10,000 seed fund from the platform to support the founding team. Once a token’s market capitalization surpasses $100,000, it moves into a liquidity-enhancement phase by migrating to the Meteora protocol for deep market-making support.
According to the official economic model, the platform applies a 2% transaction fee: 1% is awarded to the token creator as an incentive, 0.1% goes to community evangelists, and the remaining 0.9% funds platform maintenance. This tiered revenue structure both safeguards creators’ core interests and fuels community-driven early promotion, while providing the financial foundation for sustainable platform growth.
Popular Projects on Believe
LaunchCoin
As the flagship token of the Believe ecosystem, LaunchCoin is an upgraded iteration of Ben Pasternak’s early PASTERNAK token, fully embodying the brand evolution from Clout.me to the Believe platform. On its first day of trading, LaunchCoin reached a $80 million market capitalization. After weathering market fluctuations, it began a strong recovery on May 11 and has since grown to a $330 million market cap—40× its launch valuation—with over 27,000 unique holders.
Dupe
Dupe is the ecosystem token for the furniture-affordable–search engine Dupe.com. The platform’s official Instagram boasts 367,000 followers, and its monthly active user base exceeds 1 million. Dupe’s market cap peaked at $70 million and currently hovers around $34 million.
Goonc
Issued by Pata van Goon—an engineer from the OpenAI tech team—GOONC quickly went viral thanks to its technical-elite endorsement. The token’s market cap once surged to $70 million and now steadies in the $45.5 million range.
2. LetsBonk.fun
Introduction to LetsBonk.fun
LetsBonk.fun is a meme token issuance platform co-launched by BONK—the leading meme project in the Solana community—and Raydium. Positioned as Solana’s LaunchPad + creator-incentive hub, the platform went live on April 26. Its popularity has recently exploded thanks to meme projects like Hosico, Useless, and IKUN. Token issuance is as simple as clicking “Create Token” within the app, though a minimum 2 SOL of liquidity must be provided before the token can be listed for trading on Raydium.
LetsBonk.fun Revenue Model
Every trade on the platform incurs a 1% fee, which is allocated to the development fund, BONKsol validators, and BONK buy-and-burn. Specifically:
35% of revenue is used to buy back and burn BONK, implementing a deflationary mechanism
30% is used to purchase and stake BONKsol to secure and provide liquidity for the network
19.2% is directed to an ecosystem development fund
7.6% goes into strategic reserves
7.6% is allocated for technical development and operations (split equally among hiring, growth & development, and integrations)
12% is dedicated to user incentives and marketing, broken down into 4% BonkRewards, 4% marketing, and 4% community-governance support (SBR)
Between April 29 and May 15, daily revenue surged from roughly 2,000 SOL to 24,000 SOL—a more than 12× increase—while token issuance spiked to nearly 50,000 tokens on May 15 (a 233% rise over average).
Popular Projects on LetsBonk.fun
Hosico
Inspired by the Instagram-famous cat with 1.8 million followers and rendered in a Ghibli-style AI aesthetic, Hosico’s token launched at 4 AM and reached a $10 million market cap within its first hour. It later peaked at $60 million and currently sits at around $22 million.
USELESS
Born from a tweet by BONKGUY on X—“This is a useless currency; it shouldn’t be pumped”—USELESS rode its nihilistic, emotionally charged narrative to rapid fame. Since launch on BONK, its market cap soared to $34 million and now stabilizes at approximately $24 million.
3. Competitive Analysis: Believe, LetsBonk.fun, Pumpfun, and Others
Believe’s distinct advantage lies in its X-based token issuance mechanism: projects cannot pre-sell tokens before launch and must rely on secondary-market trading or social-tag purchases. It charges no listing fee, but requires a relatively high entry barrier of roughly 85 SOL, which may slow initial liquidity. In contrast, LetsBonk.fun supports dual issuance both on its own platform and via X, and is tightly integrated with the BONK token; it even returns 10% of fees to liquidity providers upon exit to incentivize deployment.
Overall, neither model represents a revolutionary departure from existing MEME-token platforms; they primarily optimize issuance methods and add ancillary features. Although both have recently captured some of Pumpfun’s daily issuance volume, they still lag significantly behind Pumpfun’s overall scale.
Daily new MEME issuance
4. Future Outlook
The MEME-token space is currently crowded with largely homogeneous issuance platforms. While platforms like Believe and LetsBonk.fun may siphon off some of Pumpfun’s short-term hype, long-term sustainability—once speculative capital recedes—will be the market’s true test. To date, Believe has greatly simplified the MEME-token launch process via X, and LetsBonk.fun has created strong ecosystem synergy through deep BONK integration. As market enthusiasm cools and new competitors emerge, their ability to maintain momentum will hinge on whether they can introduce fresh innovations or incubate genuinely “wealth-creating” MEME assets.
Read the full research article here:
About BitMart
BitMart is the premier global digital asset trading platform. With millions of users worldwide and ranked among the top crypto exchanges on CoinGecko, it currently offers 1,700+ trading pairs with competitive trading fees. Constantly evolving and growing, BitMart is interested in crypto’s potential to drive innovation and promote financial inclusion. New users can register here to unlock an $8,000+ welcome bonus.
Risk Warning:
The information provided is for reference only and should not be considered a recommendation to buy, sell or hold any financial asset. All information is provided in good faith. However, we make no representations or warranties, express or implied, as to the accuracy, adequacy, validity, reliability, availability or completeness of such information.
All cryptocurrency investments (including returns) are highly speculative in nature and involve significant risk of loss. Past, hypothetical or simulated performance is not necessarily indicative of future results. The value of digital currencies may rise or fall, and there may be significant risks in buying, selling, holding or trading digital currencies. You should carefully consider whether trading or holding digital currencies is suitable for you based on your personal investment objectives, financial situation and risk tolerance. BitMart does not provide any investment, legal or tax advice.
Nyahururu (Agenzia Fides) – The Diocese of Nyahururu in Kenya mourns the loss of Fr. John Ndegwa Maina, parish priest of St. Louis Church in Igwamiti.”The Catholic Diocese of Nyahururu announces the passing to eternal glory of Reverend John Maina Ndegwa. He passed away while receiving treatment at St. Joseph Hospital in Gilgil. Further information will be provided in due course. We pray for his soul and his family during this difficult time,” reads an official statement from the diocese.According to local media reports, the priest was found seriously injured on Friday, May 15, on the side of the Nakuru-Nairobi highway, several kilometers from his parish, and was taken to a hospital, where he died upon arrival.According to reconstructions and rumors, which have not yet been officially confirmed, the priest may have been fatally wounded somewhere other than where he was found. The results of the autopsy ordered by the competent authorities to determine the cause of death are expected in the coming hours.Meanwhile, the Catholic community of Igwamiti has gathered in mourning and prayer. Several ceremonies were held last weekend in memory of Father John Ndegwa Maina. (F.B.) (Agenzia Fides, 21/5/2025)
Share: