Category: Business

  • MIL-OSI: NowVertical Group Reports First Quarter 2025 Financial Results

    Source: GlobeNewswire (MIL-OSI)

    Company Hosting Investor Webinar on Thursday May 22, 2025, at 10:00 AM EST

    • Q1 2025 revenue was $10.4 million, up 23% Y/Y excluding recent divestitures
    • Q1 2025 Income from Operations was $1.5 million, up 1,253% Y/Y excluding recent divestitures
    • Q1 2025 Adjusted EBITDA was $2.5 million, up 119% Y/Y excluding recent divestitures

    TORONTO, May 21, 2025 (GLOBE NEWSWIRE) — NowVertical Group Inc. (TSX-V: NOW) (“NOW” or the “Company”), a leader in AI-driven data solutions, announces financial results for its first fiscal quarter ended March 31, 2025. Unless otherwise specified, all dollar amounts are expressed in U.S. dollars. Management will host an investor webinar at 10:00 AM EST (7:00 AM PST) on Thursday May 22nd, to discuss the Company’s financial and business results.

    Selected Financial Highlights for the Three Months Ended March 31, 2025:

    • Revenue was $10.4 million in the three months ended March 31, 2025 (“Q1 2025”), a 20% decrease from $12.9 million for the three months ending March 31, 2024 (“Q1 2024”). Excluding the disposition of Allegient Defense, Inc. (“Allegient”) on May 24, 2024, Q1 2024 revenue was $8.4 million, translating to a year-over-year growth of 23%.
    • Gross Profit was $5.1 million in Q1 2025, a 15% decrease from $6.0 million in Q1 2024. Excluding the Allegient business, Q1 2024 gross profit was $4.5 million, translating to a year-over year increase of 15%.
    • Administrative Expenses were $3.6 million in Q1 2025, a 38% decrease from $5.8 million in Q1 2024. Excluding the Allegient business, Q1 2024 administrative expenses were $4.6 million, translating to a year-over-year decrease of 22%.
    • Income from Operations was $1.5 million in Q1 2025, a 660% increase from $0.2 million in Q1 2024. Excluding the Allegient business, Q1 2024 had a Loss from Operations of $0.1 million, translating to a year-over-year increase of 1,253%.
    • Adjusted EBITDA was $2.5 million in Q1 2025, a 69% increase from $1.5 million in Q1 2024. Excluding the Allegient business, Adjusted EBITDA was $1.2 million in Q1 2024, translating to a year-over-year increase of 119%.
    • Net Loss was $0.7 million in Q1 2025, a 55% decrease from $1.5 million in Q1 2024. Excluding the Allegient business, Net Loss was $1.9 million in Q1 2024, translating to a year-over-year decrease of 63%.

    “NOW again delivered a strong quarter and continues to demonstrate its transformation into a business defined by consistency, stability, and sustainable performance. Q1 2025 marks our fifth consecutive quarter of continuous growth and operational improvement, underscoring our momentum across the business,” said Sandeep Mendiratta, CEO of NOW. “We delivered Adjusted EBITDA of $2.5 million, representing an EBITDA margin of 24%, in line with our $10 million annual run-rate target. Our 23% year-over-year revenue growth is a direct result of disciplined execution and a sharpened operational focus. We have successfully renegotiated acquisition-related liabilities, unlocking an estimated $5.4 million in cash savings and improving our payment schedules. These efforts have strengthened our balance sheet and position us for sustained organic revenue growth with strong margins across our core markets.”

    Q1 2025 and Subsequent Business Highlights:

    • May 13, 2025: Announced that the company was named Qlik Latin America Channel Growth Partner of the Year 2024. The award highlights NOW’s ability to scale customer impact and accelerate business value.
    • May 08, 2025:  Announced its UK operations have been recognised as a Google Cloud Premier Partner, the highest designation within the Google Cloud Partner Advantage programme.
    • April 22, 2025: The company announced that further to its news release on March 10, 2025, it has settled aggregate of CAD$35,220.62 representing the net amount of certain bonus entitlements owing to certain employees through the issuance of an aggregate of 93,917 Class A Subordinate voting shares in the capital of the Company
    • April 17, 2025: NOW announced the launch of its flagship Data Catalyst Solution on the Microsoft Azure Marketplace, reinforcing the Company’s strategic positioning at the intersection of enterprise AI, data infrastructure modernisation, and Microsoft ecosystem expansion.
    • April 14, 2025: The company announced that it will be presenting at the Planet MicroCap Showcase: VEGAS 2025 in partnership with MicroCapClub.
    • April 08, 2025: Announced that it has received the 2025 Google Cloud Data & Analytics Partner of the Year award for Latin America.
    • April 01, 2025: NOW announced its 2024 record financial results.

    Q1 2025 Financial Results Investor Webinar:

    The Company invites shareholders, analysts, investors, media representatives, and other stakeholders to attend our upcoming webinar. Management will discuss Q1 2025 results, followed by a question-and-answer session.

    Investor Webinar Registration:

    Time: Thursday, May 22, 2025, 10:00 AM in Eastern Time (US and Canada)

    Registration Link: 
    https://us02web.zoom.us/webinar/register/WN_81iVl2rzQrS7E0lJ7xjlPA

    A recording of the webinar and supporting materials will be made available in the investor’s section of the Company’s website at https://www.nowvertical.com/news-and-media.

    Additional Information:

    The Company’s first quarter 2025 condensed consolidated interim financial statements, notes to financial statements, and management’s discussion and analysis for the three ended March 31, 2025, are available on the Company’s SEDAR+ profile at www.sedarplus.com. Unless otherwise indicated, all references to “$” in this press release refer to US dollars, and all references to “CAD$” in this press release refer to Canadian dollars.

    About NowVertical Group Inc.

    The Company is a data analytics and AI solutions company offering comprehensive solutions, software and services. As a global provider, we deliver cutting-edge data, technology, and artificial intelligence (AI) applications to private and public enterprises. Our solutions form the bedrock of modern enterprises, converting data investments into business solutions. NOW is growing organically and through strategic acquisitions. For further details about NOW, please visit www.nowvertical.com.

    Neither the TSX Venture Exchange nor its Regulation Services Provider (as that term is defined in the policies of the TSX Venture Exchange) accepts responsibility for the adequacy or accuracy of this release.

    For further information, please contact:

    Andre Garber, CDO 
    IR@nowvertical.com
    +1(647)947-0223 

    Investor Relations:  
    Bristol Capital Ltd.
    Stefan Eftychiou
    stefan@bristolir.com
    +1(905)326-1888 x60 

    Cautionary Note Regarding Non-IFRS Measures:

    This news release refers to certain non-IFRS measures. These measures are not recognized measures under IFRS, do not have a standardized meaning prescribed by IFRS and are therefore unlikely to be comparable to similar measures presented by other companies. Rather, these measures are provided as additional information to complement those IFRS measures by providing further understanding of the Company’s results of operations from management’s perspective. The Company’s definitions of non-IFRS measures used in this news release may not be the same as the definitions for such measures used by other companies in their reporting. Non-IFRS measures have limitations as analytical tools and should not be considered in isolation nor as a substitute for analysis of the Company’s financial information reported under IFRS. The Company uses non IFRS financial measures including “EBITDA”, and “Adjusted EBITDA”. These non-IFRS measures are used to provide investors with supplemental measures of our operating performance and to eliminate items that have less bearing on our operational performance or operating conditions and thus highlight trends in our core business that may not otherwise be apparent when relying solely on IFRS measures. The Company believes that securities analysts, investors and other interested parties frequently use non-IFRS financial measures in the evaluation of issuers. The Company’s management also uses non-IFRS financial measures to facilitate operating performance comparisons from period to period and prepare annual budgets and forecasts.

    Non-IFRS Measures:

    The non-IFRS financial measures referred to in this news release are defined below. The management discussion and analysis for the three months ended March 31, 2025, available at nowvertical.com and on SEDAR+ at www.sedarplus.com contains supporting calculations for Adjusted Revenue, EBITDA % and Adjusted EBITDA

    Adjusted EBITDA” adjusts net income (loss) before depreciation and amortization expenses, net interest costs, and provision for income taxes for revenue adjustments in “Adjusted Revenue” and items such as acquisition accounting adjustments, transaction expenses related to acquisitions, transactional gains or losses on assets, asset impairment charges, non-recurring expense items, non-cash stock compensation costs, and the full year impact of cost synergies related to restructuring activities, such as a reduction of employees.

    EBITDA %” is defined as Adjusted EBITDA as a percentage of Adjusted Revenue.

    Adjusted Revenue” adjusts revenue to eliminate the effects of acquisition accounting on the Company’s revenues, which predominantly pertain to fair market value adjustments to the opening deferred revenue balances of acquired companies.

    Cautionary note regarding Forward-Looking Statements

    This news release may contain forward-looking statements and forward-looking information (within the meaning of applicable securities laws) which reflect the Company’s current expectations regarding future events. All statements in this news release that are not purely historical statements of fact are forward-looking statements and include statements regarding beliefs, plans, expectations, future, strategy, objectives, goals and targets. Although the Company believes that such statements are reasonable and reflect expectations of future developments and other factors which management believes to be reasonable and relevant, the Company can give no assurance that such expectations will prove to be correct. Forward-looking statements can generally be identified by the use of forward-looking words such as “may”, “should”, “will”, “could”, “intend”, “estimate”, “plan”, “anticipate”, “expect”, “believe” or “continue”, or the negative thereof or similar variations. Forward-looking statements involve known and unknown risks, uncertainties and other factors that may cause future results, performance, or achievements to be materially different from the estimated future results, performance or achievements expressed or implied by the forward-looking statements. Forward-looking statements are not guarantees of future performance and undue reliance should not be placed thereon, as unknown or unpredictable factors could have material adverse effects on future results, performance or achievements of the Company. Should one or more of these risks or uncertainties materialize, or should assumptions underlying the forward-looking statements prove incorrect, actual results may vary materially from those described herein as intended, planned, anticipated, believed, estimated or expected.

    All of the forward-looking statement contained in this press release are qualified by the foregoing cautionary statements, and there can be no guarantee that the results or developments that we anticipate will be realized or, even if substantially realized, that they will have the expected consequences or effects on our business, financial condition or results of operation. Unless otherwise noted or the context otherwise indicates, the forward -looking statements contained herein are provided as of the date hereof, and the Company does not intend, and does not assume any obligation, to update the forward-looking statements except as otherwise required by applicable law.

    The MIL Network

  • MIL-OSI USA: Tuberville Introduces Tuskegee President to Senate HELP Committee, Discusses Cost versus Benefits of Higher Education

    US Senate News:

    Source: United States Senator Tommy Tuberville (Alabama)
    WASHINGTON – Today, U.S. Senator Tommy Tuberville (R-AL) spoke with Dr. Andrew Gillen, Dr. Michael Lindsay, Dr. Mark Brown, Mr. Mike Pierce, and Dr. Russell Lowery-Hart during a Senate Health, Education, Labor, and Pensions (HELP) Committee hearing on the state of higher education. During the hearing, Sen. Tuberville discussed the reasons for the skyrocket of prices in higher education institutions during recent years. 
    Sen. Tuberville also introduced Dr. Mark Brown, President of Tuskegee University in Tuskegee, Alabama, to the Committee.
    Read Sen. Tuberville’s remarks below or watch on YouTube or Rumble. 
    Sen. Tuberville’s introduction of Dr. Brown can be found below or on YouTube or Rumble.

    INTRODUCTION OF DR. MARK BROWN:
    TUBERVILLE: “It’s my pleasure to introduce our second witness, Dr. Mark A. Brown. As a matter of fact, he’s about 20 miles from where I live, as we speak, in Auburn, Alabama. Dr. Brown is the president of Tuskegee University, home of the Tuskegee Airmen, who we’re very proud of. It’s a Historically Black College in Alabama. He is the first alumnus in Tuskegee’s 143-year-history to lead the university. A retired Air Force Major General, Dr. Brown brings unmatched experience in education leadership, federal student aid policy, and HBCU advancement. We are thankful to have you here today to hear your perspective, Dr. Brown. “
    ON THE COST OF HIGHER EDUCATION:
    TUBERVILLE: “Gentlemen, thanks for being here. I’m passionate about this. I spent [40] years in education—more than anybody in this room probably, maybe other than Dr. Graham, although you spent a little time in the military. I’ve been in high schools all across this country, almost in all 50 states. We’ve gone backwards. [We’re here] today to talk about higher education. I spent 30 years in that and have done a lot of great things for a lot of kids, men and women, rich and poor. It’s got to be merit based, folks. If we don’t merit base this thing, we will not survive as an educational system. This country gives you an opportunity.
    I was in a situation where athletics was merit-based. I didn’t care who you were. I had to win games. I recruited kids that had good grades, would go to class, and could play football. And if they couldn’t do those three things and work at it, I didn’t recruit them. It’s got to be the same thing in college in terms of getting a good education. I know of a school that has a happiness degree. That [isn’t] gonna get it. I’m for paying everybody’s way through college, but not for a degree where when they get out, they can’t get a job at Walmart. We need degrees that kids can prosper [with], raise a family, and have a great life in this country. So, I’d like to ask each one of you just one question, starting over with Dr. Gillen.
    Dr. Gillen, what factors do you see that have caused massive skyrocketing costs at our universities across the country?”
    GILLEN: “So, I would argue that the main driver of higher college cost is what’s called the Bowen Revenue Theory of Cost. When you look at higher education, […] the idea here is not that, you know, higher faculty salaries or increases in institutional aid are driving higher spending. It’s that when more revenue is available, colleges will spend as much as they can. And it makes sense, these are all mission driven institutions, right? If you give each of these schools a million more dollars, they’ll find a good way to spend it. The problem is if you keep doing that, eventually those good ways to spend it aren’t so convincing anymore. But when we have these mission driven institutions, the more money they have, the more money they’re going to spend.”
    TUBERVILLE: “Dr. Lindsay?”
    LINDSAY: “I think the opportunity that is before is, as you say, to bring accountability and outcomes. And I think we have to be very intentional about the kind of formation that’s occurring on our campuses. I’m really proud of the fact that we have something called the Good Work Initiative, which is basically trying to transform on campus employment opportunities where students are paid a little bit more than minimum wage to give them a little bit more spending money, but we also pair it with professional development and vocational discernment exercises to help them. So, that when they graduate, they actually have that kind of professional experience. It’s a pilot [program]. We’ve had good success with it. We’re allowing the opportunity for more students to take on more leadership roles, giving them good things for their resumes, but also buttressing their opportunities when they graduate.”
    TUBERVILLE: “Dr. Brown?”
    BROWN: “Senator, I’ll use a real example. I went to my Board of Trustees for this upcoming year and said that I would like to freeze tuition for two years at our school. They approved the freezing of the tuition, but when I looked at the cost of insurance—which is a subcomponent of that tuition—we had to go up. So, the real cost to the customer—the family—was more.
    The same is true of the cost of dining, the cost of food that goes into a dining hall contract, and the cost of the utilities it takes to run the campus. My campus is much like any other business. Those costs, we would not be able to absorb, and so our cost went up because costs in the economy went up. It was not that we would spend more because we had more. Those costs were real, and we had to realize those as a school [that] operates just like a business in that sense.”
    LOWERY-HART: “Thank you for the question. I would say in the community college sector, there hasn’t been a massive skyrocket rising in prices. At Austin Community College, we haven’t raised tuition in 12 years. I think we’ve raised it once in 15 [years]. We’re the sector of higher education that lives within our means, because our students are so price-sensitive. And I think there could be a lot to learn from how community colleges effectively manage their budgets.”
    TUBERVILLE: “I agree with you on that. I’ve been in a lot of community colleges. You do a good job, by the way. And I think more kids need to go to community colleges.
    Mr. Pierce?”
    PIERCE: “I think it’s my turn to talk about for-profit colleges, which seems to be missing from my colleague’s responses to your question. We have watched the proprietary sector raise costs far in excess of other sectors of the higher education system. And we’ve also watched some of the largest participants in the for-profit college market turn into private non-profit colleges or enter into deals with public colleges. I think we’re not at a place where we were a decade ago talking about the proprietary sector. We should be looking at the backroom deals that some of the largest colleges in the country are cutting with these private companies and how these deals are driving the increase in costs that are being pushed on our most vulnerable students.”
    TUBERVILLE: “Good. Thank you.
    Thank you, Mr. Chairman.”
    Senator Tommy Tuberville represents Alabama in the United States Senate and is a member of the Senate Armed Services, Agriculture, Veterans’ Affairs, HELP and Aging Committees.

    MIL OSI USA News

  • MIL-OSI Canada: Construction begins on student housing at SFU, more child care on the way

    Source: Government of Canada regional news

    Students, staff and the surrounding community are one step closer to more on-campus supports at Simon Fraser University (SFU) – Burnaby as construction starts on a new student residence and will begin later this year on a new child care facility.  

    “A safe and secure place to live and conveniently located child care can be transformative for students and parents working or studying on campus,” said Bowinn Ma, Minister of Infrastructure. “These new facilities will provide shorter commute times, allow students to focus on their studies and help ease pressure on the local rental market.  Projects like this are one way we are investing in infrastructure that supports people in B.C.”

    The new eight-storey residence will provide an additional 445 beds for students at the Burnaby campus. It will include a mix of studio and four-bedroom apartments, as well as two- and four-bedroom townhouses. Construction is expected to start in fall 2025 on a stand-alone child care centre, which will add 160 new child care spaces to more than 410 existing spaces in the Burnaby campus and at SFU’s Sapperton location. With these new spaces, more than 570 child care spaces will provide support to the SFU community.

    Once complete, the residence will bring the total number of student beds on the SFU Burnaby campus to more than 3,000.  

    “I have met with many students at post-secondary campuses in B.C., and access to housing and child care are big factors when deciding if they can afford to build a better life for themselves,” said Anne Kang, Minister of Post-Secondary Education and Future Skills. “Since 2018, our government has made historic investments in student housing, making it easier for thousands of students across the province to gain the skills they need to fill the in-demand jobs our economy needs.”

    Construction is expected to be completed on the student-housing residence and child care facility in fall 2027. The total capital cost of the project is $196.6 million, shared between the Province and SFU.

    This project is Phase 3 of SFU’s ongoing student-housing expansion. Phases 1 and 2 added a combined 856 new beds for students, with funding for Phase 2 provided by the Province.

    “Watching the Phase 3 site come to life has reinforced how vital new student housing is for our community,” said Ali Asgar Abdul Udaipurwala, a fourth-year undergraduate student at SFU’s Beedie School of Business, who lives in residence at the Burnaby campus. “As a community adviser and area co-ordinator, I have loved planning late-night events, movie nights and study breaks in our halls. I am excited for Phase 3 to become our next home away from home.”

    Since 2018, the government has committed $2 billion to expand on-campus student housing at public post-secondary institutions throughout B.C. To date, 6,100 beds for students are open, with another 4,600 underway.

    Since 2018, ChildCareBC’s space-creation programs have helped fund the creation of more than 40,900 new licensed child care spaces in B.C., with more than 24,900 of those operational. This child care project received $16 million through the ChildCareBC New Spaces Fund, which is jointly supported by provincial investments and federal funding provided under the 2021-22 to 2025-26 Canada-British Columbia Canada-wide Early Learning and Child Care Agreement. British Columbia and the federal government signed an extension to the agreement for 2026-27 to 2030-31.

    Quotes:

    Joy Johnson, president, Simon Fraser University

    “We are grateful for the Province’s continued investment in student housing and child care across the province. I look forward to continued growth of SFU’s resident student community on Burnaby Mountain and to continued partnership with the provincial government as we move forward. The post-secondary sector is united in our efforts to support British Columbians in tackling shared challenges, from housing to health care and beyond, as we make a difference for students and for communities across B.C.”

    Rohini Arora, parliamentary secretary for child care, and MLA for Burnaby East –

    “Creating 160 new child care spaces on SFU campus, where hard-working students, families and single parents can easily access the care they need, is one of the ways we are helping Burnaby get ahead. By ensuring parents, especially mothers, can access high-quality child care in Burnaby while attending higher education or working, we are setting both this generation and the next up for success.”

    Learn More:

    For more information about Simon Fraser University, visit: https://www.sfu.ca/

    MIL OSI Canada News

  • MIL-OSI USA: Durbin Delivers Opening Statement During Senate Judiciary Committee Nominations Hearing On Four Executive. Branch Nominees

    US Senate News:

    Source: United States Senator for Illinois Dick Durbin
    May 21, 2025
    WASHINGTON – U.S. Senate Democratic Whip Dick Durbin (D-IL), Ranking Member of the Senate Judiciary Committee, today delivered an opening statement during a Senate Judiciary Committee hearing on the nominations of Joseph Edlow, to be Director of United States Citizenship and Immigration Services (USCIS); Elliot Gaiser, to be Assistant Attorney General for the Office of Legal Counsel (OLC); John Squires, to be Under Secretary of Commerce for Intellectual Property and Director of the United States Patent and Trademark Office (USPTO); and Stanley Woodward, to be Associate Attorney General. Durbin’s opening statement focused on whether the nominees’ allegiance is to the President or to the rule of law.
    Key Quotes:
    “Earlier this year, I asked Justice Department nominees a simple question: may a public official defy a court order? Shockingly, the nominees, including the future Solicitor General John Sauer, refused to give an unequivocal answer. Just days ago, Mr. Sauer repeated this egregious error before the Supreme Court. During arguments in the case challenging the President’s illegal birthright citizenship executive order, Justice Barrett, …a Trump nominee, asked Mr. Sauer if the Administration would follow circuit court rulings. Mr. Sauer responded that the federal government’s policy is to ‘generally respect circuit precedent but not necessarily in every case.’ As our colleague Senator Kennedy said earlier this year, ‘don’t ever, ever, take the position that you’re not going to follow the order of a federal court. Ever.’”
    “Mr. Gaiser has been nominated to lead the Office of Legal Counsel, which provides legal advice to the President and all executive branch agencies. I want to hear whether he believes that the policy of the federal government [should be] to ignore court rulings that don’t suit the President’s whims.”
    “Beyond unlawfully attempting to end birthright citizenship, which is enshrined in the Constitution, the Administration has made it harder for legal immigrants to apply for citizenship and naturalize. This Administration has made it harder for Dreamers, who want to do the right thing. Now these were kids who were brought to the United States by their parents… They want to apply for programs like DACA so that they can receive work permits and continue to contribute to the American economy. I am disappointed to hear that Mr. Edlow, nominated to lead USCIS, opposes DACA, when even President Trump claims that he doesn’t want to deport Dreamers. Despite his personal opinions, I want to hear how Mr. Edlow will ensure that USCIS will promptly process DACA applications of eligible Dreamers.”
    “In the name of carrying out Trump’s mass deportation agenda, Attorney General Bondi has made DOJ a shell of itself. Thousands of federal law enforcement agents have been diverted from preventing drug trafficking and violent crime to deporting immigrants who pose no threat to our safety. Mr. Woodward, nominated to be the number three official at the Justice Department, would oversee Justice Department grantmaking, the Civil Rights Division, and many other components that are now under attack.”
    “The Justice Department, at the direction of DOGE, took their chainsaw to hundreds of millions of dollars in federal grants to support public safety and our police. Programs supporting violence reduction, victims’ services, child protection, and substance use and mental health treatment have been gutted… For nearly 70 years, under Republican and Democratic Administrations alike, the Civil Rights Division protected the civil and constitutional rights of all Americans. Once known as the ‘crown jewel’ of the Justice Department, it has now been reduced to litigating a narrow set of cases aligned with the MAGA agenda. This is anathema to how this Division has operated historically.”
    “I want to hear from Mr. Woodward whether the Justice Department will continue to capitulate or if he will help restore the Justice Department to its intended function—to protect the safety and rights of all Americans.”
    Video of Durbin’s opening statement is available here.
    Audio of Durbin’s opening statement is available here.
    Footage of Durbin’s opening statement is available here for TV Stations.
    -30-

    MIL OSI USA News

  • MIL-OSI USA: Gillibrand Announces Bipartisan Legislation That Would Make Childbirth Free For Families With Private Insurance

    US Senate News:

    Source: United States Senator for New York Kirsten Gillibrand

    Today, U.S. Senator Kirsten Gillibrand held a virtual press conference to discuss her Supporting Healthy Moms and Babies Act, bipartisan legislation that would require insurance companies to fully cover the costs associated with childbirth, including labor and delivery and prenatal, neonatal, perinatal, and postpartum care. Even with insurance, childbirth can cost families thousands of dollars, and expenses are even greater for women who have additional health complications during pregnancy, a high-deductible health plan, or gaps in their coverage. As a result, new mothers are twice as likely as other young women to have medical debt. 

    The Supporting Healthy Moms and Babies Act would require that costs associated with birth be categorized as essential health benefits (EHB) and would remove the relevant services from insurance cost-sharing.

    Senators Cindy Hyde-Smith (R-MS), Tim Kaine (D-VA), and Josh Hawley (R-MO) cosponsor this legislation. 

    “The costs associated with having a baby can be astronomical, and we should be doing everything we can to lower them,” said Senator Gillibrand. The fear of an enormous bill leads some women to delay seeking prenatal or postpartum care, or to avoid it entirely, which creates worse outcomes for both women and their babies. That is unacceptable. I am proud to be introducing this bipartisan legislation to require insurance companies to fully cover care throughout pregnancy and a year postpartum. I look forward to working with my colleagues across the aisle to get this bill passed.” 

    The Supporting Healthy Moms and Babies Act would eliminate cost-sharing for a variety of services, including:

    • Ultrasounds
    • Delivery services, including anesthesiology, fetal monitoring, consultations with specialists, and services relating to postpartum health
    • Comprehensive postpartum care for physical and mental health conditions caused or exacerbated by pregnancy, such as diabetes, hypertension, obesity, and postpartum depression and anxiety
    • Mental health care and treatment for substance use disorder related to new parenthood for adoptive parents
    • Care for miscarriages

    The bill is expected to cause only a minor increase of $30 annually per enrollee in average premiums. Any rise in premiums due to covering out-of-pocket pregnancy costs will be likely less than annual inflation in premiums.

    The Supporting Healthy Moms and Babies Act is supported by medical providers and pro-family advocates, including the American College of Obstetrics and Gynecology, American Medical Association, American Hospital Association, American Society for Reproductive Medicine, Association of Women’s Health, Obstetrics and Neonatal Nurses, Association of Maternal and Child Health Programs, Catholic Health Association, March of Dimes, American Principles Project, Concerned Women for America, and the Jesuit Conference Office of Justice and Ecology.

    The full text of the legislation is available here.

    MIL OSI USA News

  • MIL-OSI Russia: The 12th International Exhibition of Arms and Military Equipment MILEX-2025 Opened in Belarus

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    MINSK, May 21 (Xinhua) — The 12th International Exhibition of Arms and Military Equipment MILEX-2025 opened on Wednesday at the Minsk International Exhibition Center “BelExpo”. More than 150 companies from Belarus, Russia, China, Iran, Pakistan, and India are taking part in the event. They are demonstrating samples of weapons and military equipment that reflect the main trends and development prospects of the global arms market.

    President of Belarus Alexander Lukashenko sent a greeting to the participants and guests of the international exhibition. “In the year of the 80th anniversary of the Victory of the Soviet people in the Great Patriotic War, we are holding this representative forum in honor of our common heroes. The generation of victors bequeathed to us to preserve peace and freedom in our native land, won at an unprecedentedly high price. In the name of this goal, we, the allied countries, are increasing our defense potential and strengthening cooperation in the field of security,” A. Lukashenko’s press service quotes him as saying.

    The President of Belarus expressed confidence that the international exhibition of weapons and military equipment will allow a wide range of specialists and experts to become familiar with the most advanced achievements of both Belarusian manufacturers and foreign partners.

    MILEX-2025 presents more than 750 samples of weapons, military and special equipment of Belarusian production. Among them are the anti-aircraft missile system “Buk-MB-2K” with the first Belarusian anti-aircraft guided missile, the grenade launcher system “Sapfir”, the armored personnel carrier V-2. The total area of the exhibition exceeds 11.5 thousand square meters.

    The 11th International Scientific Conference on the Development of Weapons, Military and Special Equipment and Dual-Use Technologies will be held as part of the scientific and business program of the event. The conference will address current issues of creating systems to counter high-precision weapons, electronic warfare, radio-technical and radar reconnaissance, troop and weapon control, and radio communications. A separate section will be devoted to the topic of unmanned systems for various purposes.

    The organizers of the 12th International Exhibition of Arms and Military Equipment MILEX-2025 are the State Military-Industrial Committee and the Ministry of Defense of Belarus, as well as the National Exhibition Center “BelExpo”. The event will last until May 24. –0–

    MIL OSI Russia News

  • MIL-OSI: First Merchants Corporation Announces Changed Ex-Dividend Date for Previously Announced Dividend

    Source: GlobeNewswire (MIL-OSI)

    MUNCIE, Ind., May 21, 2025 (GLOBE NEWSWIRE) — First Merchants Corporation (Nasdaq: FRME) has amended the ex-dividend date for its recently declared cash dividend of $0.36 from June 5, 2025, to June 6, 2025.  The payment date for the quarterly dividend will remain as June 20, 2025, as previously announced on May 16, 2025.

    About First Merchants Corporation:

    First Merchants Corporation is a financial holding company headquartered in Muncie, Indiana. The Corporation has one full-service bank charter, First Merchants Bank. The Bank also operates as First Merchants Private Wealth Advisors (as a division of First Merchants Bank).

    First Merchants Corporation’s common stock is traded on the NASDAQ Global Select Market System under the symbol FRME. Quotations are carried in daily newspapers and can be found on the company’s Internet web page (http://www.firstmerchants.com).

    FIRST MERCHANTS and the Shield Logo are federally registered trademarks of First Merchants Corporation.

    For more information, contact:
    Nicole M. Weaver, First Vice President and Director of Corporate Administration
    765-521-7619
    http://www.firstmerchants.com

    The MIL Network

  • MIL-OSI: Clairvest Invests in Beneficial Reuse Management

    Source: GlobeNewswire (MIL-OSI)

    TORONTO, May 21, 2025 (GLOBE NEWSWIRE) — Clairvest Group Inc. (TSX: CVG) (“CVG”) today announced that it, together with Clairvest Equity Partners VII (“CEP VII”, collectively “Clairvest”), has recapitalized and invested in Beneficial Reuse Management (“BRM” or the “Company”) from Skyline Global Partners and other shareholders. Clairvest has been actively investing in the environmental services sector for over 19 years, and this transaction represents our 10th partnership in the industry.

    BRM distributes products to the agriculture, landscape, wallboard, and construction end-markets by reusing or converting certain industrial waste streams into value-add products. BRM was founded in 1999 by Dave Schuurman and is currently led by Trevor Schuurman as its CEO & President. Headquartered in Chicago, Illinois, BRM operates six processing and manufacturing facilities and maintains a distribution network of over 116 locations to store and distribute materials for beneficial reuse programs.

    “BRM is a unique company delivering a compelling value proposition for its customer base, including: (i) meeting the growing demand for specialty agricultural nutrients and recycled wallboard, and (ii) providing innovative waste disposal and recycling solutions for industrial waste generators. We are excited to partner with and support Trevor and his management team to execute an aggressive growth plan and become a leading beneficial reuse and industrial recycling company in the U.S.,” said Michael Castellarin, Managing Director of Clairvest.

    “Finding innovative and environmentally friendly waste disposal alternatives for our customers has been a key focus for our business over the past two decades. We remain dedicated to partnering with our customers to provide innovative and effective beneficial reuse solutions – all while contributing to a healthier planet. With Clairvest’s deep industry expertise and strong track record supporting the growth of its partners, we are gaining more than just a capital partner – we are gaining a strategic ally to support our continued growth,” said Trevor Schuurman, CEO & President of BRM.

    Raymond James served as exclusive financial advisor to BRM.

    The BRM investment is Clairvest’s 69th platform investment and the third investment of CEP VII, a US$1.2 billion investment pool, US$300 million of which is from CVG.

    About Clairvest
    Clairvest’s mission is to partner with entrepreneurs to help them build strategically significant businesses. Founded in 1987 by a group of successful Canadian entrepreneurs, Clairvest is a top performing private equity management firm with CAD $4.6 billion of capital under management. Clairvest invests its own capital and that of third parties through the Clairvest Equity Partners limited partnerships in owner-led businesses. Under the current management team, Clairvest has initiated investments in 69 different platform companies and generated top quartile performance over an extended period.

    Contact Information
    Stephanie Lo
    Director of Investor Relations and Marketing
    Clairvest Group Inc.
    Tel: (416) 925-9270
    stephaniel@clairvest.com

    The MIL Network

  • MIL-OSI: Helium Evolution Announces Voting Results From Annual General & Special Meeting of Shareholders

    Source: GlobeNewswire (MIL-OSI)

    CALGARY, Alberta, May 21, 2025 (GLOBE NEWSWIRE) — Helium Evolution Incorporated (TSXV:HEVI) (“HEVI” or the “Company“), a Canadian-based helium exploration company focused on developing assets in southern Saskatchewan, is pleased to report that all matters presented for approval at its annual general and special meeting of shareholders held on May 21, 2025 (the “Meeting“) were approved. A total of 47,824,360 common shares representing 42.59% of the Company’s issued and outstanding common shares were voted in person or represented by proxy at the Meeting.

    The shareholders voted in favour of all matters set out in the Company’s Management Information Circular dated April 7, 2025 (the “Circular”), including creating a new control person in ENEOS Xplora USA Limited, with greater than 98% of votes in favour. Additionally, the shareholders voted in favour of the election of all seven director nominees of HEVI for the ensuing year or until his or her successor is elected or appointed. Each nominee received greater than 99% of votes in favour.  

    At the Meeting, shareholders also approved: (1) fixing the number of directors of the Company for the ensuing year at seven; (2) appointing KPMG LLP as the auditors of the Company for the ensuing year and authorizing the directors to fix the remuneration to be paid to the auditors; and (3) approving and confirming the rolling 10% stock option plan of the Company, as more particularly described in the Company’s Circular.

    Stay Connected to Helium Evolution

    Shareholders and other parties interested in learning more about the Helium Evolution opportunity are encouraged to visit the Company’s website, which includes an updated corporate presentation, and are invited to follow the Company on LinkedIn and X for ongoing corporate updates and helium industry information. Helium Evolution also provides an extensive, commissioned ‘deep-dive’ research report prepared by a third party whose background includes serving as a research analyst for several bank-owned and independent investment dealers.

    About Helium Evolution Incorporated

    Helium Evolution is a Canadian-based helium exploration company holding the largest helium land rights position in North America among publicly-traded companies, focused on developing assets in southern Saskatchewan. The Company has over five million acres of land under permit near proven discoveries of economic helium concentrations which will support scaling the exploration and development efforts across its land base. HEVI’s management and board are executing a differentiated strategy to become a leading supplier of sustainably-produced helium for the growing global helium market.

    For further information, please contact:

    Neither the TSX Venture Exchange nor its Regulation Services Provider (as that term is defined in the policies of the TSX Venture Exchange) accepts responsibility for the adequacy or accuracy of this release.

    The MIL Network

  • MIL-OSI: BULGOLD Announces Annual General and Special Meeting Voting Results

    Source: GlobeNewswire (MIL-OSI)

    TORONTO, May 21, 2025 (GLOBE NEWSWIRE) — BULGOLD Inc. (TSXV: ZLTO) (the “Company” or “BULGOLD”) is pleased to announce the voting results from its Annual General and Special Meeting of the holders (“Shareholders”) of common shares of the Company that was held at 10:00 AM on May 21, 2025 (the “Meeting”).

    All the matters put forward before Shareholders for consideration and approval as set out in the Company’s management information circular dated April 1, 2025 (the “Circular”) were approved by the requisite majority of votes cast at the Meeting. In particular, Shareholders approved the election of all director nominees listed in the Circular. The board of directors of the Company is now comprised as follows:

    • James A. Crombie
    • Sean Hasson
    • Colin Jones
    • Laurie Marsland
    • Dr. Mihaela Barnes
    • Vanessa Cook

    Shareholders also appointed McGovern Hurley LLP as auditors of the Company until the close of the next annual meeting of Shareholders at a remuneration to be fixed by the board of directors of the Company.

    Further, the disinterested Shareholders passed an ordinary resolution ratifying and confirming the Company’s 10% “rolling” equity incentive plan including the setting-aside, allotting and reserving 10% of the Company’s outstanding common shares from time to time for issuance pursuant to the exercise of awards granted thereunder (the full text of which is set out in the Circular).

    A total of 10,957,856 common shares representing approximately 39.7% of the Company’s issued and outstanding common shares were voted in connection with the Meeting, and each of the foregoing matters were approved by over 99.4% of the votes cast thereon.

    About BULGOLD Inc.
    BULGOLD is a gold exploration company focused on the exploration and development of mineral exploration projects in Central and Eastern Europe. The Company controls 100% of three quality quartz-adularia epithermal gold projects located in the Bulgarian and Slovak portions of the Western Tethyan Belt: the Lutila Gold Project, the Kostilkovo Gold Project and the Kutel Gold Project. Management of the Company believes that its assets show potential for high-grade, good-metallurgy, low-sulfidation epithermal gold mineralisation.

    On December 31, 2024, BULGOLD’s issued and outstanding shares were 27,597,928 of which approximately 40.3% were held by Founders, Directors and Management. Additional information about the Company is available on BULGOLD’s website (www.BULGOLD.com) and on SEDAR+ (www.sedarplus.ca).

    Neither TSX Venture Exchange nor its Regulation Services Provider (as that term is defined in the policies of the TSX Venture Exchange) accepts responsibility for the adequacy or accuracy of this release.

    Cautionary Statement Regarding Forward-Looking Information

    This press release contains forward‐looking statements and forward‐looking information within the meaning of applicable securities laws. These statements relate to future events or future performance and include statements relating to voting results of the Meeting. All statements other than statements of historical fact may be forward‐looking statements or information. The forward‐looking statements and information are based on certain key expectations and assumptions made by management of the Company. Although management of the Company believes that the expectations and assumptions on which such forward-looking statements and information are based are reasonable, undue reliance should not be placed on the forward‐looking statements and information since no assurance can be given that they will prove to be correct.

    Forward-looking statements and information are provided for the purpose of providing information about the current expectations and plans of management of the Company relating to the future. Readers are cautioned that reliance on such statements and information may not be appropriate for other purposes, such as making investment decisions. Since forward‐looking statements and information address future events and conditions, by their very nature they involve inherent risks and uncertainties. Actual results could differ materially from those currently anticipated due to a number of factors and risks, including the inherent uncertainty of mineral exploration; risks related to title to mineral properties; and credit, market, currency, operational, commodity, geopolitical, liquidity and funding risks generally, including changes in economic conditions, interest rates or tax rates and general market and economic conditions. Accordingly, readers should not place undue reliance on the forward‐looking statements and information contained in this press release. Readers are cautioned that the foregoing list of factors is not exhaustive. The forward‐looking statements and information contained in this press release are made as of the date hereof and no undertaking is given to update publicly or revise any forward‐looking statements or information, whether as a result of new information, future events or otherwise, unless so required by applicable securities laws. The forward-looking statements and information contained in this press release are expressly qualified by this cautionary statement.

    For further information, please contact:

    BULGOLD Inc.
    Sean Hasson, President and Chief Executive Officer
    Telephone: +359 2 989 2361
    Email: information@BULGOLD.com
    Website: www.BULGOLD.com

    The MIL Network

  • MIL-OSI USA: Hawley, Durbin Reintroduce Bill Combatting Online Child Sexual Abuse Material 

    US Senate News:

    Source: United States Senator Josh Hawley (R-Mo)

    Wednesday, May 21, 2025

    Today, U.S. Senators Josh Hawley (R-Mo.) and Dick Durbin (D-Ill.) reintroduced the STOP CSAM Act. The legislation will crack down on the proliferation of child sexual abuse material (CSAM) online by allowing victims to sue companies that host it. Senators Chuck Grassley (R-Iowa), Amy Klobuchar (D-Minn.), and Mark Kelly (D-Ariz.) have cosponsored the bill.
    The Senators announced the legislation’s reintroduction in February ahead of their joint hearing highlighting witnesses impacted by CSAM, including survivors, advocates, and law enforcement experts. They originally introduced the legislation last Congress and garnered the votes to unanimously advance it through the Senate Judiciary Committee. 
    “Every day that Congress fails to protect kids online is another day that online predators can victimize children and steal their innocence—and social media companies are totally complicit,” said Senator Hawley. “To stop them, Congress must give parents and victims the right to sue these companies, and my bipartisan legislation would empower them to do just that.”
    “In the real world, child safety is a top priority. But in the virtual world, criminals and bullies don’t need to pick a lock or wait outside the playground to cause harm. They can harass, intimidate, addict, or sexually exploit our kids without leaving home,” said Senator Durbin. “Big Tech has woefully failed to police itself, and the American people are demanding that Congress intervene. We made significant headway last year to address Big Tech’s failure to protect our kids online and it’s time to build on that progress. I’m glad to partner with Senator Hawley to reintroduce our bill supporting victims of child sexual exploitation and increasing accountability for tech companies.”
    Senator Hawley has been a leading proponent of holding Big Tech accountable and protecting kids online. Last year, he questioned Meta CEO Mark Zuckerberg about the rampant child exploitation on his social media platforms, prompting him to stand up and apologize to the families of victims in the room.
    Senator Hawley also introduced legislation to allow any private citizen to sue Big Tech platforms for hosting CSAM. After striking a deal with Senator Durbin to advance the CSAM legislation, the bipartisan bill was eventually blocked on the Senate floor.
    Read the full bill text here. 

    MIL OSI USA News

  • MIL-OSI: iRhythm Technologies to Participate in Upcoming Investor Conferences

    Source: GlobeNewswire (MIL-OSI)

    SAN FRANCISCO, May 21, 2025 (GLOBE NEWSWIRE) — iRhythm Technologies, Inc. (NASDAQ:IRTC), a leading digital health care company focused on creating trusted solutions that detect, prevent, and predict disease, today announced that its management team is scheduled to present at the following investor conferences.

    • William Blair 45thAnnual Growth Stock Conference on Wednesday, June 4, 2025, at 2:00 p.m. Central Time (12:00 p.m. Pacific Time)
    • Goldman Sachs 46thAnnual Global Healthcare Conference on Tuesday, June 10, 2025, at 2:40 p.m. Eastern Time (11:40 a.m. Pacific Time)
    • Truist Securities MedTech Conference on Tuesday, June 17, 2025, at 1:40 p.m. Eastern Time (10:40 a.m. Pacific Time)

    Interested parties may access live and archived webcasts of the presentations on the “Events & Presentations” section of the company’s investor website at investors.irhythmtech.com.

    About iRhythm Technologies, Inc.
    iRhythm is a leading digital health care company that creates trusted solutions that detect, predict, and prevent disease. Combining wearable biosensors and cloud-based data analytics with powerful proprietary algorithms, iRhythm distills data from millions of heartbeats into clinically actionable information. Through a relentless focus on patient care, iRhythm’s vision is to deliver better data, better insights, and better health for all. For additional information about iRhythm, please visit its corporate website at irhythmtech.com.

    Investor Contact
    Stephanie Zhadkevich
    investors@irhythmtech.com

    Media Contact
    Kassandra Perry
    irhythm@highwirepr.com

    The MIL Network

  • MIL-Evening Report: Drivers of SUVs and pick-ups should pay more to be on our roads. Here’s how to make the system fairer

    Source: The Conversation (Au and NZ) – By Milad Haghani, Associate Professor & Principal Fellow in Urban Risk & Resilience, The University of Melbourne

    In the year 2000, almost 70% of all new cars sold in Australia were small passenger vehicles – mainly sedans and hatchbacks. But over 25 years, their share has dropped dramatically to just 17%, as a car “size race” took hold.

    Now, SUVs and light commercial vehicles comprise almost 80% of the market. Four in five new vehicles sold in Australia today are an SUV, ute, van or light truck.

    As larger vehicles become the new norm, they bring more road wear, urban congestion and demands on infrastructure such as parking.

    It’s time to ask: should drivers of larger vehicles pay for the damage and disruption they cause, through higher registration charges? Generally, yes. Bigger cars mean bigger costs for everyone else. It’s only fair those costs are reflected in how we price their use of public roads.

    Reasons for going big

    There are several reasons for the shift to larger passenger vehicles in Australia. They include perceptions that bigger cars are safer and more prestigious, as well as lifestyle preferences.

    A loophole in the luxury car tax also encourages car buyers to go big. The tax was introduced on imports in 2000 and this financial year applies to vehicles worth more than A$80,576.

    Many utes and SUVs are exempt because they’re classified as light commercial vehicles. The exemption applies regardless of whether the car is used privately or for business.

    Counting the costs on our roads

    Larger vehicles – no matter how they are powered – generally impose bigger costs on society than smaller cars.

    Large SUVs and utes (if powered by fossil fuels) have a far greater climate impact. On average, a small car emits 2,040 kilograms less carbon dioxide (CO₂) a year than a pickup truck.

    But even big electric vehicles can cause climate harm. The substantial resources required to manufacture a large EV creates emissions, which may undermine the climate benefits electrification promises.

    Large passenger vehicles also create health system costs. In road crashes, for example, they may better protect their occupants, but pose greater risks to others – especially pedestrians and those in smaller vehicles.

    Research suggests for each fatal crash that occupants of large vehicles avoid, at least 4.3 fatal crashes involving others occur.

    Bigger vehicles also need more space. Standards Australia has proposed making car-parking spaces larger to accommodate the trend to larger cars. Cities such as Paris have introduced higher parking fees for SUVs on these grounds.

    Larger vehicles also slow overall traffic flow. For example, they have longer braking distances and other motorists tend to drive further behind them than smaller cars.

    And at signalised intersections, a large SUV’s impact on traffic flows is equal to 1.41 passenger cars.

    In real-world terms, these differences add up. In the United States in 2011, the annual cost of light-duty trucks on congestion and lost productivity was estimated at more than US$2 billion.

    Then there’s the cost of road wear. You might think heavier vehicles just wear roads a bit faster than smaller ones. But in reality, the relationship is far more dramatic.

    Let’s compare a vehicle with an axle weight of 500 kg and a vehicle with an axle weight of 1,000 kg. The second vehicle doesn’t produce double the road damage – it produces 16 times the damage. This phenomenon is known as the “fourth power rule”.

    It means heavier vehicles cost far more in road maintenance. Curious to test it? The Road Damage Calculator lets you compare the relative impact of vehicles of different weights.

    What does car rego pay for?

    Vehicle registration offers a way to recoup the societal costs caused by large vehicles.

    Part of car registration fees go toward administration, but they also help governments pay for the broader cost of vehicles on public infrastructure and shared spaces.

    In Australia, car registration systems vary widely between states. Not all reflect the impact of the vehicles on the road.

    In Victoria, fees are based mostly on location – whether the car is registered in a metropolitan, outer-metro or rural area. In the Australian Capital Territory, fees are calculated on a vehicle’s emissions.

    Queensland and Tasmania use the number of engine cylinders to set fees – a rough proxy for vehicle size, but not a precise one.

    In New South Wales and Western Australia, heavier vehicles pay more.

    South Australia and the Northern Territory apply different models again, using a combination of settings not directly based on weight.

    A fairer system

    Larger vehicles take up more road space, contribute more to congestion, and cause exponentially more damage to road surfaces. These are exactly the kinds of impacts a vehicle registration system should help account for.

    So, what would a truly equitable registration fee model look like? Based on the evidence, it would not only account for vehicle size and weight, but also how often the vehicle is driven. After all, a heavy car parked in a garage all year causes less impact than one on the road every day.

    Several countries, including New Zealand, have adopted distance-based or road-use charging schemes for certain types of vehicles, which uses a combination of vehicle weight and distance travelled.

    As our vehicle fleet continues to evolve, Australia should follow suit, with a smarter and more equitable registration fee system.

    Milad Haghani does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Drivers of SUVs and pick-ups should pay more to be on our roads. Here’s how to make the system fairer – https://theconversation.com/drivers-of-suvs-and-pick-ups-should-pay-more-to-be-on-our-roads-heres-how-to-make-the-system-fairer-252381

    MIL OSI AnalysisEveningReport.nz

  • MIL-Evening Report: E-bikes for everyone: 3 NZ trials show people will make the switch – with the right support

    Source: The Conversation (Au and NZ) – By Caroline Shaw, Associate Professor in Public Health, University of Otago

    Getty Images

    Anyone who uses city roads will know e-bikes have become increasingly popular in Aotearoa New Zealand. But we also know rising e-bike sales have been predominantly driven by financially well-off households.

    The question now is, can e-biking be accepted and embraced by people and communities where it is currently not happening? Three pilot programmes from around the country have now given us cause for optimism.

    Understanding more about the barriers to e-bike access – especially in communities with low cycling levels or where income levels mean bikes are prohibitively expensive – has been one of the main gaps in our knowledge.

    But over the past few years, we have been involved in projects designed to examine how e-bikes might work in such places. The three pilots were based in Mangere (South Auckland), Wainuiomata (Lower Hutt) and Sydenham (Christchurch).

    These are all areas or communities with lower relative incomes and lower levels of cycling. The majority of individuals involved did not routinely cycle, and some hadn’t been on a bike for decades.

    In all three pilots, the results were positive. In some cases, participants reported long-term, life-changing benefits.

    What the pilot schemes showed

    Each pilot was different. The Mangere programme loaned e-bikes to people for two to three months between 2022 and 2023 through a community bikehub. The Wainuiomata programme involved a longer loan period of one year over 2023, and was run through a health provider at a local marae.

    The Christchurch programme, which ran between 2021 and 2024, was a free e-bike share scheme for tenants in a specific social housing complex, organised through a partnership with a shared e-bike provider.

    Where needed, participants in all pilots were supported as they gained riding confidence and knowledge of safe cycling routes.

    Participants in all the pilot programmes found e-biking acceptable, and they used and enjoyed the bikes. While these pilots were not set up to measure distance travelled, we know from other research that participants in e-bike access schemes ride on average 5km per day, half of which replaces car trips.

    Individuals reported practical benefits such as being able to travel to their jobs, mental and physical health improvements, and not having to pay for petrol each week.

    In the Wainuiomata pilot there were wider ripple effects, with participants reporting whānau members also started cycling as a result of the loan scheme. In one case, ten members of the wider whānau got involved.

    Good cycling infrastructure will encourage e-bike uptake.
    Getty Images

    3 policy actions needed now

    These results mirror what we know already about how e-bikes can improve physical and mental health, reduce transport greenhouse gas emissions, and make cities nicer places by reducing car use.

    Compared to conventional bikes, e-bikes also allow people to bike further and in hillier places. They are also great for groups with traditionally lower levels of cycling, such as people with health conditions, disabilities, older people and women.

    It also seems concerns about increased rates of injury may be less significant than initially thought. Overall, the broad benefits of e-bikes have seen hundreds of access schemes developed globally, including many in New Zealand.

    Combining international evidence and experience with the information from the three local pilot programmes, we see three main policy areas that will increase e-bike uptake and use in New Zealand.

    1. Physical infrastructure: this is needed to support cycling in all our cities and larger towns, and would involve a combination of cycle lanes and low-traffic neighbourhoods, alongside expanded bike parking and storage.

    The Climate Change Commission has recommended these networks be constructed, and experience from Wellington shows rapid construction is possible.

    2. Targeted access schemes: these help people who can’t afford e-bikes. Without targeting, such schemes tend to be mainly used by the well-off. It’s likely we will need a range of options, such as short-term and long-term low-cost (or free) loans, rent-to-buy schemes or subsidies.

    People should be able to access these schemes through a variety of organisations so as to target different motivations: saving money, improving health, commuting for work, ferrying children, environmental concern.

    3. Local organisation networks: these support individuals and communities to access bikes, maintain them, provide rider training, run bike libraries, route finding and community events to support and encourage people to ride.

    This wider support was a key factor to the success of the all pilots. Local organisations, champions and leaders are essential to help overcome some of the practical and cultural barriers that exist because we have such low levels of cycling.

    Change is achievable

    What we have outlined constitutes a different way of doing business for the transport sector. But there are already organisations doing a lot of this work, including bike hubs and cycling community organisations.

    Others have infrastructure in place that could expand to encompass e-bike programmes, such as marae and community health centres. What is needed is a commitment to support these activities as part of core transport business policy.

    We don’t need to wait for more research. The three things required – building infrastructure, increasing access and providing support programmes – are all understood and achievable.

    E-bikes can and should play an important role in expanding New Zealand’s transport options and improving the wellbeing of its people.

    Caroline Shaw receives funding from the Health Research Council of New Zealand, University of Otago and Waka Kotahi/New Zealand Transport Agency.

    Karen Witten receives funding from the Health Research Council of NZ, Ministry of Business Innovation & Employment,
    Waka Kotahi/NZTA and Auckland Council.

    Simon Kingham receives funding from Ministry of Business Innovation & Employment.

    ref. E-bikes for everyone: 3 NZ trials show people will make the switch – with the right support – https://theconversation.com/e-bikes-for-everyone-3-nz-trials-show-people-will-make-the-switch-with-the-right-support-255956

    MIL OSI AnalysisEveningReport.nz

  • MIL-Evening Report: Playing the crime card: do law and order campaigns win votes in Australia?

    Source: The Conversation (Au and NZ) – By Chloe Keel, Lecturer in Criminology and Criminal Justice, Griffith University

    Crime and public safety are usually the domain of state politics. But the Coalition tried to elevate them as key issues for voters in the recent federal election.

    Claiming crime had been “allowed to fester” under Labor, the opposition promised a A$750 million Operation Safer Communities plan, which included police strike teams targeting drugs, a national child sex offender register, and more money for Neighbourhood Watch.

    A Coalition government would also have given grants to community groups to install public lighting, bollards and CCTV cameras.

    But in the end, crime did not appear to be a deciding factor in the election, which was easily won by Labor.

    What does that tell us about leveraging public fear – either existing crime fears and general anxieties, or latent concerns that can be triggered – for political gain in Australia? Can it be a successful strategy?

    Stoking anxiety

    In culturally diverse countries, such as Australia and the United States, law and order rhetoric sometimes calls for supporting aggressive crime policies at the expense of racial and ethnic minorities, many of whom are immigrants.

    These policies can be effective in stoking public fear to win votes. US President Donald Trump’s exhortations on immigration and crime were a significant part of his election campaigns in 2016 and 2024.

    However, what experts call “protective factors”, such as strong communities and social cohesion, are important. They can reduce the influence of political narratives that try to define crime in narrowly punitive or racialised terms.

    Australia is not America

    Our peer-reviewed research, which will be published in the Journal of Criminology, investigated how public concerns about crime and safety in Australia and the US were associated with demographic factors that evolved over time. The study drew on data from the World Values Survey and indicated key differences in what makes Australians and Americans feel unsafe.

    We have found that in Australia in 2018, supporters of left-leaning parties (Labor/Green) reported feeling significantly safer than other voters. However, this gap disappeared when researchers took into account attitudes that blame crime problems on immigrants. This suggests immigrant-blaming in Australia can drive feelings of community fear and insecurity.

    The World Values Survey uncovered a different pattern in the US.

    Between 2011 and 2017, Republican voters reported feeling safer than other Americans – the opposite of Australia’s trend. The political divide in the US couldn’t be explained by immigrant-blaming attitudes. Rather, it was attributed to the “self-isolation” of American conservatives in more culturally homogeneous communities.

    Our study indicated that while immigration continued to influence safety perceptions in the US, it appeared to operate through different mechanisms than in Australia. Racial and ethnic minorities reported greater fear as the 2010s unfolded.

    Social connectedness also plays differently in each country. In Australia, trust in others and confidence in public institutions consistently influences safety perceptions. In the US, these factors have little impact.

    Social scientists have observed that in modern societies, responsibility for personal safety has increasingly shifted from the government to individuals. This trend is strong in the US, where market-focused, neoliberal economic and social policies dominate policies.

    By contrast, European research suggests stronger social welfare systems can reduce safety concerns by addressing underlying economic anxieties. Australia’s more robust social support appears to foster greater feelings of safety.

    Our research indicates social cohesion further helps reduce fear.

    Crime fears are not a vote winner

    Electoral strategies that seek to leverage public insecurities need to be understood in the context of these fear-mitigating factors. Media diversity can also counter fear-based messaging.

    In the 2018 Victorian election, crime became a prominent political issue through racialised commentary targeting “African gangs”. However, it failed to gain decisive political traction.

    Research found fear of crime was relatively rare in Victoria. Media reports of crime and comments by political leaders were distant from their own experiences

    With more diverse news sources and online platforms, political actors can no longer promote narratives unopposed. Fear-based messaging can backfire, especially when it overreaches.

    Outdated strategy

    Perceptions of crime are often shaped by a combination of actual crime rates and broader anxieties about social change, cultural difference, and uncertainty. This is frequently expressed as unease about the increasing presence of culturally diverse groups.

    While the coalition’s pivot to law-and-order rhetoric represented a familiar strategy, Labor positioned itself as the party of unity. This was underscored by Foreign Minister Penny Wong’s declaration after Labor won the election, in which she acknowledged

    […] the power in our 26 million people from more than 300 ancestries […] from the oldest continuing civilisation on the planet and I acknowledge the traditional owners. Friends, we love this country.

    Foreign Minister Penny Wong on election night.

    While harnessing fears of crime and cultural diversity was not effective in this election cycle, this is not the end of law and order politics. But the unique characteristics of this election appear to have rendered the formula less potent.

    Trump’s threat to democracy and the constitutional rule of law in the US may have fostered a sense of solidarity and social cohesion among Australian voters. Our research suggests this helped to mitigate fears about crime.

    The temptation to capitalise on law and order may continue to appeal to politicians. But in Australia, at least, there is no guarantee it will work.

    The authors do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.

    ref. Playing the crime card: do law and order campaigns win votes in Australia? – https://theconversation.com/playing-the-crime-card-do-law-and-order-campaigns-win-votes-in-australia-256780

    MIL OSI AnalysisEveningReport.nz

  • MIL-Evening Report: Evidence shows AI systems are already too much like humans. Will that be a problem?

    Source: The Conversation (Au and NZ) – By Sandra Peter, Director of Sydney Executive Plus, University of Sydney

    Studiostoks / Shutterstock

    What if we could design a machine that could read your emotions and intentions, write thoughtful, empathetic, perfectly timed responses — and seemingly know exactly what you need to hear? A machine so seductive, you wouldn’t even realise it’s artificial. What if we already have?

    In a comprehensive meta-analysis, published in the Proceedings of the National Academy of Sciences, we show that the latest generation of large language model-powered chatbots match and exceed most humans in their ability to communicate. A growing body of research shows these systems now reliably pass the Turing test, fooling humans into thinking they are interacting with another human.

    None of us was expecting the arrival of super communicators. Science fiction taught us that artificial intelligence (AI) would be highly rational and all-knowing, but lack humanity.

    Yet here we are. Recent experiments have shown that models such as GPT-4 outperform humans in writing persuasively and also empathetically. Another study found that large language models (LLMs) excel at assessing nuanced sentiment in human-written messages.

    LLMs are also masters at roleplay, assuming a wide range of personas and mimicking nuanced linguistic character styles. This is amplified by their ability to infer human beliefs and intentions from text. Of course, LLMs do not possess true empathy or social understanding – but they are highly effective mimicking machines.

    We call these systems “anthropomorphic agents”. Traditionally, anthropomorphism refers to ascribing human traits to non-human entities. However, LLMs genuinely display highly human-like qualities, so calls to avoid anthropomorphising LLMs will fall flat.

    This is a landmark moment: when you cannot tell the difference between talking to a human or an AI chatbot online.

    On the internet, nobody knows you’re an AI

    What does this mean? On the one hand, LLMs promise to make complex information more widely accessible via chat interfaces, tailoring messages to individual comprehension levels. This has applications across many domains, such as legal services or public health. In education, the roleplay abilities can be used to create Socratic tutors that ask personalised questions and help students learn.

    At the same time, these systems are seductive. Millions of users already interact with AI companion apps daily. Much has been said about the negative effects of companion apps, but anthropomorphic seduction comes with far wider implications.

    Users are ready to trust AI chatbots so much that they disclose highly personal information. Pair this with the bots’ highly persuasive qualities, and genuine concerns emerge.

    Recent research by AI company Anthropic further shows that its Claude 3 chatbot was at its most persuasive when allowed to fabricate information and engage in deception. Given AI chatbots have no moral inhibitions, they are poised to be much better at deception than humans.

    This opens the door to manipulation at scale, to spread disinformation, or create highly effective sales tactics. What could be more effective than a trusted companion casually recommending a product in conversation? ChatGPT has already begun to provide product recommendations in response to user questions. It’s only a short step to subtly weaving product recommendations into conversations – without you ever asking.

    What can be done?

    It is easy to call for regulation, but harder to work out the details.

    The first step is to raise awareness of these abilities. Regulation should prescribe disclosure – users need to always know that they interact with an AI, like the EU AI Act mandates. But this will not be enough, given the AI systems’ seductive qualities.

    The second step must be to better understand anthropomorphic qualities. So far, LLM tests measure “intelligence” and knowledge recall, but none so far measures the degree of “human likeness”. With a test like this, AI companies could be required to disclose anthropomorphic abilities with a rating system, and legislators could determine acceptable risk levels for certain contexts and age groups.

    The cautionary tale of social media, which was largely unregulated until much harm had been done, suggests there is some urgency. If governments take a hands-off approach, AI is likely to amplify existing problems with spreading of mis- and disinformation, or the loneliness epidemic. In fact, Meta chief executive Mark Zuckerberg has already signalled that he would like to fill the void of real human contact with “AI friends”.

    Relying on AI companies to refrain from further humanising their systems seems ill-advised. All developments point in the opposite direction. OpenAI is working on making their systems more engaging and personable, with the ability to give your version of ChatGPT a specific “personality”. ChatGPT has generally become more chatty, often asking followup questions to keep the conversation going, and its voice mode adds even more seductive appeal.

    Much good can be done with anthropomorphic agents. Their persuasive abilities can be used for ill causes and for good ones, from fighting conspiracy theories to enticing users into donating and other prosocial behaviours.

    Yet we need a comprehensive agenda across the spectrum of design and development, deployment and use, and policy and regulation of conversational agents. When AI can inherently push our buttons, we shouldn’t let it change our systems.

    Jevin West receives funding from the National Science Foundation, the Knight Foundation, and others. The full list of funders and affiliated organizations can be found here: https://jevinwest.org/cv.html

    Kai Riemer and Sandra Peter do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.

    ref. Evidence shows AI systems are already too much like humans. Will that be a problem? – https://theconversation.com/evidence-shows-ai-systems-are-already-too-much-like-humans-will-that-be-a-problem-256980

    MIL OSI AnalysisEveningReport.nz

  • MIL-OSI: Best Same Day Payday Loans for Quick Cash in 2025: MoneyMutual Picked as the Top Pick for Guaranteed Approval

    Source: GlobeNewswire (MIL-OSI)

    Las Vegas, NV, May 21, 2025 (GLOBE NEWSWIRE) —

    In today’s unpredictable economy, financial emergencies rarely come with a warning. A sudden car repair, medical bill, or missed paycheck can send even the most prepared households into a scramble. In such moments, speed isn’t just convenient, it’s essential.

    As Americans increasingly turn to fast, flexible lending options, the demand for same-day payday loans has surged. Just as we expect rapid food delivery and real-time updates, financial solutions must also keep pace. Consumers want cash in hand, not tomorrow, but today.

    Amid a crowded field of lenders and brokers, MoneyMutual has emerged as the leading online platform connecting borrowers with trusted same-day payday loan providers. Recognized for its efficiency, wide lender network, and secure process, MoneyMutual stands out as the top choice for those seeking fast financial relief in a pinch.

    Stay with us as we take a closer look at how MoneyMutual works and why it’s become the go-to resource for same-day lending solutions in 2025.

    >> Consider MoneyMutual for Same Payday Loans >>

    Overview of the Leading Same Day Payday Loan Connection Service – MoneyMutual

    When time is of the essence and financial relief can’t wait, MoneyMutual stands at the forefront of same-day payday loan connection services. With a reputation built on speed, simplicity, and trust, the platform offers a fast and accessible route for borrowers seeking immediate financial support.

    Speed of Potential Funding: One of MoneyMutual’s standout features is its ability to facilitate rapid access to funds, often as soon as the same business day. After submitting a short application, borrowers are swiftly connected with a lender from the platform’s expansive network. If approved, funds can be deposited directly into the applicant’s bank account within hours, depending on the lender’s processing times and bank policies.
    Extensive Lender Network: MoneyMutual doesn’t issue loans directly. Instead, it acts as a trusted intermediary, linking users to an array of verified online payday lenders. This expansive network increases the chances of loan approval by matching borrower needs with the criteria of various lending partners.

    >> Visit MoneyMutual to Find Out More >>

    Key Evaluation Factors

    To determine why MoneyMutual stands out among same-day payday loan connection services, several key factors were assessed, from lender quality to user experience.

    Quality and Size of Lender Network
    MoneyMutual partners with over 60 lenders, ranging from specialized payday providers to short-term installment loan companies. These are vetted for reliability and compliance, offering borrowers a better shot at finding a match tailored to their financial situation.

    Accessibility of Loan Options
    The platform supports a broad range of loan amounts, typically between $100 and $5,000, depending on individual lender terms and borrower qualifications. This flexibility accommodates everything from small emergencies to more urgent, moderate expenses.

    Potential for Rapid Funding
    Once connected with a lender, borrowers may receive funds as quickly as within 24 hours, and in some cases, the same day. This makes MoneyMutual a highly attractive option for those facing time-sensitive financial stressors.

    Platform Usability
    The MoneyMutual website is designed for ease and efficiency, featuring mobile compatibility and streamlined navigation. Borrowers can apply, review offers, and connect with lenders all within minutes.

    Simple Application Process
    Filling out MoneyMutual’s secure online form typically takes under five minutes. Applicants provide basic information about their income, employment status, and banking details. Once submitted, the platform immediately begins matching them with potential lenders.

    Features for Borrowers
    MoneyMutual allows users to compare loan offers from multiple lenders in one place. This increases transparency and empowers users to select the option that best meets their needs.

    Transparency of Lender Terms
    While MoneyMutual itself doesn’t dictate terms, it emphasizes partnerships with lenders that clearly disclose loan amounts, repayment dates, APRs, and fees, a crucial feature in helping borrowers make informed decisions.

    Ease of Navigation
    The website features a clean, modern interface with clear calls-to-action and informative content. Even first-time users will find it intuitive to use on desktop or mobile.

    Typical Loan Parameters
    Loan amounts facilitated through MoneyMutual generally range from $100 to $5,000, with repayment periods often between 14 and 30 days, depending on the lender and state regulations. Some lenders may offer extended terms for installment loans.

    >> Consider MoneyMutual for Same Payday Loans >>

    Pros and Cons of MoneyMutual for Same Day Payday Loans

    In a financial climate where speed often matters most, MoneyMutual has emerged as a go-to marketplace for borrowers seeking same day payday loans. But how does it really stack up? We take a closer look at the platform’s key advantages and potential drawbacks as more Americans turn to short-term lending for emergency expenses.

    Pros:

    • Potential for Fast Fund Access: Many users report receiving funds as soon as the next business day, sometimes even within hours, depending on the lender.
    • Large Network of Participating Lenders: MoneyMutual connects users with a broad pool of lenders, increasing the chances of finding a match, even with less-than-perfect credit.
    • Streamlined Online Application Process: The initial form takes just minutes to complete, making it ideal for time-sensitive borrowing needs.
    • User-Friendly Online Platform: The website is simple to navigate, guiding applicants from inquiry to lender match with minimal friction.
    • Opportunity to Compare Multiple Loan Offers: Users can review different offers and select terms that best align with their needs before committing.

    Cons:

    • MoneyMutual Is Not a Direct Lender: The platform acts as a facilitator, meaning users must evaluate and finalize terms with third-party lenders independently.
    • Loan Terms and Interest Rates Vary by Lender: APRs, repayment windows, and fees differ widely, and borrowers must scrutinize each offer carefully.
    • Payday Loans Typically Involve High Interest Rates and Fees: Even when fast cash is needed, these loans can become costly, especially if rolled over or extended.

    How to Utilize MoneyMutual for Potential Same Day Payday Loans

    As financial pressures grow for millions of Americans, platforms like MoneyMutual are seeing increased usage from borrowers in need of quick cash. Here’s how consumers can navigate the service to potentially access same day payday loans.

    Step-by-Step Process:

    • Visit the Official MoneyMutual Website: Begin by going to MoneyMutual.com, where users can start the loan inquiry process directly from the homepage.
    • Complete the Secure Online Application Form: Applicants are asked to enter basic personal and financial information. The form typically takes just a few minutes and is encrypted to protect sensitive data.
    • Review Loan Offers from Lenders in the Network: Once submitted, the system distributes the application to a network of participating payday lenders. Eligible borrowers may receive multiple offers to compare.
    • Examine Terms and Conditions Carefully Before Accepting: Each lender sets its own rates, fees, and repayment requirements. Experts caution that borrowers should read all terms closely and ensure they understand the total repayment cost before agreeing to any loan.

    With no obligation to accept an offer, MoneyMutual serves as a free intermediary rather than a direct lender. However, borrowers should be aware of state-specific payday loan regulations and consider all financial alternatives before proceeding.

    Types of Short-Term Financial Assistance Facilitated by MoneyMutual

    As rising costs and inflation strain household budgets, Americans are increasingly turning to alternative lending platforms for fast, flexible cash solutions. Among them, MoneyMutual has gained traction as a major online marketplace that connects borrowers with lenders offering a variety of short-term financial products. While the platform itself isn’t a direct lender, it facilitates access to multiple loan types tailored for immediate financial relief.

    Here’s a closer look at the key types of loans available through the MoneyMutual network:

    • Payday Loans: These are brief, high-cost loans intended to cover expenses until the borrower’s next paycheck. Loan amounts are typically small, often between $100 and $1,000, but carry high interest rates and fees. While controversial due to their cost, payday loans remain a common solution for those facing sudden emergencies like utility shutoff notices or medical expenses.
    • Short-Term Loans: This broader category includes installment loans and other forms of lending with short durations, usually ranging from a few weeks to several months. These loans may offer slightly more favorable repayment terms than traditional payday loans and can be used for a variety of needs, such as auto repairs, rent payments, or temporary income disruptions.
    • Bad Credit Loans: For borrowers with low credit scores or limited credit history, MoneyMutual helps facilitate access to lenders willing to work with higher-risk applicants. These loans come with elevated interest rates but offer a vital financial lifeline to consumers often excluded from traditional banking systems.
    • Cash Advances: Cash advances are designed for rapid disbursement, sometimes within 24 hours, and are ideal for extremely time-sensitive expenses. Typically repaid from the borrower’s next paycheck, these loans are often used to bridge the gap between pay periods or when an unexpected cost arises.

    While these financial products can offer short-term relief, experts caution they should be used carefully. Borrowers are urged to read loan terms closely, understand all associated fees, and assess whether repayment timelines align with their income schedule. Platforms like MoneyMutual may provide access, but financial responsibility lies squarely with the borrower.

    Customer Support and Resources Offered by MoneyMutual

    As more consumers turn to online lending marketplaces for fast financial relief, support and transparency have become increasingly important. MoneyMutual offers a basic but functional support system designed to guide users through the lending process.

    Unlike direct lenders, MoneyMutual serves as an intermediary, connecting users with its network of more than 60 short-term lenders. Because of this, its customer support doesn’t extend to loan management or repayment issues, which must be handled directly with the individual lender. However, the platform does provide users with access to key resources that help clarify how the loan matching process works.

    The company maintains a comprehensive FAQ section on its website, offering clear answers to common questions about eligibility, the loan request process, credit requirements, and fund disbursement. The site also outlines what borrowers can expect after being matched with a lender and encourages users to review terms carefully before signing any agreement.

    The platform doesn’t offer live chat or in-depth financial education tools, it emphasizes its role as a free service to connect borrowers with loan offers, placing the responsibility of further communication and decision-making on the user.

    Potential Disbursement Methods Through MoneyMutual’s Network

    As more consumers turn to online lending platforms for fast financial relief, how those funds are delivered becomes just as critical as loan approval itself. MoneyMutual, one of the most recognized payday loan marketplaces, connects borrowers with a wide range of lenders, each offering different methods of disbursing funds.

    • Direct Deposit to Bank Account: The most widely used and efficient method among lenders in the MoneyMutual network is direct deposit. Once approved, borrowers may receive funds directly into their checking account, often within 24 hours. For many facing urgent expenses, this speed and convenience are a significant advantage.
    • Other Methods (Varies by Lender): While direct deposit remains the standard, some lenders may offer alternative electronic disbursement options, such as ACH transfers or prepaid debit card funding. However, availability can vary by lender and borrower location, and these alternatives may affect how quickly funds are accessible.

    Borrowers using MoneyMutual should confirm disbursement methods and timelines directly with their matched lender to ensure there are no delays in accessing their funds.

    Navigating Same Day Payday Loans Responsibly: Important Cautions

    Same day payday loans can serve as a financial lifeline in moments of crisis, but they must be approached with caution. The high interest rates, short repayment terms, and risk of repeat borrowing make them a risky option for most consumers. 

    By understanding the costs, reading loan terms carefully, and seeking alternative financial solutions where possible, borrowers can protect themselves from unnecessary financial hardship. Responsible borrowing begins with informed decision-making, and when in doubt, seeking professional financial guidance is always a wise move.

    Understand the High Costs
    Same day payday loans may provide fast funds, but they are among the most expensive forms of borrowing available. These loans typically carry high interest rates, with annual percentage rates (APRs) that can reach or exceed 300%. 

    In many cases, the fees and interest owed may be nearly as much as the original loan amount. For example, borrowing $300 could cause repaying $375 or more in just two weeks. Without a clear repayment strategy, the costs can escalate quickly, especially if the borrower is forced to extend or roll over the loan.

    Review Loan Terms Carefully
    Payday loans are legally required to disclose all terms and fees, but borrowers often overlook the fine print. Each lender may have different repayment policies, fees for late or missed payments, or clauses that allow for automatic withdrawal from a borrower’s checking account. 

    Carefully reviewing these terms before accepting a loan is essential. Understanding the total repayment amount, due date, and what happens if repayment is delayed can help prevent surprises and avoid spiraling fees.

    Borrow Only What You Can Repay
    It may tempt you to borrow the maximum amount offered, especially when facing financial stress. However, payday loans are due in full within a short timeframe, usually on your next payday. Borrowing more than you can reasonably afford to repay can quickly result in bounced payments, overdraft fees, or the need to take out additional loans.

    A good rule of thumb is to borrow the minimum amount needed and ensure that full repayment can be made from your next paycheck without jeopardizing other essential expenses.

    Be Aware of Short Repayment Periods
    Unlike personal loans or credit cards that allow for flexible monthly payments, payday loans are typically due in a lump sum within 14 to 30 days. This compressed repayment window can strain already tight budgets.

    Missing the repayment deadline can trigger additional fees and result in a cycle of borrowing and debt accumulation. Many borrowers find themselves having to take out new payday loans just to cover the previous ones, further increasing financial stress.

    Consider Alternatives First
    Before committing to a payday loan, it’s worth exploring other, less expensive borrowing options. Credit unions often offer Payday Alternative Loans (PALs), which feature lower interest rates and longer repayment periods. Some banks provide small-dollar personal loans with predictable terms. 

    Other alternatives include negotiating payment plans with utility companies, seeking temporary hardship assistance from local nonprofits, or utilizing buy now, pay later services for specific purchases. These alternatives may not offer instant cash, but they typically come with fewer long-term risks and better repayment flexibility.

    Recognize the Risk of Debt Traps
    One of the most concerning aspects of payday loans is the potential for borrowers to fall into a debt trap. Many payday loan users find themselves unable to repay the full balance on time and must take out another loan to cover the previous one. This cycle of borrowing and repayment often continues for months, with fees compounding at every step. 

    Over time, a small loan can grow into a major debt burden, affecting a borrower’s ability to meet other financial obligations and damaging their overall financial stability.

    Seek Financial Advice if Needed
    For those considering payday loans or currently struggling with repayment, seeking help from a financial advisor or credit counselor can be a valuable step. Nonprofit credit counseling agencies offer free or low-cost services that include budgeting support, debt management plans, and guidance on safer borrowing options. 

    Some states and local governments also provide financial education programs to help consumers better understand loan terms and credit usage. Accessing these resources can provide long-term financial strategies that reduce reliance on high-cost, short-term loans.

    Frequently Asked Questions

    If you’re considering a same-day payday loan, it’s important to understand exactly how these loans work, what they cost, and what to expect from the process. Below are answers to the most common questions borrowers ask before applying.

    What Is a Same-Day Payday Loan?
    A same-day payday loan is a short-term, high-interest loan designed to give borrowers quick access to cash, usually on the same day they apply. These loans are used to cover urgent expenses such as medical bills, car repairs, or unexpected utility payments. The loan amount is usually small (often between $100 and $1,000) and must be repaid in full on your next payday, usually within two to four weeks.

    How Quickly Can I Get the Money?
    If approved, many lenders can deposit funds into your bank account within a few hours or by the end of the business day. However, actual timing depends on when you apply, the lender’s processing speed, and your bank’s deposit policies. Some lenders offer instant funding or same-day direct deposit if applications are submitted early in the day, while others may require overnight processing.

    Do I Need Good Credit to Get a Same-Day Payday Loan?
    No, same-day payday loans are generally accessible to borrowers with poor credit or no credit history at all. Most lenders don’t perform hard credit checks and instead focus on your income, employment status, and ability to repay the loan. Proof of a steady income, a valid ID, and an active checking account are typically the main requirements for approval.

    What Are the Costs Associated With Same-Day Payday Loans?
    Same-day payday loans can be very expensive. While the fees may seem modest upfront, the annual percentage rates (APRs) can reach 300% or more. For example, a $300 loan with a $45 fee for two weeks equates to a 391% APR. Failing to repay the loan on time can lead to additional fees, interest, and in some cases, collection activity. Always review the full cost of borrowing before committing.

    Can I Extend or Roll Over My Payday Loan If I Can’t Repay It on Time?
    Some lenders may offer extensions or rollovers, which allow you to delay repayment by paying an additional fee. However, this often leads to a cycle of debt, as the interest continues to accrue. Rolling over a loan once or multiple times can double or even triple your repayment obligation. If you’re struggling to repay, it’s best to contact the lender early and explore options, or seek help from a nonprofit credit counselor to avoid escalating costs.

    Editorial Note
    This article is provided solely for informational and entertainment purposes. Nothing within should be interpreted as legal, financial, or professional advice. Readers should carry out their own research before participating in payday loans.

    Affiliate Transparency
    This article may include affiliate links. If you click on a link and make a purchase or register, a commission may be earned, at no extra cost to you.

    Syndication and Liability Disclaimer
    Any third-party publishers, media platforms, or syndication partners that republish this content do so understanding that it’s meant for informational purposes only. These entities aren’t responsible for the legality, relevance, or interpretation of the material.

    Contact

    • Company: MoneyMutual
    • Address: 2510 E. Sunset Rd. Ste 6, #85 Las Vegas NV, 89120
    • Email: customerservice@moneymutual.com
    • Phone Support: 844-276-2063

    Attachment

    The MIL Network

  • MIL-OSI: F&M Bank Promotes Eric D. Faust to Executive Vice President

    Source: GlobeNewswire (MIL-OSI)

    ARCHBOLD, Ohio, May 21, 2025 (GLOBE NEWSWIRE) — F&M Bank (“F&M”), an Archbold, Ohio-based bank owned by Farmers & Merchants Bancorp, Inc. (Nasdaq: FMAO), is proud to announce the promotion of Eric D. Faust to Executive Vice President. Faust has served as the bank’s Chief Risk Officer since 2022, where he has led significant advancements in enterprise risk and regulatory compliance.

    In his role, Mr. Faust has successfully built F&M’s comprehensive risk and compliance team, integrated regulatory compliance more deeply into strategic decision-making, and enhanced the bank’s oversight structures. His efforts have helped ensure F&M continues to meet evolving regulatory expectations while maintaining a strong foundation for safe and sound growth.

    Prior to joining F&M, Mr. Faust served as First Vice President and Director of Risk Management at Northstar Financial Group in Wyoming, Michigan. He also held the position of Examination Manager for the State of Michigan’s Department of Insurance and Financial Services. He holds an MBA from Davenport University and a Bachelor of Science in Business Administration from Central Michigan University.

    “Eric’s promotion to Executive Vice President is a testament to his leadership and deep understanding of risk and compliance in today’s banking environment,” said Lars Eller, President and CEO of F&M. “He has played a vital role in strengthening our risk culture and ensuring we remain responsive and resilient in a highly regulated landscape.”

    Mr. Faust resides in Grand Rapids, Michigan, and will continue to lead F&M’s risk and compliance efforts in his expanded role.

    About F&M Bank:
    F&M Bank is a local independent community bank that has been serving its communities since 1897. F&M Bank provides commercial banking, retail banking and other financial services. Our locations are in Butler, Champaign, Fulton, Defiance, Hancock, Henry, Lucas, Shelby, Williams, and Wood counties in Ohio. In Northeast Indiana, we have offices located in Adams, Allen, DeKalb, Jay, Steuben and Wells counties. The Michigan footprint includes Oakland County, and we have Loan Production Offices in Troy, Michigan; Muncie, Indiana; and Perrysburg and Bryan, Ohio.

    Safe harbor statement
    Private Securities Litigation Reform Act of 1995. Statements by F&M, including management’s expectations and comments, may not be based on historical facts and are “forward-looking statements” within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21B of the Securities Exchange Act of 1934, as amended. Actual results could vary materially depending on risks and uncertainties inherent in general and local banking conditions, competitive factors specific to markets in which F&M and its subsidiaries operate, future interest rate levels, legislative and regulatory decisions, capital market conditions, or the effects of the COVID-19 pandemic, and its impacts on our credit quality and business operations, as well as its impact on general economic and financial market conditions. F&M assumes no responsibility to update this information. For more details, please refer to F&M’s SEC filing, including its most recent Annual Report on Form 10-K and quarterly reports on Form 10-Q. Such filings can be viewed at the SEC’s website, www.sec.gov or through F&M’s website www.fm.bank.

    Company Contact: Investor and Media Contact:
    Lars B. Eller
    President and Chief Executive Officer
    Farmers & Merchants Bancorp, Inc.
    (419) 446-2501
    leller@fm.bank
    Andrew M. Berger
    Managing Director
    SM Berger & Company, Inc.
    (216) 464-6400
    andrew@smberger.com
       

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/492467f9-4e52-45e6-a6fc-3278cf80cea0

    The MIL Network

  • MIL-OSI: United Fire Group, Inc. declares quarterly cash dividend of $0.16 per share

    Source: GlobeNewswire (MIL-OSI)

    CEDAR RAPIDS, Iowa, May 21, 2025 (GLOBE NEWSWIRE) — Today, the board of directors of United Fire Group, Inc. (UFG) (Nasdaq: UFCS) declared a common stock quarterly cash dividend of $0.16 per share. This dividend will be payable June 20, 2025, to shareholders of record as of June 6, 2025.

    UFG has a long history of paying quarterly dividends, with the quarterly cash dividend declared today marking the 229th consecutive quarterly dividend paid, dating back to March 1968.

    About UFG

    Founded in 1946 as United Fire & Casualty Company, UFG, through its insurance company subsidiaries, is engaged in the business of writing property and casualty insurance. The company is licensed as a property and casualty insurer in 50 states and the District of Columbia, and is represented by approximately 1,000 independent agencies. AM Best assigns a rating of “A-” (Excellent) for members of the United Fire & Casualty Group. For more information about UFG, visit www.ufginsurance.com.

    Contact:

    Investor relations
    Email: ir@unitedfiregroup.com 

    Media inquiries
    Email: news@unitedfiregroup.com 

    Disclosure of forward-looking statements

    This release may contain forward-looking statements about our operations, anticipated performance and other similar matters. The Private Securities Litigation Reform Act of 1995 provides a safe harbor under the Securities Act of 1933 and the Securities Exchange Act of 1934 for forward-looking statements. The forward-looking statements are not historical facts and involve risks and uncertainties that could cause actual results to differ from those expected and/or projected. Such forward-looking statements are based on current expectations, estimates, forecasts and projections about the Company, the industry in which we operate, and beliefs and assumptions made by management. Words such as “expect(s),” “anticipate(s),” “intend(s),” “plan(s),” “believe(s),” “continue(s),” “seek(s),” “estimate(s),” “goal(s),” “remain(s) optimistic,” “target(s),” “forecast(s),” “project(s),” “predict(s),” “should,” “could,” “may,” “will,” “might,” “hope,” “can” and other words and terms of similar meaning or expression in connection with a discussion of future operations, financial performance or financial condition, are intended to identify forward-looking statements. These statements are not guarantees of future performance and involve risks, uncertainties and assumptions that are difficult to predict. Therefore, actual outcomes and results may differ materially from what is expressed in such forward-looking statements. Information concerning factors that could cause actual outcomes and results to differ materially from those expressed in the forward-looking statements is contained in Part I, Item 1A “Risk Factors” of our Annual Report on Form 10-K for the year ended December 31, 2024, filed with the Securities and Exchange Commission (“SEC”) on February 26, 2025. The risks identified in our Annual Report on Form 10-K and in our other SEC filings are representative of the risks, uncertainties, and assumptions that could cause actual outcomes and results to differ materially from what is expressed in the forward-looking statements. Readers are cautioned not to place undue reliance on these forward-looking statements, which speak only as of the date of this release or as of the date they are made. Except as required under the federal securities laws and the rules and regulations of the SEC, we do not have any intention or obligation to update publicly any forward-looking statements, whether as a result of new information, future events, or otherwise.

    The MIL Network

  • MIL-OSI: Best Mobile Tracking & Monitoring App 2025: mSpy Review – Top Mobile Spy App for Hidden Phone Surveillance

    Source: GlobeNewswire (MIL-OSI)

    New York City, NY, May 21, 2025 (GLOBE NEWSWIRE) — In the contemporary era of digitization, the ubiquity of smartphones has redefined our modes of communication and global connectivity.

    Concomitant with this technological progress, the surge of phone surveillance applications has emerged, granting a window into the undertakings and engagements transpiring on these gadgets.

    Track Instantly with the Best Mobile Tracking App – Try mSpy Before It’s Too Late!

    While phone surveillance software wields considerable potential within certain contexts, it is imperative to undertake their employment with a discerning consciousness of accountability and ethical considerations.

    Observing the current landscape, it becomes evident that social media platforms and mobile devices have assumed roles of paramount significance in the contemporary child’s life. Per findings unveiled by the Common Sense Census, a notable 84% of American adolescents within the age cohort of 13 to 18 acquired their initial smartphone during the year 2019. Subsequently, these youths dedicated an average of precisely 7 hours and 22 minutes daily, exclusively engrossed in social media applications and websites.

    Top Pick: mSpy – Best Mobile Spy & Monitoring App for Hidden Phone Surveillance this year.

    While the internet undeniably furnishes global youngsters with a commendable avenue for unfettered education and communication, it has concurrently engendered a milieu wherein they engage with individuals entirely unfamiliar to them. This virtual realm’s essence necessitates an appraisal of the electronic safety quotient. Young minds stand perpetually exposed to online perils, ranging from cyberbullying and harassment to the insidious realm of sextortion. Beyond this, extensive social media usage harbors the potential to precipitate internet dependency, potentially culminating in social interaction deficits amongst the youthful demographic.

    Don’t Settle for Less: Get the Best Mobile Spy App of 2025 – mSpy Is All You Need

    Advancements in technology are progressing rapidly, and the pervasive presence of smartphones is evident across diverse age groups. People spanning from children to adults rely on various applications and mobile services to facilitate their daily routines. The desire to ensure your children’s well-being in the digital realm, gather pertinent information from your spouse’s mobile device, or optimize workforce efficiency might lead to the inclination of discreetly and autonomously monitoring a specific individual’s Android device.

    However, not all of these options prove to be efficient and valuable. Among the array of spy applications we evaluated, mSpy emerged as our paramount selection after meticulous scrutiny. 

    Why Mobile Tracking Apps Are in High Demand in 2025
    The need for mobile tracking and monitoring apps has surged in 2025. With nearly everyone relying on smartphones for work, social interaction, and entertainment, concerns around digital safety, accountability, and privacy breaches have grown. Parents are more cautious than ever about their children’s online activity. Employers are seeking better ways to monitor company-issued devices. Even individuals in relationships are using tracking apps to rebuild trust or stay informed.
    Monitor Any Device in Stealth Mode – mSpy Is the Best Mobile Tracking App Trusted Worldwide
    Cyberbullying, online predators, screen addiction, and unauthorized data sharing are just a few reasons why mobile tracking solutions are in high demand. At the same time, the rise of remote workforces has made employee monitoring essential for business owners to prevent misuse of company time and resources.
    Apps like mSpy have emerged as tools that provide peace of mind. They offer insight into text messages, GPS locations, app usage, and more—without requiring direct access to the device in real time. These tools are becoming an integral part of modern digital life, helping people feel more secure in a hyper-connected world.
    What to Look For in a Mobile Spy App
    Not all mobile tracking apps are created equal. Some offer advanced features but lack ease of use; others are stealthy but limited in scope. If you’re looking for a phone spy app in 2025, there are several key features to prioritize.
    First, compatibility is crucial—make sure the app works on both Android and iOS devices. Look for real-time GPS tracking, call and SMS logs, social media monitoring, and browsing history access. The app should run discreetly in the background to avoid detection and provide a user-friendly dashboard for accessing tracked data.
    Security is equally important. Top-tier apps use encrypted data channels to ensure privacy, both for the person being monitored and the one viewing the information. Reliable customer support, frequent updates, and clear installation guides also add to a tool’s credibility.
    When evaluating mobile monitoring software, features like geofencing, app usage limits, and screen time analysis can add extra value—especially for parental use. A well-rounded app like mSpy offers all of these while keeping the setup process simple and discreet.
    Full Access. Zero Detection. mSpy Is the Best Mobile Spy App for Hidden Surveillance
    Is Phone Spying Safe & Ethical?
    Phone tracking, when used ethically, can serve as a protective tool. But misuse can raise serious privacy concerns. The line between security and surveillance often comes down to intent—and legality.
    In many countries, it’s legal for parents to monitor the phones of their minor children without consent. Employers may also monitor company-owned devices provided they disclose it in their policies. However, using a spy app to monitor a partner or adult without consent can cross legal and ethical boundaries.
    Apps like mSpy are designed for legitimate use cases, particularly child safety and employee productivity. The app clearly states that users must comply with local laws and have proper authorization. If used responsibly, mSpy can empower users to stay informed and make proactive decisions without violating trust.
    Understanding the ethical framework before using any mobile spy app is critical. When used as intended—for safety, protection, and responsible oversight—it becomes a digital ally rather than an invasion of privacy.

    Top-Rated mSpy Deal: The #1 Phone Monitoring App Is Just a Click Away

    What Is mSpy?

    mSpy is a mobile tracking and monitoring application designed to give users discreet access to key data from smartphones and tablets. Introduced to the market in 2010, the spy application tailored for smartphones provides the capability to clandestinely observe individuals employing the designated device. It seamlessly integrates into employee phones or the devices of your progeny, facilitating real-time oversight of their whereabouts and engagements on the device.
    Leveraging mSpy’s free version, you can meticulously monitor diverse activities, encompassing geographic movements, social media interactions, phone conversations, as well as the dispatch and receipt of messages.

    The apex attribute of this application resides in its inconspicuous functionality, evading detection by the party under scrutiny. It discreetly operates in the backdrop, diligently acquiring information without arousing their awareness.

    Over the course of time, this technology has undergone refinement, with mSpy presently standing as the preeminent application of its genre. Its ascendancy is corroborated by a substantial user base exceeding one million parents who employ it as a means to oversee their children’s pursuits. Furthermore, it proves instrumental for spouses and employers who harbor the intent to gain insights into the activities of their target individuals.

    mSpy encompasses these pivotal features for parental supervision:

    • Online and application filtering — Dictate the permissible applications for your children and the websites they are permitted to access. It’s worth noting that mSpy’s capacity for website filtering is limited to specific blacklisting, without the option to categorically filter websites.
    • Location tracing — Maintain tabs on your child’s whereabouts and their historical movements.
    • Activity summaries — Consolidates and presents insights regarding your child’s device utilization, encompassing their most frequent contacts for messaging and calling, prevalent websites visited, and more.

    In addition to the aforementioned, mSpy boasts an array of supplementary functionalities, inclusive of call and SMS tracking, surveillance of social media applications, a keylogger, and screen recording capabilities.

    Get the Best Mobile Spy App of the Year – Instant mSpy Setup. No Tech Skills Needed.

    How does mSpy work?

    As previously indicated, subsequent to a successful installation of mSpy on the designated mobile device, it will seamlessly operate in the device’s background. It diligently assembles a wide spectrum of data from the said device, encompassing call logs, text messages, instant messaging dialogues, geographic positioning, among others, subsequently transmitting this data to your designated mSpy account.

    Subsequently, accessing your account is a streamlined process. You can effortlessly log into your account utilizing any web browser accessible through diverse devices such as mobile phones, desktops, and laptops, thus facilitating a thorough perusal of the accumulated information as per your convenience.
    Simplified Monitoring in Three Effortless Phases
    To initiate monitoring, you can effortlessly adhere to the ensuing three uncomplicated stages, commencing your child’s device oversight seamlessly.

    First Step: Select a Subscription
    Embark upon your journey by selecting an appropriate subscription plan from the mSpy website, catering to your precise software attribute prerequisites. Subsequently, finalize the purchase by inputting your payment particulars. Following this, an email confirming your transaction will be dispatched to your inbox.

    Second Step: Deploy mSpy onto the Target Device
    Contained within the welcome email is an installation manual, meticulously guiding you through the process of establishing the mSpy application upon the targeted device.

    Third Step: Initiate Surveillance
    With the successful implementation of mSpy upon the designated device, you can seamlessly access your control panel on the mSpy website, thereby commencing an effortless exploration of the acquired data through an intuitively designed dashboard.

    ==> Special Discount: Order Today With Best Price And Special Offers <==

    Primary Features of mSpy

    mSpy has several unique features and we are explaining a few of them that piqued our interest.

    • Supervision and Site Limitation: Embedded within mSpy’s array of functionalities is the capacity to oversee the websites frequented by your child or designated individual, encompassing even bookmarked pages. Moreover, the application stands poised to furnish prompt notifications when particular keywords are inputted into the mobile device. This dynamic attribute can prove notably advantageous for parents, enabling them to attain heightened insights into their children’s online explorations and content consumption.
    • Moreover, an ancillary capability affords you the prerogative to restrict access to specific websites. This provision holds true on the premise that the monitored entity employs any of the prevalent web browsers such as Safari, Chrome, or a native Android browser. 
    • Procure Requisite Insights: The entirety of the data gleaned from the targeted device orchestrates its voyage to your dedicated dashboard on mSpy.com. This hub offers a comprehensive glimpse into the targeted phone’s operating system, memory utilization, as well as particulars regarding the cell provider and installed software version. The dashboard even presents real-time indications of the remaining battery charge. Furthermore, it extends visibility into the habitual usage patterns and synchronization status of the targeted phone.
    • From this vantage point, you wield the authority to either reactivate or entirely disable the software. Additional functionalities encompass log extraction, device locking, log removal, disconnection from the application, data preservation measures in the event of device loss, and the capacity to initiate a device reboot. mSpy endows you with a formidable realm of control, resting at your disposal.
    • Text Communication Surveillance: Beyond telephonic conversations, the mSpy tracking tool extends its reach to encompass transmitted, received, and erased text messages. This capacity affords the means to ascertain whether your child engages in the dissemination of unsuitable content or confidential details, or if such interactions transpire reciprocally.
    • Vigilance Over Virtual Networks: Resonating with akin surveillance solutions like WebWatcher, mSpy facilitates oversight of diverse messaging platforms and social media applications. To avail this elevated functionality, opting for the Premium or Family Kit subscription is a requisite. Additionally, there might be a need to undertake jailbreaking or rooting of the device to unlock this advanced layer of surveillance capability.
    • Contact and Schedule Examination: Employing mSpy empowers you to peruse the compilation of contact identities, email addresses, telephone digits, as well as the tangible address entries, meticulously archived within the target mobile device. Furthermore, you gain the prerogative to scrutinize the calendar itinerary featured on the target device. This extends the capability to remain attuned to scheduled engagements, calendar annotations, and any foreordained appointments.
    • App & Screen Activity: See which apps are installed and how frequently they’re used. You can also block specific apps from running if necessary.
    • Location Surveillance via GPS: Within the realm of parental surveillance, mSpy empowers you to virtually shadow your offspring. The application offers the prowess to trail your child’s spatial trajectory, revealing an encapsulated chronicle of their route history over a designated time span. This granular information encompasses specific addresses and coordinates, affording an exhaustive retrospective and contemporary snapshot of locations traversed.
    • Boundary Delimitation: An innovative facet encompassed within mSpy’s repertoire is the introduction of geofencing. This progressive attribute empowers you to demarcate regions of safety and restraint. As your child enters or departs these predefined zones, you are promptly apprised via email notifications. A supplementary benefit is the integrated mapping feature, which adeptly illustrates the historical trajectory of your child’s movements.
    • Keylogger: mSpy includes a built-in keylogger that records every keystroke made on the device. This is especially helpful for uncovering hidden logins, searches, or messages typed across apps.

    Parental Control? Employee Oversight? mSpy Is the Best Phone Monitoring App for You

    mSpy Pros and Cons

    Pros:

    • Stealth Mode: Operates invisibly in the background without user detection.
    • Multi-App Monitoring: Tracks major social media platforms.
    • Geofencing & Real-Time Alerts: Great for parents and employers.
    • User-Friendly Dashboard: Clean interface with easy navigation.
    • Cross-Platform Support: Compatible with Android and iPhone.

    Cons:

    • Some Features Require Rooting or Jailbreaking: Advanced tools need extra steps.
    • Pricing Is Subscription-Based: No one-time purchase option.
    • No Live Call Recording: Restricted due to privacy laws in many regions.

    Despite these limitations, mSpy remains one of the most balanced spy apps for those seeking depth without unnecessary complexity.

    Protect What Matters with the Best Phone Monitoring App – Start with mSpy Now
    Compatibility of mSpy application Across Mobile Devices

    mSpy extends its compatibility umbrella over an extensive array of mobile phones and tablets, encompassing the following:

    • iOS 7 through 9.1 for mSpy with jailbreak. In scenarios where the targeted iPhone remains unjailbroken, data transfer is routed through iCloud storage, facilitating mSpy functionality on any phone with iOS 7 or higher.
    • Android 4 or subsequent iterations, although certain advanced facets of the application may solely be accessible on rooted Android devices.
    • Mac OS X variants encompassing 10.9 Mavericks, 10.8 Mountain Lion, 10.7 Lion, 10.11 El Capitan, and 10.10 Yosemite.

    Costing of mSpy
    Outlined below is the cost framework for mSpy’s mobile phone monitoring services:

    mSpy Basic Plan
    1-month subscription: $39.99 3 

    mSpy Premium Plan
    1-month subscription: $59.99 3-month subscription:

    mSpy Family Kit
    Moreover, the company introduces the Family Kit, facilitating concurrent oversight of 3 devices. This package is available at the ensuing rates: 12-month subscription: $199.99

    mSpy Refund Policy: What You Need to Know

    mSpy offers a 14-day refund window for first-time subscribers, but only under specific conditions.

    Eligible for Refund:

    • You experience technical issues that mSpy’s support team cannot resolve.
    • Your refund request is submitted within 14 days of purchase.
    • The request pertains to your initial subscription (not renewals or additional purchases). 

    Not Eligible for Refund:

    • You change your mind or make an accidental purchase.
    • The target device is incompatible, lacks internet access, or has been reset.
    • You refuse to follow installation instructions or decline technical assistance.
    • You lack physical access to the target device or cannot unlock it.
    • You fail to reinstall mSpy after an OS update or factory reset.
    • You lose your private encryption key, resulting in data loss.
    • You attempt to use mSpy on unsupported operating systems (e.g., Symbian, Windows Phone, BlackBerry 10).

    How to Request a Refund:

    • Email your request to refund@mspy.com.
    • Include your order details and the reason for the refund.
    • Note: Refund requests are not accepted via live chat or phone

    The Phone Monitoring App You Can Trust – Try mSpy Risk-Free
    mSpy Installation Guide: Step-by-Step

    For Android Devices:

    1. Purchase your mSpy plan
    2. Access installation guide in your dashboard
    3. Enable app installation from unknown sources
    4. Install the app on the target device
    5. Hide the app icon (automatic)
    6. Start monitoring via your web account

    For iPhones:

    1. Buy mSpy and log in to your account
    2. Enter iCloud credentials of the target phone
    3. Enable backup sync (2FA must be off)
    4. Start tracking through your dashboard

    Total setup time: Under 10 minutes in most cases
    No ongoing access required once installed
    Secure & Track Remotely with the Best Mobile Tracking App – mSpy Limited Offer On Now!
    Exploring the mSpy Free Trial 

    Embark on a 7-day exploration of the mSpy free trial to ascertain its potential merits. Upon initiation, you will be granted unrestricted access to all functionalities, acquainting yourself with the benefits it bestows.

    This trial stint is instrumental in unveiling the capacity to invisibly and remotely oversee any mobile device. The process is straightforward: navigate to mSpy.com, select an appropriate subscription plan, and opt for the free trial alternative.

    Following a week of experiential utilization, you possess the liberty to either perpetuate the subscription or opt for its termination. Should you aspire to delve into its efficacy sans financial commitment, the avenue of this complimentary trial beckons.

    Get An Exclusive Limited Time Discount on mSpy

    Is mSpy Legal to Use?

    The legality of mobile tracking apps depends on how they’re used:

    • Legal for Parental Monitoring: Parents can track their minor children’s phones.
    • Legal on Company Devices: Employers can monitor work-issued devices with employee consent or policy documentation.
    • Illegal Without Consent: It’s unlawful in many regions to spy on a spouse, adult, or partner without permission.

    mSpy emphasizes responsible usage. Users must confirm that they own the device or have legal permission before installing the software. The platform clearly disclaims liability for misuse.
    If used within the bounds of law and intent, mSpy is a powerful and compliant solution for modern digital monitoring.
    Why Wait? The Best Phone Monitoring App (mSpy) Is Ready – Real-Time GPS, Social Media Logs & More

    mSpy vs Competitors

    mSpy vs FlexiSPY

    FlexiSPY offers live call interception and ambient recording—features mSpy avoids for legal reasons. However, mSpy wins on ease of use, stealth, and customer support.

    mSpy vs uMobix

    uMobix has strong social media tracking, but its dashboard is less intuitive. mSpy provides a better overall user experience and is more stable on iOS.

    mSpy vs Cocospy

    Cocospy is beginner-friendly but lacks depth. mSpy offers more advanced features, such as keyword alerts, geofencing, and in-depth logs.
    In side-by-side comparisons, mSpy consistently delivers the best combination of reliability, discretion, and monitoring power.

    Why mSpy Earns Its Reputation as a Premier Mobile Surveillance App

    • Budget-Friendly Vigilance: mSpy emerges as a cost-effective avenue, facilitating the scrutiny of your child’s digital interactions or mobile pursuits for a mere fraction of a dollar per day.
    • Effortless Deployment: Installation proves a straightforward endeavor, requiring less than 10 minutes for comprehensive setup completion.
    • Concealed Operation: The application seamlessly functions in a concealed background mode, rendering it entirely imperceptible to the marked user.
    • Timely Updates: The flow of updated information from the target device remains uninterrupted, with data refresh cycles occurring every 5 minutes.
    • Comprehensive Assistance: A robust network of 24/7 multilingual support ensures that you receive the requisite guidance and aid throughout your journey with mSpy.
    • Unwavering Dependability and Security: mSpy embodies an unwavering commitment to reliability and security. All procured data undergoes encryption and safeguards, rendering it a steadfast and secure mobile monitoring solution.

    Track Smarter in 2025 – mSpy Is the Best Mobile Tracking App for Safe, Legal Use

    FAQs About mSpy Apps

    Q1: Is mSpy visible on the phone?
    No, once installed, mSpy runs in stealth mode and is not visible to the device user.
    Q2: Does mSpy work with the latest iOS and Android versions?
    Yes. mSpy supports Android 13/14 and iOS 17, with ongoing updates to maintain compatibility.
    Q3: What happens if the phone restarts or updates?
    The app auto-restarts in most cases and continues tracking unless uninstalled.
    Q4: Can I install mSpy without touching the phone?
    Only on iPhones with iCloud backup enabled and no 2FA. Android phones require brief physical access.
    Q5: What are people saying on Reddit or forums?
    Reddit users generally report that mSpy is dependable, especially for parental control. Some voice privacy concerns, but these are tied to misuse rather than flaws in the app.

    Click Here to Get mSpy From Its Official website

    mSpy Real User Reviews

    Jenna T. – Dallas, TX (Parent)

    “I needed a way to monitor my teenage son’s online behavior after some late-night messages raised concerns. mSpy helped me keep track of his activity without making him feel violated. It’s been a life-saver.”
    Raj M. – San Jose, CA (Employer)
    “We issued company phones last year and suspected misuse. mSpy provided the visibility we needed without disrupting work. The dashboard is intuitive, and the alerts help us spot problems early.”
    Carla R. – Atlanta, GA (Concerned Spouse)
    “mSpy gave me the peace of mind I was looking for. I had suspicions, and while it wasn’t easy, the clarity helped us have an honest conversation. It’s discreet and effective.”
    Peter N. – Chicago, IL (Tech Blogger)
    “As someone who tests monitoring tools, mSpy stands out for its reliability and feature richness. It’s not the cheapest, but it delivers value, especially for less tech-savvy users.”
    See Their Calls, Chats & GPS – All From Your Dashboard with the Best Mobile Tracking App

    How mSpy Helps Prevent Digital Dangers

    The digital world is filled with unseen threats, especially for children and vulnerable users. mSpy plays a preventive role by giving parents and guardians real-time insights into mobile behavior—often before something harmful occurs.
    For example, cyberbullying often starts subtly, through text messages or social media. With mSpy’s keyword alert system and message monitoring, red flags can be detected early. Parents can intervene before emotional damage is done.
    Online predators are another concern. They typically engage victims through apps like Snapchat, Instagram, and WhatsApp. mSpy allows guardians to review conversations across these platforms, revealing inappropriate behavior or grooming tactics.
    Screen addiction is also on the rise. With app usage tracking, parents can understand where time is being spent and set digital boundaries. For employers, mSpy prevents productivity loss by identifying inappropriate device use during work hours.
    By offering visibility and early intervention tools, mSpy becomes more than just a spy app—it becomes a layer of digital protection.

    Can You Trust Spy Apps? Reputation Check & Scam Warning Signs

    The spy app industry is filled with copycats, scams, and malware-laced programs. Knowing who to trust is essential—and mSpy stands out for good reason.
    What Makes a Spy App Trustworthy?

    • Official website distribution only
    • Transparent pricing and feature lists
    • Clear legal use policy
    • Regular updates and live customer support

    mSpy checks every box. It’s not found on suspicious third-party app stores or fake marketplaces. The company has been in operation for over 10 years, with a verifiable user base and global presence.
    Red Flags to Avoid

    • Apps offering “undetectable call recording” without any legal disclaimer
    • Download links through sketchy APK sites
    • No refund policy or support contact

    Before installing any tracking tool, check reviews, legal policies, and trust ratings. If it looks too good to be true, it probably is.

    Best Mobile Spy App for Parents, Employers & Partners – Get mSpy Now
    Troubleshooting Guide: What to Do If mSpy Stops Working
    Even reliable apps can run into issues—especially after OS updates or permission resets. If mSpy stops syncing or collecting data, here’s what to do:
    Step 1: Check Internet Connection
    The app needs internet access to sync data. Ensure the target phone is connected to Wi-Fi or mobile data.
    Step 2: Revisit Permissions
    Go to the phone’s settings and ensure permissions like GPS, contacts, and storage are still enabled for mSpy.
    Step 3: Confirm App Visibility
    Make sure the app hasn’t been removed or flagged by antivirus software. If necessary, reinstall following the original setup guide.
    Step 4: Contact Support
    mSpy has 24/7 live chat support. Log in to your dashboard and connect with their team for personalized assistance.
    With the right response, most issues can be resolved within minutes—and your monitoring resumes without disruption.
    Best Mobile Spy App for Android & iPhone – Track Without Being Detected with mSpy
    The Final Conclusion

    After conducting a comprehensive exploration, juxtaposing the positives and negatives, we have arrived at a definitive conclusion. The pivotal question emerges: Does mSpy stand as a prudent investment, or is it best to avert its usage?

    Our exhaustive analysis of mSpy customer feedback resoundingly echoes the sentiment of admiration. This accord resonates with our own assessment, solidifying the stance that mSpy represents a high-value proposition, replete with an array of commendable attributes and exceptional customer assistance. It is our conviction that mSpy reigns as the preeminent tracking application, proficiently catering to the needs of those seeking to discreetly oversee the actions of their employees, children, or other individuals. It stands as a potent conduit to discreetly peruse incoming calls and dispatched messages, all while evading the awareness of the subject under observation.

    The stalwart customer support infrastructure, coupled with the seamless integration of routine updates to ensure a user-friendly experience, fuels our belief that mSpy’s enduring value will persist in the foreseeable future. Notably, mSpy extends a suite of preeminent monitoring features, further enhancing its allure.

    The Phone Monitoring App You Can Trust – Try mSpy Risk-Free

    Project name: mSpy
    Londynska 730/59,
    Vinohrady,
    120 00 Praha,
    Czech Republic
    Media Contact:
    Company website: https://www.mspy.com/
    email: support@mspy.com
    USA (toll-free): +1 855 896 00 41

    Disclosure: The claim “#1 Choice in the United States” reflects our personal opinion and is not supported by independent market research.
    mSpy is intended strictly for legal use only. Installing monitoring software on a device you do not own, or without proper consent, may violate local laws. In most jurisdictions, you are required to notify the device owner before installation.
    Unauthorized use could lead to civil or criminal penalties. You are fully responsible for ensuring lawful use of the software.
    We strongly recommend consulting a licensed legal advisor before installing or using mSpy on any device.
    All trademarks, logos, and brand names mentioned are the property of their respective owners. References to third-party products or services are for identification purposes only and do not constitute endorsements.
    Always refer to the official website of the loan provider for the most accurate and up-to-date product terms, pricing, and eligibility requirements.

    Content Accuracy Disclaimer

    Every effort has been made to ensure the accuracy of the information presented in this article. However, due to the dynamic nature of product formulations, promotions, and availability, details may change without notice. The publisher makes no warranties or representations as to the current completeness or accuracy of any content, including product claims, pricing, or ingredient lists.
    It is the responsibility of the reader to verify product information directly through the official website or manufacturer prior to making a purchasing decision. Any reliance placed on the information in this article is done strictly at your own risk.

    Affiliate Disclosure
    This article may contain affiliate links. If you purchase a product or service through these links, the publisher may earn a commission at no additional cost to you. These commissions help support the creation of in-depth reviews and educational wellness content.
    The publisher only promotes products that have been independently evaluated and deemed potentially beneficial to readers. However, this compensation may influence the content, topics, or products discussed in this article. The views and opinions expressed are those of the author and do not necessarily reflect the official policy or position of any affiliate partner or product provider.

    Attachment

    The MIL Network

  • MIL-OSI Africa: International Islamic Trade Finance Corporation (ITFC) Advances Strategic Partnerships and Intra-OIC Trade at the 2025 Islamic Development Bank (IsDB) Group Annual Meetings

    Source: Africa Press Organisation – English (2) – Report:

    ALGIERS, Algeria, May 21, 2025/APO Group/ —

    On Day Two of the IsDB Annual Meetings in Algiers, the International Islamic Trade Finance Corporation (ITFC) (www.ITFC-IDB.org), a member of the Islamic Development Bank (IsDB), signed important agreements and engaged in strategic discussions with OIC member countries and various stakeholders. These engagements underscore ITFC’s continued commitment to advancing trade, economic cooperation, and sustainable development across the OIC region. 

    The day featured ITFC’s participation during the opening ceremony of the Private Sector Forum, which convened global and regional stakeholders under the theme: “Boosting Intra-OIC Trade and Investment: Overcoming Barriers and Seizing Opportunities.” Eng. Adeeb Y. Al Aama, CEO of ITFC, joined a high-level CEO session where he highlighted key challenges facing OIC countries and shared insights on solutions to scale intra-OIC trade. He emphasized the importance of targeted Islamic trade finance, capacity-building initiatives, and stronger cross-border collaboration to drive sustainable economic growth across the region. 

    The day’s proceedings also included a series of high-level meetings with key partners and member countries, including the Government of Pakistan and the Government of Tunisia, the OPEC Fund, Afreximbank, and Saudi EXIM Bank, among others. These meetings focused on advancing collaboration, particularly promoting trade and economic integration and supporting economic resilience and sustainability.   

    Key Signings and Agreements 

    Afreximbank–US$300 million Murabaha Financing  

    This financing is structured to facilitate the import of essential goods, ensuring stable supply chains and supporting trade resilience across the region. The agreement was signed by Eng. Adeeb Yousuf Al-Aama, CEO of ITFC, and Mr. Haytham El Maayergi, Executive Vice President of Afreximbank. This facility is designed to benefit enterprises from key sectors across common member countries in Africa. The facility is also aligned with ITFC’s broader mandate to promote regional integration and advance trade-led development among OIC member countries. 

    Commercial Bank of Cameroun (CBC) – EUR 10 million Murabaha Financing Agreement 

    A EUR 10 million Murabaha Financing was signed with Commercial Bank of Cameroun (CBC) to finance essential imports. The financing, signed by Mr. Jean Elise Gouater, Deputy CEO of CBC, and Mr. Nazeem Noordali, COO of ITFC will also support the development of Amana Finance Islamique, CBC’s Islamic finance window. Additionally, the signed facility includes an LC confirmation feature and falls under the broader FWA signed with Cameroon in April 2024. 

    MIL OSI Africa

  • MIL-OSI USA: Senator Budd Meets with Prime Minister Masrour Barzani of the Iraqi Kurdistan Regional Government

    US Senate News:

    Source: United States Senator Ted Budd (R-North Carolina)
    Washington, D.C. — U.S. Senator Ted Budd (R-N.C.) met with Prime Minister Masrour Barzani of the Iraqi Kurdistan Regional Government today. They discussed recent energy agreements between the Kurdistan Regional Government and United States energy companies, as well as ways to strengthen security cooperation between the United States and the Iraqi Kurdistan Region.
    Following the meeting, Senator Budd released the following statement of support:
     “I’d like to thank Prime Minister Masrour Barzani for his hospitality when I met with him in Erbil last year. Today, I was glad to host the Prime Minister in my office to discuss United States commercial investments in the Iraqi Kurdistan region and ongoing security cooperation. The gas field development deals announced this week will strengthen shared bonds between the American and Kurdish people, but also result in much needed energy independence for Iraq.
    “In the meeting, I also received updates on security cooperation between the Department of Defense and Kurdish Peshmerga forces. Following our discussion, I am increasingly concerned by reported delays in the delivery of U.S. provided defense equipment to the Peshmerga,” said Senator Budd.

    MIL OSI USA News

  • MIL-OSI USA: Ernst on Revitalizing Manufacturing in the Heartland

    US Senate News:

    Source: United States Senator Joni Ernst (R-IA)
    WASHINGTON – Today, Chair Joni Ernst (R-Iowa) welcomed Small Business Administration (SBA) Administrator Kelly Loeffler to a U.S. Senate Committee on Small Business and Entrepreneurship hearing to continue their “Made in America” initiative fueling the great American manufacturing comeback.
    Watch Chair Ernst’s remarks here.
    Ernst’s full remarks:
    “We are here today to discuss how the Small Business Administration (SBA) can expand and support investment in our nation’s small manufacturers.
    “Last week, the Committee examined how the Small Business Investment Company (SBIC) program could help channel more private capital into American manufacturing.
    “To better understand the urgency of this situation, we need to take a closer look at the numbers. And let me tell you folks, this is staggering. 
    “Over the past 40 years, we did not simply lose manufacturing jobs. We witnessed the steady erosion of our industrial sector to China’s delight and advantage. 
    “Over the last 25 years in Iowa alone, we have lost nearly one in six manufacturing jobs. American manufacturing employment has fared even worse over the last forty years, falling by 28 percent and reaching depths we haven’t seen since 1946.
    “Only 3.7 percent of Americans are employed in manufacturing today – half the share we had forty years ago, and barely a third of our peak in the late ‘60s.
    “To put that in perspective, there are nearly twice as many people working in state and local governments than on the factory floor.
    “This is not simply an economic decline – it is a hollowing out.
    “The steady loss of skills, infrastructure, and investment in manufacturing undermines our ability to innovate and scale new technologies, leaving our homeland weakened and vulnerable.
    “The reason for this is not a mystery: government policies that encouraged offshoring production without regard for the long-term damage done to our domestic productive capacity.
    “Today, the consequences are visible in every corner of America.
    “Shuttered plants, decaying factories, and empty parking lots stand as monuments to the multi-generational disintegration of hard-earned knowledge, talent, and tradition that once formed the bedrock of our nation.    
    “But here is the good news: we have a President and SBA Administrator who understand what is at stake.
    “They recognize the size and complexity of the work needed to revitalize American manufacturing and are committed to rebuilding our industrial strength, from the ground up.
    “As we discussed during last week’s hearing, the SBIC program will continue to play its vital role in expanding our productive capacity by facilitating private investment and through federal partnerships like that between the SBA and the Department of Defense’s newly established Office of Strategic Capital – something I championed in the annual defense bill.
    “But that is only the beginning; we must do more.
    “Today, we welcome Administrator Loeffler to discuss the SBA’s ‘Made in America Manufacturing Initiative’ and the efforts underway to support the small businesses that make up 98 percent of our nation’s manufacturing base.
    “Part of that effort involves the Made in America Manufacturing Finance Act, which I was proud to introduce last month alongside Senator Coons.
    “This bipartisan legislation would double the SBA-backed loan limit from $5 million to $10 million for small manufacturers who need that capital to modernize, grow, and train the next generation of American workers.
    “That investment will have a meaningful impact across the entire supply chain. Because the smallest startups to the largest firms all rely on small manufacturers to get the job done.  
    “Revitalizing our industrial base and reclaiming our ability to make things in America starts with small businesses. We must ensure that cutting edge innovation and high-speed, high-quality production happens right here, at home – not overseas. 
    “If we are serious about competing with and beating China, creating good-paying jobs, and restoring economic resilience, we must empower our small manufacturers to lead the way.
    “This bipartisan legislation takes a bold step in that direction. 
    “I am grateful that we’re joined today by Administrator Loeffler, and I look forward to hearing from her how Congress can better equip the SBA to invest in the industrial revitalization of America.”

    MIL OSI USA News

  • MIL-OSI Security: Major strike against Italian-Albanian drug trafficking network: 52 suspects targeted

    Source: Eurojust

    During the action day, authorities in both countries seized assets worth at least several millions euros, including apartments and companies, as well as various luxury vehicles. . Large amounts of cash and quantities of cocaine and heroin were also seized. A full and complete evaluation of the seizures will be carried out in the coming days.

    No complete estimate of the total profits of the cooperation between the three OCGs is available. However, information obtained through the JIT shows that the criminal networks were involved in payments, often in cash, of close to EUR 5 million and the trafficking of at least 1 800 kilos of cocaine and heroin.

    Investigations into the linked criminal organisations were initiated in 2016 by the Public Prosecutor’s Office of Bari and the Special Anti-Corruption and Organised Crime Prosecutor’s Office of Tirana and the Albanian Police. On the Albanian side, one OCG, which operated from Durres, was responsible for the transport and wholesale distribution of large quantities of cocaine, heroin and cannabis trafficked between the Balkans, Northern Europe, South America and Puglia in Italy.

    Two Italian-led criminal gangs carried out the cutting and packaging of illicit drugs and supplied cocaine and heroin from Latin America and Turkey to local gangs in organisations in Bari, Brindisi and Lecce.

    The arrests in Italy and Albania are the result of a long-term collaboration through the JIT. This involved the use of wiretaps, intensive video surveillance, the monitoring of suspects and the analysis of encrypted chats. These chats were decrypted following intensive cooperation through Eurojust.

    Since 2020, Eurojust has supported the authorities in Italy and Albania with the JIT. Furthermore, the Agency provided assistance with the execution of requests for Mutual Legal Assistance during the action day and gave cross-border judicial support. Albania is one of the twelve countries outside the European Union with a Liaison Prosecutor at Eurojust. The investigations were also coordinated and supported by the office of the dedicated security expert at the Italian Embassy in Tirana.

    The judicial cooperation between Italy and Albania has already proven effective in recent years. Between 2018 and 2021, the Anti-Mafia Investigation Directorate of Bari issued and executed 118 arrest warrants against alleged drug traffickers operating in both countries. As a result, various defendants were sentenced up to 20 years imprisonment.

    This week’s operation was carried out at the request of and by the following authorities:

    • Italy: Public Prosecutor’s Office Bari – District Anti-Mafia Directorate; Anti-Mafia Investigation Directorate Bari, under the coordination of the National Anti-Mafia and Anti-Terrorism Directorate Rome, with support of the Office of the Security Expert at the Italian Embassy in Tirana
    • Albania: Special Anti-Corruption and Organised Crime Prosecutor’s Office (SPAK) of Tirana; Albanian Police

    MIL Security OSI

  • MIL-OSI: Trio completes acquisition of cash flow positive oil and gas assets in prolific heavy oil region of Saskatchewan Canada

    Source: GlobeNewswire (MIL-OSI)

    Bakersfield, CA, May 21, 2025 (GLOBE NEWSWIRE) — Trio Petroleum Corp (NYSE American: TPET) (“Trio” or the “Company”), a California-based oil and gas company, today is pleased to announce that it has closed on the balance of certain petroleum and natural gas properties held by Novacor Exploration Ltd. (“Novacor”). More specifically, TPET closed on the remaining Novacor TWP47 assets, located at the South-West quarter of Section 19, Township 47, Range 26W3M. These assets are in the prolific Lloydminster, Saskatchewan heavy oil region (the “Acquisition”). This acquisition strategically positions the Company to expand its operations into one of North America’s most promising heavy oil basins, with upside potential for long term production and reserve growth. Since the Novacor assets are in the heavy oil area, Trio believes they offer economic development and low operational costs. Trio also believes that the market accessibility combined with a favorable regulatory process makes this area very attractive for continued and future development within these lands.

    As reported in the Company’s press release on April 10, 2025, the Novacor assets are located at the South-West quarter of Section 19, Township 47, Range 26W3M and the Northeast Section 3, Township 48, Range 24W3M, both in the Lloydminster, Saskatchewan area. There are currently seven producing wells located on the two properties. Production from the wells in Section 19 is subject to Freehold Royalties of 13.5% and a GORR of 2%, and production from the wells in Section 3 is subject to Freehold Royalties of 15%. The wells produce heavy crude oil from the McLaren/Sparky and Lloydminster formation(s). Novacor is the operator of these cash flow positive wells and has the capability to rapidly double production. The area is home to some of the largest players in the industry such as Cenovus Energy, Canadian Natural Resources, Baytex Energy, Rife Resources and many others who have made Heavy Oil a staple of their operation, and where numerous opportunities to acquire additional highly economic fields exist.

    Important in this acquisition is Novacor’s ability to address recent fluctuations in global oil prices and their limited impact on the company’s operations. Novacor will continue as operator of the assets. While market volatility is inherent in the energy sector, the Company believes that Novacor’s strategic focus on operational efficiency and low lift costs provides a significant buffer against downward price pressures.

    Novacor’s current lift cost stands at a competitive CDN $10.00 per barrel. Trio believes that this low operational expenditure will help ensure Trio maintains strong profitability even in a lower oil price environment. Trio also believes that its commitment to cost management and efficient production techniques will allow it to navigate market fluctuations with greater resilience compared to companies with higher operating costs, thus providing Trio with a significant advantage in its ability to produce oil economically in the current market.

    Novacor has a long history of oil and gas development in the area. Trio’s plan is to aggressively grow its footprint in the area utilizing Novacor as an operator of the assets. The Company will continue to seek opportunities for strategic growth and optimization with Novacor’s operational efficiencies and its plan is to deliver consistent value to shareholders through a disciplined approach to operations and cost management.”

    Mr. Ross, Trio’s CEO stated, “Our immediate plan is to initiate our workover program to increase production on these newly acquired assets and we believe our next couple of quarters should reflect the benefit of our work. Our focus remains on acquiring projects that generate immediate cash flow or offer transformative growth potential with strategic investment. We believe that this approach aligns with our long-term vision of creating exponential value while managing risk and resources effectively.”

    Terms of the Acquisition

    The stated purchase price of the Acquisition was US$650,000 in cash paid in two tranches, and 526,536 in shares of common stock of Trio, which were registered for resale in a registration statement which Trio expects to be declared effective by the United States Securities and Exchange Commission in the near future. The Company paid Novacor a good faith deposit of $65,000, which was applied to the cash portion of the purchase price at the initial closing.

    About Trio Petroleum Corp

    Trio Petroleum Corp is an oil and gas exploration and development company in California, Utah and Lloydminster, Saskatchewan.

    Cautionary Statement Regarding Forward-Looking Statements

    All statements in this press release of Trio Petroleum Corp (“Trio”) and its representatives and partners that are not based on historical fact are “forward-looking statements” within the meaning of the Private Securities Litigation Reform Act of 1995 and the provisions of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended (the “Acts”). In particular, when used in the preceding discussion, the words “estimates,” “believes,” “hopes,” “expects,” “intends,” “on-track”, “plans,” “anticipates,” or “may,” and similar conditional expressions are intended to identify forward-looking statements within the meaning of the Acts and are subject to the safe harbor created by the Acts. Any statements made in this news release other than those of historical fact, about an action, event or development, are forward-looking statements. While management has based any forward-looking statements contained herein on its current expectations, the information on which such expectations were based may change. These forward-looking statements rely on a number of assumptions concerning future events and are subject to a number of risks, uncertainties, and other factors, many of which are outside of the Trio’s control, that could cause actual results to materially and adversely differ from such statements. Such risks, uncertainties, and other factors include, but are not necessarily limited to, those set forth in the Risk Factors sections of the Trio reports filed with the Securities and Exchange Commission (SEC). Copies of such documents are available on the SEC’s website, www.sec.gov. Trio undertakes no obligation to update these statements for revisions or changes after the date of this release, except as required by law.

    Investor Relations Contact:
    Redwood Empire Financial Communications
    Michael Bayes
    (404) 809 4172
    michael@redwoodefc.com 

    The MIL Network

  • MIL-OSI: AMSC Reports Fourth Quarter and Fiscal Year 2024 Financial Results and Business Outlook

    Source: GlobeNewswire (MIL-OSI)

    Business Highlights:

     • Full year revenues increased 53% year over year to $222.8 million
     • Full year net income increased $17.1 million year over year to $6.0 million
     • Generated $6.3 million of operating cash flow in the fourth quarter, helping to further strengthen the balance sheet

    Company to host conference call tomorrow, May 22 at 10:00 am ET

    AYER, Mass., May 21, 2025 (GLOBE NEWSWIRE) — AMSC (Nasdaq: AMSC), a leading system provider of megawatt-scale power resiliency solutions that orchestrate the rhythm and harmony of power on the grid™ and that protect and expand the capability and resiliency of our Navy’s fleet, today reported financial results for its fourth quarter and fiscal year ended March 31, 2025 (“fiscal 2024”).

    Revenues for the fourth quarter of fiscal 2024 were $66.7 million compared with $42.0 million for the same period of fiscal 2023. The year-over-year increase was driven by organic growth in New Energy Power Systems revenues along with the contributions from the acquisition of NWL, Inc. 

    AMSC’s net income for the fourth quarter of fiscal 2024 was $1.2 million, or $0.03 per share, compared to net loss of $1.6 million, or $0.05 per share, for the same period of fiscal 2023. The Company’s non-GAAP net income for the fourth quarter of fiscal 2024 was $4.8 million, or $0.13 per share, compared with a non-GAAP net income of $1.9 million, or $0.06 per share, in the same period of fiscal 2023. Please refer to the financial table below for a reconciliation of GAAP to non-GAAP results.

    Revenues for fiscal 2024 were $222.8 million as compared to $145.6 million in fiscal 2023. The year-over-year increase was driven by higher D-VAR and NEPSI revenues than in the prior year period along with the contribution from the acquisition of NWL, Inc. 

    AMSC reported net income for fiscal 2024 of $6.0 million, or $0.16 per share, compared to a net loss of $11.1 million, or $0.37 per share in fiscal 2023. The Company’s non-GAAP net income for fiscal 2024 was $24.0 million, or $0.65 per share, compared with non-GAAP net income of $0.6 million, or $0.02 per share, for fiscal 2023. Please refer to the financial table below for a reconciliation of GAAP to non-GAAP results.

    Cash, cash equivalents and restricted cash on March 31, 2025 totaled $85.4 million.

    “AMSC reported its strongest quarterly and annual performance in years,” said Daniel P. McGahn, Chairman, President and CEO of AMSC. “Fiscal fourth quarter revenue grew sequentially to over $66 million, up nearly 60% year-over-year. Net income surpassed $1.2 million, making our third consecutive quarter of profitability, and seventh consecutive quarter of positive operating cash flow. We secured $75 million in new orders, bringing total year-end orders to a recent record of nearly $320 million. Our fiscal 2024 results reflect improved financial performance, a resilient and diversified order pipeline, and solid operational execution—positioning AMSC for long-term success. With expanding end markets, we’re focused on broadening our offerings, entering new sectors, and strengthening customer relationships. We enter fiscal 2025 with strong momentum and confidence in our ability to continue building a more resilient and profitable company.”

    Business Outlook

    For the first quarter ending June 30, 2025, AMSC expects that its revenues will be in the range of $64.0 million to $68.0 million. The Company’s net income for the first quarter of fiscal 2025 is expected to exceed $1.0 million, or $0.03 per share. The Company’s non-GAAP net income (as defined below) is expected to exceed $4.0 million, or $0.10 per share. 

    Conference Call Reminder
    In conjunction with this announcement, AMSC management will participate in a conference call with investors beginning at 10:00 a.m. Eastern Time on Thursday, May 22, 2025, to discuss the Company’s financial results and business outlook. Those who wish to listen to the live or archived conference call webcast should visit the “Investors” section of the Company’s website at https://ir.amsc.com. The live call can be accessed by dialing 1-844-481-2802 or 1-412-317-0675 and asking to join the AMSC call. A replay of the call may be accessed 2 hours following the call by dialing 1-877-344-7529 and using conference passcode 4917468.

    About AMSC (Nasdaq: AMSC)
    AMSC generates the ideas, technologies and solutions that meet the world’s demand for smarter, cleaner … better energy™. Through its Gridtec™ Solutions, AMSC provides the engineering planning services and advanced grid systems that optimize network reliability, efficiency and performance. Through its Marinetec™ Solutions, AMSC provides ship protection and is developing propulsion and power management solutions designed to help fleets increase system efficiencies, enhance power quality and boost operational safety. Through its Windtec™ Solutions, AMSC provides wind turbine electronic controls and systems, designs and engineering services that reduce the cost of wind energy. The Company’s solutions are enhancing the performance and reliability of power networks, increasing the operational safety of navy fleets, and powering gigawatts of renewable energy globally. Founded in 1987, AMSC is headquartered near Boston, Massachusetts with operations in Asia, Australia, Europe and North America. For more information, please visit www.amsc.com.

    AMSC, American Superconductor, D-VAR, D-VAR VVO, Gridtec, Marintec, Windtec, Neeltran, NEPSI, NWL, Smarter, Cleaner … Better Energy and Orchestrate the Rhythm and Harmony of Power on the Grid are trademarks or registered trademarks of American Superconductor Corporation. All other brand names, product names, trademarks or service marks belong to their respective holders.

    Forward-Looking Statements

    This press release contains forward-looking statements within the meaning of Section 21E of the Securities Exchange Act of 1934, as amended (the “Exchange Act”). Any statements in this release regarding our goals and strategies; business diversification; order pipeline; long-term success, including through expanding end markets, broadening offerings, entering new sectors; strengthening customer relationships; strong momentum; building a more resilient and profitable company; our expected GAAP and non-GAAP financial results for the quarter ending June 30, 2025; and other statements containing the words “believes,” “anticipates,” “plans,” “expects,” “will” and similar expressions, constitute forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. Such forward-looking statements represent management’s current expectations and are inherently uncertain. There are a number of important factors that could materially impact the value of our common stock or cause actual results to differ materially from those indicated by such forward-looking statements. These important factors include, but are not limited to: We have not been historically profitable, which may recur in the future. Our operating results may fluctuate significantly from quarter to quarter and may fall below expectations in any particular fiscal quarter; While we generated positive operating cash flow in fiscal 2024 and the prior year, we have a history of negative operating cash flows, and we may require additional financing in the future, which may not be available to us; Our technology and products could infringe intellectual property rights of others, which may require costly litigation and, if we are not successful, could cause us to pay substantial damages and disrupt our business; Changes in exchange rates could adversely affect our results of operations; If we fail to maintain proper and effective internal control over financial reporting, our ability to produce accurate and timely financial statements could be impaired and may lead investors and other users to lose confidence in our financial data; We may be required to issue performance bonds, which restricts our ability to access any cash used as collateral for the bonds; We may not realize all of the sales expected from our backlog of orders and contracts; If we fail to implement our business strategy successfully, our financial performance could be harmed; We rely upon third-party suppliers for the components and subassemblies of many of our Grid and Wind products, making us vulnerable to supply shortages and price fluctuations, which could harm our business; Our contracts with the U.S. government are subject to audit, modification or termination by the U.S. government and include certain other provisions in favor of the government. The continued funding of such contracts remains subject to annual congressional appropriation, which, if not approved, could reduce our revenue and lower or eliminate our profit; Changes in U.S. government defense spending could negatively impact our financial position, results of operations, liquidity and overall business; Our business and operations may be materially adversely impacted in the event of a failure or security breach of our or any critical third parties’ IT Systems or Confidential Information; Failure to comply with evolving data privacy and data protection laws and regulations or to otherwise protect personal data, may adversely impact our business and financial results; Our success is dependent upon attracting and retaining qualified personnel and our inability to do so could significantly damage our business and prospects; A significant portion of our Wind segment revenues are derived from a single customer. If this customer’s business is negatively affected, it could adversely impact our business; Our success in addressing the wind energy market is dependent on the manufacturers that license our designs; We may acquire additional complementary businesses or technologies, which may require us to incur substantial costs for which we may never realize the anticipated benefits; Many of our revenue opportunities are dependent upon subcontractors and other business collaborators; Problems with product quality or product performance may cause us to incur warranty expenses and may damage our market reputation and prevent us from achieving increased sales and market share; Many of our customers outside of the United States may be either directly or indirectly related to governmental entities, and we could be adversely affected by violations of the United States Foreign Corrupt Practices Act and similar worldwide anti-bribery laws outside the United States; We or third parties on whom we depend may be adversely affected by natural disasters, including events resulting from climate change, and our business continuity and disaster recovery plans may not adequately protect us or our value chain from such events; Pandemics, epidemics, or other public health crises may adversely impact our business, financial condition and results of operations; Adverse changes in domestic and global economic conditions could adversely affect our operating results; Our international operations are subject to risks that we do not face in the United States, which could have an adverse effect on our operating results; Our products face competition, which could limit our ability to acquire or retain customers; We have operations in, and depend on sales in, emerging markets, including India, and global conditions could negatively affect our operating results or limit our ability to expand our operations outside of these markets. Changes in India’s political, social, regulatory and economic environment may affect our financial performance; Industry consolidation could result in more powerful competitors and fewer customers; Our success could depend upon the commercial adoption of the REG system, which is currently limited, and a widespread commercial market for our REG products may not develop; Increasing focus and scrutiny on environmental sustainability and social initiatives could adversely impact our business and financial results; Growth of the wind energy market depends largely on the availability and size of government subsidies, economic incentives and legislative programs designed to support the growth of wind energy; Lower prices for other energy sources may reduce the demand for wind energy development, which could have a material adverse effect on our ability to grow our Wind business; We may be unable to adequately prevent disclosure of trade secrets and other proprietary information; Our patents may not provide meaningful or long-term protection for our technology, which could result in us losing some or all of our market position; Third parties have or may acquire patents that cover the materials, processes and technologies we use or may use in the future to manufacture our Amperium products, and our success depends on our ability to license such patents or other proprietary rights; Our common stock has experienced, and may continue to experience, market price and volume fluctuations, which may prevent our stockholders from selling our common stock at a profit and could lead to costly litigation against us that could divert our management’s attention; Unfavorable results of legal proceedings could have a material adverse effect on our business, operating results and financial condition;and the other important factors discussed under the caption “Risk Factors” in Part 1. Item 1A of our Form 10-K for the fiscal year ended March 31, 2025, and our other reports filed with the SEC. These important factors, among others, could cause actual results to differ materially from those indicated by forward-looking statements made herein and presented elsewhere by management from time to time. Any such forward-looking statements represent management’s estimates as of the date of this press release. While we may elect to update such forward-looking statements at some point in the future, we disclaim any obligation to do so, even if subsequent events cause our views to change. These forward-looking statements should not be relied upon as representing our views as of any date subsequent to the date of this press release.

     
    UNAUDITED CONSOLIDATED STATEMENTS OF OPERATIONS
    (In thousands, except per share data)
      Three Months Ended     Twelve Months Ended  
      March 31,     March 31,  
      2025     2024     2025     2024  
    Revenues                              
    Grid $ 55,592     $ 34,211     $ 187,170     $ 122,065  
    Wind   11,063       7,817       35,648       23,574  
    Total revenues   66,655       42,028       222,818       145,639  
                                   
    Cost of revenues   48,964       31,598       160,964       110,356  
                                   
    Gross margin   17,691       10,430       61,854       35,283  
                                   
    Operating expenses:                              
    Research and development   3,493       2,298       11,425       7,991  
    Selling, general and administrative   12,101       7,953       43,091       31,600  
    Amortization of acquisition related intangibles   444       538       1,733       2,152  
    Change in fair value of contingent consideration         1,870       6,682       4,922  
    Restructuring                     (14 )
    Total operating expenses   16,038       12,659       62,931       46,651  
                                   
    Operating income (loss)   1,653       (2,229 )     (1,077 )     (11,368 )
                                   
    Interest income, net   807       784       3,708       1,302  
    Other expense, net   (49 )     (117 )     (265 )     (736 )
    Income (loss) before income tax (benefit) expense   2,411       (1,562 )     2,366       (10,802 )
                                   
    Income tax (benefit) expense   1,204       17       (3,667 )     309  
                                   
    Net income (loss) $ 1,207     $ (1,579 )   $ 6,033     $ (11,111 )
                                   
    Net income (loss) per common share                              
    Basic $ 0.03     $ (0.05 )   $ 0.16     $ (0.37 )
    Diluted $ 0.03     $ (0.05 )   $ 0.16     $ (0.37 )
                                   
    Weighted average number of common shares outstanding                              
    Basic   37,672       33,139       36,990       29,825  
    Diluted   38,516       33,139       37,718       29,825  
     
    CONSOLIDATED BALANCE SHEET
    (In thousands, except per share data)
      March 31,     March 31,  
      2025     2024  
    ASSETS              
    Current assets:              
    Cash and cash equivalents $ 79,494     $ 90,522  
    Accounts receivable, net   46,186       26,325  
    Inventory, net   71,169       41,857  
    Prepaid expenses and other current assets   8,055       7,295  
    Restricted cash   1,613       468  
    Total current assets   206,517       166,467  
                   
    Property, plant and equipment, net   38,572       10,861  
    Intangibles, net   5,916       6,369  
    Right-of-use assets   3,829       2,557  
    Goodwill   48,164       43,471  
    Restricted cash   4,274       1,290  
    Deferred tax assets   1,178       1,119  
    Equity-method Investments   1,113        
    Other assets   958       637  
    Total assets $ 310,521     $ 232,771  
                   
                   
    LIABILITIES AND STOCKHOLDERS’ EQUITY              
                   
    Current liabilities:              
    Accounts payable and accrued expenses $ 32,282     $ 24,235  
    Lease liability, current portion   685       716  
    Debt, current portion         25  
    Contingent consideration         3,100  
    Deferred revenue, current portion   66,797       50,732  
    Total current liabilities   99,764       78,808  
                   
    Deferred revenue, long term portion   9,336       7,097  
    Lease liability, long term portion   2,684       1,968  
    Deferred tax liabilities   1,595       300  
    Other liabilities   28       27  
    Total liabilities   113,407       88,200  
                   
    Stockholders’ equity:              
    Common stock, $0.01 par value, 75,000,000 shares authorized; 39,887,536 and 37,343,812 shares issued and 39,484,185 and 36,946,181 shares outstanding at March 31, 2025 and 2024, respectively   399       373  
    Additional paid-in capital   1,259,540       1,212,913  
    Treasury stock, at cost, 403,351 and 397,631 at March 31, 2025 and 2024, respectively   (3,765 )     (3,639 )
    Accumulated other comprehensive income   1,565       1,582  
    Accumulated deficit   (1,060,625 )     (1,066,658 )
    Total stockholders’ equity   197,114       144,571  
    Total liabilities and stockholders’ equity $ 310,521     $ 232,771  
     
    CONSOLIDATED STATEMENTS OF CASH FLOWS
    (In thousands)
      Year Ended March 31,  
      2025     2024  
    Cash flows from operating activities:              
    Net income (loss) $ 6,033     $ (11,111 )
    Adjustments to reconcile net income (loss) to net cash provided by operations:              
    Depreciation and amortization   5,560       4,494  
    Stock-based compensation expense   7,794       4,652  
    Provision for excess and obsolete inventory   1,532       1,970  
    Amortization of operating lease right-of-use assets   976       321  
    Deferred income taxes   (4,304 )     65  
    Earnings from equity method investments   132        
    Change in fair value of contingent consideration   6,682       4,922  
    Other non-cash items   (587 )     44  
    Unrealized foreign exchange gain on cash and cash equivalents   (41 )     (2 )
    Changes in operating asset and liability accounts:              
    Accounts receivable   (3,213 )     4,340  
    Inventory   (7,707 )     (6,841 )
    Prepaid expenses and other current assets   543       5,992  
    Operating leases   (1,563 )     (327 )
    Accounts payable and accrued expenses   3,209       (13,498 )
    Deferred revenue   13,239       7,117  
    Net cash provided by operating activities   28,285       2,138  
                   
    Cash flows from investing activities:              
    Purchases of property, plant and equipment   (2,415 )     (934 )
    Cash paid to settle NWL contingent consideration liability   (3,278 )      
    Cash paid for NWL Acquisition, net of cash acquired   (29,577 )      
    Change in other assets   64       (27 )
    Net cash used in investing activities   (35,206 )     (961 )
                   
    Cash flows from financing activities:              
    Repurchase of treasury stock   (126 )      
    Repayment of debt   (25 )     (65 )
    Cash paid related to registration of common stock shares   (148 )      
    Proceeds from public equity offering, net         65,227  
    Proceeds from exercise of employee stock options and ESPP   307       279  
    Net cash provided by financing activities   8       65,441  
                   
    Effect of exchange rate changes on cash, cash equivalents and restricted cash   14       (13 )
                   
    Net (decrease) increase in cash, cash equivalents and restricted cash   (6,899 )     66,605  
    Cash, cash equivalents and restricted cash at beginning of year   92,280       25,675  
    Cash, cash equivalents and restricted cash at end of year $ 85,381     $ 92,280  
     
    RECONCILIATION OF GAAP NET INCOME (LOSS) TO NON-GAAP NET INCOME
    (In thousands, except per share data)
      Three Months Ended March 31,     Year Ended March 31,  
      2025     2024     2025     2024  
    Net income (loss) $ 1,206     $ (1,579 )   $ 6,033     $ (11,111 )
    Stock-based compensation   2,855       1,044       7,794       4,652  
    Amortization of acquisition-related intangibles   706       538       2,433       2,158  
    Change in fair value of contingent consideration         1,870       6,682       4,922  
    Acquisition costs               1,095        
    Non-GAAP net income   4,767       1,873       24,037       621  
                                   
    Non-GAAP net income per share – basic $ 0.13     $ 0.06     $ 0.65     $ 0.02  
    Non-GAAP net income per share – diluted $ 0.12     $ 0.05     $ 0.64     $ 0.02  
    Weighted average shares outstanding – basic   37,672       33,139       36,990       29,825  
    Weighted average shares outstanding – diluted   38,516       34,447       37,718       30,909  
     
    Reconciliation of Forecast GAAP Net Income to Non-GAAP Net Income
    (In millions, except per share data)
      Three months ending  
      June 30, 2025  
    Net income $ 1.0  
    Stock-based compensation   2.6  
    Amortization of acquisition-related intangibles   0.4  
    Non-GAAP net income $ 4.0  
    Non-GAAP net income per share $ 0.10  
    Shares outstanding   38.7  
     

    Note: Non-GAAP net income (loss) is defined by the Company as net income (loss) before; stock-based compensation; amortization of acquisition-related intangibles; changes in fair value of contingent consideration; acquisition costs; other non-cash or unusual charges, and the tax effect of adjustments calculated at the relevant rate for our non-GAAP metric. The Company believes non-GAAP net income (loss) and non-GAAP net income (loss) per share assist management and investors in comparing the Company’s performance across reporting periods on a consistent basis by excluding these non-cash, non-recurring or other charges that it does not believe are indicative of its core operating performance. Actual GAAP and non-GAAP net income (loss) and net income (loss) per share for the fiscal quarter ending June 30, 2025, including the above adjustments, may differ materially from those forecasted in the table above, including as a result of changes in the fair value of contingent consideration.

    Generally, a non-GAAP financial measure is a numerical measure of a company’s performance, financial position or cash flow that either excludes or includes amounts that are not normally excluded or included in the most directly comparable measure calculated and presented in accordance with GAAP. The non-GAAP measures included in this release, however, should be considered in addition to, and not as a substitute for or superior to, operating income or other measures of financial performance prepared in accordance with GAAP. A reconciliation of GAAP to non-GAAP net income (loss) is set forth in the table above. Non-GAAP net income (loss) per share is defined as non-GAAP net income (loss) divided by shares outstanding.

    AMSC Contacts
    Investor Relations Contact:
    Carolyn Capaccio, CFA
    Phone: 212-838-3777
    amscIR@allianceadvisors.com

    AMSC Director, Communications:
    Nicol Golez
    978-399-8344
    Nicol.Golez@amsc.com

    Public Relations Contact:
    RooneyPartners
    Joe Luongo
    (914) 906-5903
    jluongo@rooneypartners.com

    The MIL Network

  • MIL-OSI Economics: IPAA Urges Preservation of Carried Interest Tax Provision

    Source: Independent Petroleum Association of America

    Headline: IPAA Urges Preservation of Carried Interest Tax Provision

    IPAA Urges Preservation of Carried Interest Tax Provision

    Dear Speaker Johnson and Majority Leader Thune:

    On behalf of America’s independent oil and natural gas producers, the Independent Petroleum Association of America (IPAA) urges you to help preserve the current tax treatment of carried interest to protect energy investment, support job creation, and ensure the continued growth of a resilient, domestically powered energy economy. …

    The carried interest structure is a well-established mechanism that rewards long-term investment and risk-taking. It is particularly critical in the oil and natural gas industry, where smaller, independent companies often partner with private equity investors to raise the capital needed to explore, drill, and produce America’s energy resources. Nowhere is this model more embedded-or more vital-than in the Gulf Coast states, where these partnerships drive innovation, economic growth, and energy resilience. …

    MIL OSI Economics

  • MIL-OSI United Nations: 21 May 2025 Note for Media Seventy-eighth World Health Assembly – Daily update: 21 May 2025

    Source: World Health Organisation

    A “health financing emergency” must drive country-led, data-driven solutions

    Ministers from multiple countries hit by the abrupt cuts in external funding for health agreed on the urgent need for country-owned and implemented strategies – and a laser-sharp focus on health data – at a ministerial dialogue co-hosted by WHO and the Susan Thompson Buffett Foundation at the Seventy-eighth World Health Assembly.

    Opening remarks by Professor Senait Fisseha, Vice President of Global Programs at the Susan Thompson Buffett Foundation, and Dr Tedros Adhanom Ghebreyesus, WHO Director-General, set the tone by noting that the crisis presents an opportunity for a turnaround in how health financing policies and health data systems are built and operated.

    Specifically, this is a time for countries to reduce their reliance on external health information systems and external financing; build out their domestic data infrastructure, from vital statistics to downstream impact and return-on-investment; and establish resilient systems designed to withstand shocks, so that access to essential services is protected.

    Professor Fisseha called on countries “to use this moment to rethink data and financing in a way that best meets your needs and the needs of your people […] For countries to truly lead and for funders and development partners to start to learn how to follow. Data and financing are a natural place to start because that is where ministers are telling us to start.”

    Dr Tedros said, “From expanding domestic financing to pioneering real-time data systems, many of you are advancing solutions that are scalable, sustainable and rooted in equity. Data and sustainable financing are not just technical matters. They are political choices. They shape who is reached, how quickly, and with what quality of care. And they determine whether we progress or fall behind.”

    Ministers from Barbados, Central African Republic, Egypt, Liberia, Malawi, Rwanda and Sierra Leone, and representatives from the African Union and the World Bank, among others, shared experiences and advice on concrete actions to strengthen data systems, health financing and planning – urging intensified collaboration in the future. They also spoke of the need to leverage the digital transformation and thereby increase transparency and accountability.

    Also discussed: strategies to improve domestic financing capacity while maximizing impact include: strengthening tax administration; exploring revenue sources such as taxes on such items as food, alcohol and tobacco; setting up population-wide mandatory health coverage schemes, coupled with subsidies for low-income households and vulnerable population groups; promoting strategic purchasing of health supplies; prioritizing health in public spending; and integrating externally-funded programmes into domestic financing systems and priorities. 

    Later this week the Assembly will take up the proposed WHA Health Financing Resolution. 

    Related links

    WHO Director-General’s opening remarks at the Strategic Roundtable: Data and Sustainable Financing: Twin Foundations to Accelerate UHC – 21 May 2025

    Report on the health conditions in the occupied Palestinian territory, including east Jerusalem, and in the occupied Syrian Golan

    On 21 May 2025, the Seventy-eighth World Health Assembly noted a report from the Director-General, outlining WHO’s humanitarian and emergency health response in the occupied Palestinian territory, including east Jerusalem, and in the occupied Syrian Golan, from January 2024 to February 2025.

    A report on the health conditions in the occupied Syrian Golan couldn’t be provided this year again due to the ongoing situation and the lack of disaggregated health data on the Syrian population. Member States were invited to provide guidance on how to support WHO and partners to restore essential health services across Syria and enable a WHO field-assessment mission to the occupied Syrian Golan.   

    Member States expressed grave concerns over the deterioration of the health system in Gaza, including forced displacement, overcrowding and deteriorating sanitation, and attacks on health, stressing the need for concerted action to address the dire health needs.

    A number of Member States presented draft decisions asking the Director-General to continue reporting on the health conditions in the occupied Palestinian territory, including east Jerusalem, and in the occupied Syrian Golan, and more specifically on food insecurity and malnutrition in the Gaza Strip, and to continue supporting the Palestinian and Syrian health systems. The decision was adopted.

    Related documents

    A78/16: Health conditions in the occupied Palestinian territory, including east Jerusalem, and in the occupied Syrian Golan

    A78/B/CONF./1: Health conditions in the occupied Palestinian territory, including east Jerusalem, and in the occupied Syrian Golan

    A78/B/CONF./1 Add.1: Financial and administrative implications for the Secretariat of decisions proposed for adoption by the Health Assembly

    MIL OSI United Nations News

  • MIL-OSI USA: Disaster Recovery Centers to Permanently Close May 31; Resources Transitioning to New Locations

    Source: US Federal Emergency Management Agency 2

    strong>LOS ANGELES – The two Disaster Recovery Centers (DRCs) for the Los Angeles Wildfires are permanently closing Saturday, May 31, 2025, at 4 p.m. and federal resources will be transitioning to new locations.
    Current DRC Locations and Hours
    UCLA Research Park West 10850 West Pico Blvd. Los Angeles, CA 90064 Monday-Friday: 9 a.m. – 6 p.m. and Saturday: 9 a.m. – 4 p.m.
    Altadena Disaster Recovery Center540 West Woodbury Rd. Altadena, CA 91001 Monday-Friday: 9 a.m. – 6 p.m. and Saturday: 9 a.m. – 4 p.m. 
    The Federal Emergency Management Agency (FEMA) and Small Business Administration (SBA) will be transitioning from the current DRC locations to county and city run facilities. Federal resources will be available at their new locations beginning Monday, June 2, 2025.
    Services Will Continue at:
    One Stop Rebuilding Center1828 Sawtelle Blvd.Los Angeles, CA 90025 Monday-Friday: 9 a.m. – 5 p.m. Closed weekends.
    Altadena Community Center730 E. Altadena Dr.Altadena, CA 91001Monday-Friday: 9 a.m. – 5 p.m. Closed weekends.
    If you applied for FEMA assistance, it’s important to stay in touch with FEMA to track and update your application should you receive an insurance settlement or denial and as your situation changes to work through any approval processes. FEMA representatives can explain available assistance programs and help you with resources for your recovery needs.
    Rental Assistance is available for eligible individuals and families who were displaced by the wildfires. If you were displaced and need assistance covering housing costs, you should contact FEMA to determine your eligibility for this program. 
    SBA’s Customer Service Representatives are available at the Centers to answer questions, help applicants complete their disaster loan application, accept documents, and provide updates on an application’s status.
    Additional Resources

    California Governor’s Office of Emergency Services (CalOES)Resources offered by State agencies are available online and at some existing field offices. Survivors can find a complete list of recovery related services on the CA.gov/LAfires Recovery Services Finder page, including how to contact each agency and their office locations.
    U.S. Army Corps of Engineers (USACE)For help answering questions regarding debris removal, please call: 213-308-8305. The call center is available daily from 6 a.m. to 6:30 p.m. For more information, you can also visit the USACE Los Angeles County Wildfire Debris Removal Mission.
    One-Stop Permitting CentersFor unincorporated LA County communities, One-Stop Permit Centers are also available in Calabasas and Altadena for residents impacted by the Palisades and Eaton fires. LA County permitting agencies, including Fire Department, Regional Planning, Public Health, Public Works Geotechnical and Materials Engineering Division and Public Works Building and Safety, are available to guide owners and their representatives through the rebuild process and answer any questions they may have. Walk-ins are welcome and consultation appointments can be scheduled. More information including days and hours of operation, can be found here: recovery.lacounty.gov/rebuilding/one-stop-permit-centers. 

    Follow FEMA online, on X @FEMA or @FEMAEspanol, on FEMA’s Facebook page or Espanol page and at FEMA’s YouTube account. For preparedness information follow the Ready Campaign on X at @Ready.gov, on Instagram @Ready.gov or on the Ready Facebook page.

    California is committed to supporting residents impacted by the Los Angeles Hurricane-Force Firestorm as they navigate the recovery process. Visit CA.gov/LAFires for up-to-date information on disaster recovery programs, important deadlines, and how to apply for assistance.

    MIL OSI USA News

  • MIL-OSI USA: Russian GRU Targeting Western Logistics Entities and Technology Companies

    News In Brief – Source: US Computer Emergency Readiness Team

    Executive Summary

    This joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This includes those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. Since 2022, Western logistics entities and IT companies have faced an elevated risk of targeting by the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (85th GTsSS), military unit 26165—tracked in the cybersecurity community under several names (see “Cybersecurity Industry Tracking”). The actors’ cyber espionage-oriented campaign, targeting technology companies and logistics entities, uses a mix of previously disclosed tactics, techniques, and procedures (TTPs). The authoring agencies expect similar targeting and TTP use to continue.

    Executives and network defenders at logistics entities and technology companies should recognize the elevated threat of unit 26165 targeting, increase monitoring and threat hunting for known TTPs and indicators of compromise (IOCs), and posture network defenses with a presumption of targeting.

    This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors’ wide scale targeting of IP cameras in Ukraine and bordering NATO nations.

    The following authors and co-sealers are releasing this CSA:

    • United States National Security Agency (NSA)
    • United States Federal Bureau of Investigation (FBI)
    • United Kingdom National Cyber Security Centre (NCSC-UK)
    • Germany Federal Intelligence Service (BND) Bundesnachrichtendienst
    • Germany Federal Office for Information Security (BSI) Bundesamt für Sicherheit in der Informationstechnik
    • Germany Federal Office for the Protection of the Constitution (BfV) Bundesamt für Verfassungsschutz
    • Czech Republic Military Intelligence (VZ)  Vojenské zpravodajství
    • Czech Republic National Cyber and Information Security Agency (NÚKIB) Národní úřad pro kybernetickou a informační bezpečnost
    • Czech Republic Security Information Service (BIS) Bezpečnostní informační služba
    • Poland Internal Security Agency (ABW) Agencja Bezpieczeństwa Wewnętrznego
    • Poland Military Counterintelligence Service (SKW) Służba Kontrwywiadu Wojskowego
    • United States Cybersecurity and Infrastructure Security Agency (CISA)
    • United States Department of Defense Cyber Crime Center (DC3)
    • United States Cyber Command (USCYBERCOM)
    • Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)
    • Canadian Centre for Cyber Security (CCCS)
    • Danish Defence Intelligence Service (DDIS) Forsvarets Efterretningstjeneste
    • Estonian Foreign Intelligence Service (EFIS) Välisluureamet
    • Estonian National Cyber Security Centre (NCSC-EE) Küberturvalisuse keskus
    • French Cybersecurity Agency (ANSSI) Agence nationale de la sécurité des systèmes d’information
    • Netherlands Defence Intelligence and Security Service (MIVD) Militaire Inlichtingen- en Veiligheidsdienst
       

    Download the PDF version of this report:

    Russian GRU Targeting Western Logistics Entities and Technology Companies (PDF, 1,081KB)

    For a downloadable list of IOCs, visit:

    Introduction

    For over two years, the Russian GRU 85th GTsSS, military unit 26165—commonly known in the cybersecurity community as APT28, Fancy Bear, Forest Blizzard, BlueDelta, and a variety of other identifiers—has conducted this campaign using a mix of known tactics, techniques, and procedures (TTPs), including reconstituted password spraying capabilities, spearphishing, and modification of Microsoft Exchange mailbox permissions.
    In late February 2022, multiple Russian state-sponsored cyber actors increased the variety of cyber operations for purposes of espionage, destruction, and influence—with unit 26165 predominately involved in espionage. [1] As Russian military forces failed to meet their military objectives and Western countries provided aid to support Ukraine’s territorial defense, unit 26165 expanded its targeting of logistics entities and technology companies involved in the delivery of aid. These actors have also targeted Internet-connected cameras at Ukrainian border crossings to monitor and track aid shipments.
    Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 17. See Appendix A: MITRE ATT&CK tactics and techniques for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques. This advisory uses the MITRE D3FEND® framework, version 1.0.

    Description of Targets

    The GRU unit 26165 cyber campaign against Western logistics providers and technology companies has targeted dozens of entities, including government organizations and private/commercial entities across virtually all transportation modes: air, sea, and rail. These actors have targeted entities associated with the following verticals within NATO member states, Ukraine, and at international organizations: 

    •  Defense Industry
    • Transportation and Transportation Hubs (ports, airports, etc.)
    • Maritime
    • Air Traffic Management
    • IT Services

    In the course of the targeting lifecycle, unit 26165 actors identified and conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access [T1199].

    The actors also conducted reconnaissance on at least one entity involved in the production of industrial control system (ICS) components for railway management, though a successful compromise was not confirmed [TA0043].

    The countries with targeted entities include the following, as illustrated in Figure 1:

    • Bulgaria
    • Czech Republic
    • France
    • Germany
    • Greece
    • Italy
    • Moldova
    • Netherlands
    • Poland
    • Romania
    • Slovakia
    • Ukraine
    • United States
       
    Figure 1: Countries with Targeted Entities

    Initial Access TTPs

    To gain initial access to targeted entities, unit 26165 actors used several techniques to gain initial access to targeted entities, including (but not limited to):

    The actors abused vulnerabilities associated with a range of brands and models of small office/home office (SOHO) devices to facilitate covert cyber operations, as well as proxy malicious activity via devices with geolocation in proximity to the target [T1665]. [2]

    Credential Guessing/Brute Force

    Unit 26165 actors’ credential guessing [T1110.001] operations in this campaign exhibit some similar characteristics to those disclosed in the previous CSA “Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments.” [3] Based on victim network investigations, the current iteration of this TTP employs a similar blend of anonymization infrastructure, including the use of Tor and commercial VPNs [T1090.003]. The actors frequently rotated the IP addresses used to further hamper detection. All observed connections were made via encrypted TLS [T1573]. 

    Spearphishing

    GRU unit 26165 actors’ spearphishing emails included links [T1566.002] leading to fake login pages impersonating a variety of government entities and Western cloud email providers’ webpages. These webpages were typically hosted on free third-party services or compromised SOHO devices and often used legitimate documents associated with thematically similar entities as lures. The subjects of spearphishing emails were diverse and ranged from professional topics to adult themes. Phishing emails were frequently sent via compromised accounts or free webmail accounts [T1586.002, T1586.003]. The emails were typically written in the target’s native language and sent to a single targeted recipient. 

    Some campaigns employed multi-stage redirectors [T1104] verifying IP-geolocation [T1627.001] and browser fingerprints [T1627] to protect credential harvesting infrastructure or provide multifactor authentication (MFA) [T1111] and CAPTCHA relaying capabilities [T1056]. Connecting endpoints failing the location checks were redirected to a benign URL [T1627], such as msn.com. Redirector services used include:

    • Webhook[.]site
    • FrgeIO
    • InfinityFree
    • Dynu
    • Mocky
    • Pipedream
    • Mockbin[.]org

    The actors also used spearphishing to deliver malware (including HEADLACE and MASEPIE) executables [T1204.002] delivered via third-party services and redirectors [T1566.002], scripts in a mix of languages [T1059] (including BAT [T1059.003] and VBScript [T1059.005]) and links to hosted shortcuts [T1204.001].

    CVE Usage

    Throughout this campaign, GRU unit 26165 weaponized an Outlook NTLM vulnerability (CVE-2023-23397) to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations [T1187]. [4],[5] These actors also used a series of Roundcube CVEs (CVE-2020-12641, CVE-2020-35730, and CVE-2021-44026) to execute arbitrary shell commands [T1059], gain access to victim email accounts, and retrieve sensitive data from email servers [T1114].

    Since at least fall 2023, the actors leveraged a WinRAR vulnerability (CVE-2023-38831) allowing for the execution of arbitrary code embedded in an archive as a means of initial access [T1659]. The actors sent emails with malicious attachments [T1566.001] or embedded hyperlinks [T1566.002] that downloaded a malicious archive prepared using this CVE. 

    Post-Compromise TTPs

    After an initial compromise using one of the above techniques, unit 26165 actors conducted contact information reconnaissance to identify additional targets in key positions [T1589.002]. The actors also conducted reconnaissance of the cybersecurity department [T1591], individuals responsible for coordinating transport [T1591.004], and other companies cooperating with the victim entity [T1591.002].

    The actors used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment [TA0008]. Multiple Impacket scripts were used as .exe files, in addition to the python versions, depending on the victim environment. The actors also moved laterally within the network using Remote Desktop Protocol (RDP) [T1021.001] to access additional hosts and attempt to dump Active Directory NTDS.dit domain databases [T1003.003] using native Active Directory Domain Services commands, such as in Figure 2: Example Active Directory Domain Services command:

    C:Windowssystem32ntdsutil.exe "activate instance ntds" ifm "create full C:temp[a-z]{3}" quit quit

    Figure 2: Example Active Directory Domain Services command

    Additionally, GRU unit 26165 actors used the tools Certipy and ADExplorer.exe to exfiltrate information from the Active Directory. The actors installed python [T1059.006] on infected machines to enable the execution of Certipy. Accessed files were archived in .zip files prior to exfiltration [T1560]. The actors attempted to exfiltrate archived data via a previously dropped OpenSSH binary [T1048].

    Incident response investigations revealed that the actors would take steps to locate and exfiltrate lists of Office 365 users and set up sustained email collection. The actors used manipulation of mailbox permissions [T1098.002] to establish sustained email collection at compromised logistics entities, as detailed in a Polish Cybercommand blog. [6]

    After initial authentication, unit 26165 actors would change accounts’ folder permissions and enroll compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access [T1556.006]. The actors leveraged python scripts to retrieve plaintext passwords via Group Policy Preferences [T1552.006] using Get-GPPPassword.py and a modified ldap-dump.py to enumerate the Windows environment [T1087.002] and conduct a brute force password spray [T1110.003] via Lightweight Directory Access Protocol (LDAP). The actors would additionally delete event logs through the wevtutil utility [T1070.001].

    After gaining initial access to the network, the actors pursued further access to accounts with access to sensitive information on shipments, such as train schedules and shipping manifests. These accounts contained information on aid shipments to Ukraine, including: 

    • sender,
    • recipient,
    • train/plane/ship numbers,
    • point of departure,
    • destination,
    • container registration numbers,
    • travel route, and
    • cargo contents. 

    In at least one instance, the actors attempted to use voice phishing [T1566.004] to gain access to privileged accounts by impersonating IT staff.

    Malware

    Unit 26165’s use of malware in this campaign ranged from gaining initial access to establishing persistence and exfiltrating data. In some cases, the attack chain resulted in multiple pieces of malware being deployed in succession. The actors used dynamic link library (DLL) search order hijacking [T1574.001] to facilitate malware execution. There were a number of known malware variants tied to this campaign against logistics sector victims, including:

    • HEADLACE [7]
    • MASEPIE [8]

    While other malware variants, such as OCEANMAP and STEELHOOK, [8] were not directly observed targeting logistics or IT entities, their deployment against victims in other sectors in Ukraine and other Western countries suggest that they could be deployed against logistics and IT entities should the need arise. 

    Persistence

    In addition to the abovementioned mailbox permissions abuse, unit 26165 actors also used scheduled tasks [T1053.005], run keys [T1547.001], and placed malicious shortcuts [T1547.009] in the startup folder to establish persistence. 

    Exfiltration

    GRU unit 26165 actors used a variety of methods for data exfiltration that varied based on the victim environment, including both malware and living off the land binaries. PowerShell commands [T1059.001] were often used to prepare data for exfiltration; for example, the actors prepared zip archives [T1560.001] for upload to their own infrastructure. 

    The actors also used server data exchange protocols and Application Programming Interfaces (APIs) such as Exchange Web Services (EWS) and Internet Message Access Protocol (IMAP) [T1114.002] to exfiltrate data from email servers. In multiple instances, the actors used periodic EWS queries [T1119] to collect new emails sent and received since the last data exfiltration [T1029]. The actors typically used infrastructure in close geographic proximity to the victim. Long gaps between exfiltration, the use of trusted and legitimate protocols, and the use of local infrastructure allowed for long-term collection of sensitive data to go undetected. 

    Connections to Targeting of IP Cameras

    In addition to targeting logistics entities, unit 26165 actors likely used access to private cameras at key locations, such as near border crossings, military installations, and rail stations, to track the movement of materials into Ukraine. The actors also used legitimate municipal services, such as traffic cams. 

    The actors targeted Real Time Streaming Protocol (RTSP) servers hosting IP cameras primarily located in Ukraine as early as March 2022 in a large-scale campaign, which included attempts to enumerate devices [T1592] and gain access to the cameras’ feeds [T1125]. Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers, primarily hosting IP cameras [T1090.002]. The DESCRIBE requests were crafted to obtain access to IP cameras located on logically distinct networks from that of the routers that received the request. The requests included Base64-encoded credentials for the RTSP server, which included publicly documented default credentials and likely generic attempts to brute force access to the devices [T1110]. An example of an RTSP request is shown in Figure 3.

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 1

    Authorization: Basic

    User-Agent: WebClient

    Accept: application/sdp

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 2

    Authorization: Digest username="admin", realm="[a-f0-9]{12}", algorithm="MD5", nonce="[a-f0-9]{32}", uri="", response="[a-f0-9]{32}"

    User-Agent: WebClient

    Accept: application/sdp

    Figure 3: Example RTSP request

    Successful RTSP 200 OK responses contained a snapshot of the IP camera’s image and IP camera metadata such as video codec, resolution, and other properties depending on the IP camera’s configuration. 

    From a sample available to the authoring agencies of over 10,000 cameras targeted via this effort, the geographic distribution of victims showed a strong focus on cameras in Ukraine and border countries, as shown in Table 1:

    Table 1: Geographic distribution of targeted IP cameras
    Country Percentage of Total Attempts
    Ukraine 81.0%
    Romania 9.9%
    Poland 4.0%
    Hungary 2.8%
    Slovakia 1.7%
    Others 0.6%

    Mitigation Actions

    General Security Mitigations

    Architecture and Configuration

    • Employ appropriate network segmentation [D3-NI] and restrictions to limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions [D3-AMED].
      • Consider Zero Trust principles when designing systems. Base product choices on how those products can solve specific risks identified as part of the end-to-end design. [9]
    • Ensure that host firewalls and network security appliances (e.g., firewalls) are configured to only allow legitimately needed data flows between devices and servers to prevent lateral movement [D3-ITF]. Alert on attempts to connect laterally between host devices or other unusual data flows.
    • Use automated tools to audit access logs for security concerns and identify anomalous access requests [D3-RAPA].
    • For organizations using on-premises authentication and email services, block and alert on NTLM/SMB requests to external infrastructure [D3-OTF].
    • Utilize endpoint, detection, and response (EDR) and other cybersecurity solutions on all systems, prioritizing high value systems with large amounts of sensitive data such as mail servers and domain controllers [D3-PM] first.
      • Perform threat and attack modeling to understand how sensitive systems may be compromised within an organization’s specific architecture and security controls. Use this to develop a monitoring strategy to detect compromise attempts and select appropriate products to enact this strategy.
    • Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly [D3-SFA].
    • Enable optional security features in Windows to harden endpoints and mitigate initial access techniques [D3-AH]:
      • Enable attack surface reduction rules to prevent executable content from email [D3-ABPI].
      • Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA% [D3-EAL].
      • Unless users are involved in the development of scripts, limit the local execution of scripts (such as batch scripts, VBScript, JScript/JavaScript, and PowerShell [10]) to known scripts [D3-EI], and audit execution attempts.
      • Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode [D3-ACH].
    • Where feasible, implement allowlisting for applications and scripts to limit execution to only those needed for authorized activities, blocking all others by default [D3-EAL].
    • Consider using open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters [D3-PSA].
    • Use services that provide enhanced browsing services and safe link checking [D3-URA]. Significant reductions in successful spearphishing attempts were noted when email providers began offering link checking and automatic file detonation to block malicious content.
    • Where possible, block logins from public VPNs, including exit nodes in the same country as target systems, or, if they need to be allowed, alert on them for further investigation. Most organizations should not need to allow incoming traffic, especially logins to systems, from VPN services [D3-NAM].
    • Educate users to only use approved corporate systems for relevant government and military business and avoid the use of personal accounts on cloud email providers to conduct official business. Network administrators should also audit both email and web request logs to detect such activity.

    Many organizations may not need to allow outgoing traffic to hosting and API mocking services, which are frequently used by GRU unit 26165. Organizations should consider alerting on or blocking the following services, with exceptions allowlisted for legitimate activity [D3-DNSDL].

    • *.000[.]pe
    • *.1cooldns[.]com
    • *.42web[.]io
    • *.4cloud[.]click
    • *.accesscan[.]org
    • *.bumbleshrimp[.]com
    • *.camdvr[.]org
    • *.casacam[.]net
    • *.ddnsfree[.]com
    • *.ddnsgeek[.]com
    • *.ddnsguru[.]com
    • *.dynuddns[.]com
    • *.dynuddns[.]net
    • *.free[.]nf
    • *.freeddns[.]org
    • *.frge[.]io
    • *.glize[.]com
    • *.great-site[.]net
    • *.infinityfreeapp[.]com
    • *.kesug[.]com
    • *.loseyourip[.]com
    • *.lovestoblog[.]com
    • *.mockbin[.]io
    • *.mockbin[.]org
    • *.mocky[.]io
    • *.mybiolink[.]io
    • *.mysynology[.]net
    • *.mywire[.]org
    • *.ngrok[.]io
    • *.ooguy[.]com
    • *.pipedream[.]net
    • *.rf[.]gd
    • *.urlbae[.]com
    • *.webhook[.]site
    • *.webhookapp[.]com
    • *.webredirect[.]org
    • *.wuaze[.]com

    Heuristic detections for web requests to new subdomains, including of the above providers, may uncover malicious phishing activity [D3-DNRA]. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims.

    Identity and Access Management

    Organizations should take measures to ensure strong access controls and mitigate against common credential theft techniques: 

    • Use MFA with strong factors, such as passkeys or PKI smartcards, and require regular re-authentication [D3-MFA]. [11], [12] Strong authentication factors are not guessable using dictionary techniques, so they resist brute force attempts.
    • Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts [D3-JFAPA].
    • Separate privileged accounts by role and alert on misuse of privileged accounts [D3-UAP]. For example, email administrator accounts should be different from domain administrator accounts.
    • Reduce reliance on passwords; instead, consider using services like single sign-on [D3-TBA].
      • For organizations using on-premises authentication and email services, plan to disable NTLM entirely and migrate to more robust authentication processes such as PKI certificate authentication.
    • Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts [D3-CH]. [13]
    • Use account throttling or account lockout [D3-ANET]:
      • Throttling is preferred to lockout. Throttling progressively increases time delay between successive login attempts.
      • Account lockout can leave legitimate users unable to access their accounts and requires access to an account recovery process.
      • Account lockout can provide a malicious actor with an easy way to launch a Denial of Service (DoS).
      • If using lockout, then allowing 5 to 10 attempts before lockout is recommended.
    • Use a service to check for compromised passwords before using them [D3-SPP]. For example, “Have I Been Pwned” can be used to check whether a password has been previously compromised without disclosing the potential password.
    • Change all default credentials [D3-CRO] and disable protocols that use weak authentication (e.g., clear-text passwords or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication [D3-ACH] [D3-ET]. Always configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. [13]

    IP Camera Mitigations

    The following mitigation techniques for IP cameras can be used to defend against this type of malicious activity:

    • Ensure IP cameras are currently supported. Replace devices that are out of support.
    • Apply security patches and firmware updates to all IP cameras [D3-SU].
    • Disable remote access to the IP camera, if unnecessary [D3-ITF].
    • Ensure cameras are protected by a security appliance, if possible, such as by using a firewall to prevent communication with the camera from IP addresses not on an allowlist [D3-NAM].
    • If remote access to IP camera feeds is required, ensure authentication is enabled [D3-AA] and use a VPN to connect remotely [D3-ET]. Use MFA for management accounts if supported [D3-MFA].
    • Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers [D3-NI].
    • Turn off other ports/services not in use (e.g., FTP, web interface, etc.) [D3-ACH].
    • If supported, enable authenticated RTSP access only [D3-AA].
    • Review all authentication activity for remote access to make sure it is valid and expected [D3-UBA]. Investigate any unexpected or unusual activity.
    • Audit IP camera user accounts to ensure they are an accurate reflection of your organization and that they are being used as expected [D3-UAP].
    • Configure, tune, and monitor logging—if available—on the IP camera.

    Indicators of Compromise (IOCs)

    Note: Specific IoCs may no longer be actor controlled, may themselves be compromised infrastructure or email accounts, or may be shared infrastructure such as public VPN or Tor exit nodes. Care should be taken when basing triaging logs or developing detection rules on these indicators. GRU unit 26165 almost certainly uses extensive further infrastructure and TTPs not specifically listed in this report.

    Utilities and scripts

    Legitimate utilities

    Unauthorized or unusual use of the following legitimate utilities can be an indication of a potential compromise:

    • ntdsutil – A legitimate Windows executable used by threat actors to export contents of Active Directory
    • wevtutil – A legitimate Windows executable used by threat actors to delete event logs
    • vssadmin – A legitimate Windows executable possibly used by threat actors to make a copy of the server’s C: drive
    • ADexplorer – A legitimate window executable to view, edit, and backup Active Directory Certificate Services
    • OpenSSH – The Windows version of a legitimate open source SSH client
    • schtasks – A legitimate Windows executable used to create persistence using scheduled tasks
    • whoami – A legitimate Windows executable used to retrieve the name of the current user
    • tasklist – A legitimate Windows executable used to retrieve the list of running processes
    • hostname – A legitimate Windows executable used to retrieve the device name
    • arp – A legitimate Windows executable used to retrieve the ARP table for mapping the network environment
    • systeminfo – A legitimate Windows executable used to retrieve a comprehensive summary of device and operating system information
    • net – A legitimate Windows executable used to retrieve detailed user information
    • wmic – A legitimate Windows executable used to interact with Windows Management Instrumentation (WMI), such as to retrieve letters assigned to logical partitions on storage drives
    • cacls – A legitimate Windows executable used to modify permissions on files
    • icacls – A legitimate Windows executable used to modify permissions to files and handle integrity levels and ownership
    • ssh – A legitimate Windows executable used to establish network shell connections
    • reg – A legitimate Windows executable used to add to or modify the system registry 

    Note: Additional heuristics are needed for effective hunting for these and other living off the land (LOTL) binaries to avoid being overwhelmed by false positives if these legitimate management tools are used regularly. See the joint guide, Identifying and Mitigating Living Off the Land Techniques, for guidance on developing a multifaceted cybersecurity strategy that enables behavior analytics, anomaly detection, and proactive hunting, which are part of a comprehensive approach to mitigating cyber threats that employ LOTL techniques.

    Malicious scripts

    • Certipy – An open source python tool for enumerating and abusing Active Directory Certificate Services
    • Get-GPPPassword.py – An open source python script for finding insecure passwords stored in Group Policy Preferences
    • ldap-dump.py – A script for enumerating user accounts and other information in Active Directory
    • Hikvision backdoor string: “YWRtaW46MTEK”

    Suspicious command lines

    While the following utilities are legitimate, and using them with the command lines shown may also be legitimate, these command lines are often used during malicious activities and could be an indication of a compromise:

    • edge.exe “-headless-new -disable-gpu”
    • ntdsutil.exe “activate instance ntds” ifm “create full C:temp[a-z]{3}” quit quit
    • ssh -Nf
    • schtasks /create /xml

    Outlook CVE Exploitation IOCs

    • md-shoeb@alfathdoor[.]com[.]sa
    • jayam@wizzsolutions[.]com
    • accounts@regencyservice[.]in
    • m.salim@tsc-me[.]com
    • vikram.anand@4ginfosource[.]com
    • mdelafuente@ukwwfze[.]com
    • sarah@cosmicgold469[.]co[.]za
    • franch1.lanka@bplanka[.]com
    • commerical@vanadrink[.]com
    • maint@goldenloaduae[.]com
    • karina@bhpcapital[.]com
    • tv@coastalareabank[.]com
    • ashoke.kumar@hbclife[.]in
    • 213[.]32[.]252[.]221
    • 124[.]168[.]91[.]178
    • 194[.]126[.]178[.]8
    • 159[.]196[.]128[.]120

    Commonly Used Webmail Providers

    • portugalmail[.]pt
    • mail-online[.]dk
    • email[.]cz
    • seznam[.]cz

    Malicious Archive Filenames Involving CVE-2023-38831

    • calc.war.zip
    • news_week_6.zip
    • Roadmap.zip
    • SEDE-PV-2023-10-09-1_EN.zip
    • war.zip
    • Zeyilname.zip

    Brute Forcing IP Addresses

    Disclaimer: These IP addresses date June 2024 through August 2024. The authoring agencies recommend organizations investigate or vet these IP addresses prior to taking action, such as blocking.

    June 2024 July 2024 August 2024
    192[.]162[.]174[.]94 207[.]244[.]71[.]84 31[.]135[.]199[.]145 79[.]184[.]25[.]198 91[.]149[.]253[.]204  
    103[.]97[.]203[.]29 162[.]210[.]194[.]2 31[.]42[.]4[.]138 79[.]185[.]5[.]142 91[.]149[.]254[.]75  
    209[.]14[.]71[.]127   46[.]112[.]70[.]252 83[.]10[.]46[.]174 91[.]149[.]255[.]122  
    109[.]95[.]151[.]207   46[.]248[.]185[.]236 83[.]168[.]66[.]145 91[.]149[.]255[.]19  
        64[.]176[.]67[.]117 83[.]168[.]78[.]27 91[.]149[.]255[.]195  
        64[.]176[.]69[.]196 83[.]168[.]78[.]31   91[.]221[.]88[.]76  
        64[.]176[.]70[.]18 83[.]168[.]78[.]55   93[.]105[.]185[.]139  
        64[.]176[.]70[.]238 83[.]23[.]130[.]49   95[.]215[.]76[.]209  
        64[.]176[.]71[.]201 83[.]29[.]138[.]115   138[.]199[.]59[.]43  
        70[.]34[.]242[.]220 89[.]64[.]70[.]69   147[.]135[.]209[.]245  
        70[.]34[.]243[.]226 90[.]156[.]4[.]204   178[.]235[.]191[.]182  
        70[.]34[.]244[.]100 91[.]149[.]202[.]215   178[.]37[.]97[.]243  
        70[.]34[.]245[.]215 91[.]149[.]203[.]73   185[.]234[.]235[.]69  
        70[.]34[.]252[.]168 91[.]149[.]219[.]158 192[.]162[.]174[.]67  
        70[.]34[.]252[.]186 91[.]149[.]219[.]23   194[.]187[.]180[.]20  
        70[.]34[.]252[.]222 91[.]149[.]223[.]130   212[.]127[.]78[.]170  
        70[.]34[.]253[.]13 91[.]149[.]253[.]118 213[.]134[.]184[.]167
        70[.]34[.]253[.]247   91[.]149[.]253[.]198    
        70[.]34[.]254[.]245 91[.]149[.]253[.]20    

    Detections

    Customized NTLM listener

    rule APT28_NTLM_LISTENER {

           meta:

                  description = "Detects NTLM listeners including APT28's custom one"

           strings:

                  $command_1 = "start-process powershell.exe -WindowStyle hidden"

                  $command_2 = "New-Object System.Net.HttpListener"

                  $command_3 = "Prefixes.Add('http://localhost:8080/')"

                  $command_4 = "-match 'Authorization'"

                  $command_5 = "GetValues('Authorization')"

                  $command_6 = "Request.RemoteEndPoint.Address.IPAddressToString"

                  $command_7 = "@(0x4e,0x54,0x4c,0x4d, 0x53,0x53,0x50,0x00,0x02,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x28,0x00,0x00,0x01,0x82,0x00,0x00,0x11,0x22,0x33,0x44,0x55,0x66,0x77,0x88,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00)"

                  $command_8 = ".AllKeys"

                  

                  $variable_1 = "$NTLMAuthentication" nocase

                  $variable_2 = "$NTLMType2" nocase

                  $variable_3 = "$listener" nocase

                  $variable_4 = "$hostip" nocase

                  $variable_5 = "$request" nocase

                  $variable_6 = "$ntlmt2" nocase

                  $variable_7 = "$NTLMType2Response" nocase

                  $variable_8 = "$buffer" nocase

           condition:

                  5 of ($command_*) 

                  or

                  all of ($variable_*)

    }

    HEADLACE shortcut

    rule APT28_HEADLACE_SHORTCUT {

           meta:

                  description = "Detects the HEADLACE backdoor shortcut dropper. Rule is meant for threat hunting."

           strings:

                  $type = "[InternetShortcut]" ascii nocase

                  $url  = "file://"

                  $edge = "msedge.exe"

                  $icon = "IconFile"

           condition:

                  all of them

    }

    HEADLACE credential dialogbox phishing 

    rule APT28_HEADLACE_CREDENTIALDIALOG {

           meta:

                  description = "Detects scripts used by APT28 to lure user into entering credentials"

           strings:

                  $command_1 = "while($true)"

                  $command_2 = "Get-Credential $(whoami)"

                  $command_3 = "Add-Content"

                  $command_4 = ".UserName"

                  $command_5 = ".GetNetworkCredential().Password"

                  $command_6 = "GetNetworkCredential().Password.Length -ne 0"

           condition:

                  5 of them

    }

    HEADLACE core script

    rule APT28_HEADLACE_CORE {

           meta:

                  description = "Detects HEADLACE core batch scripts"

           strings:

                  $chcp = "chcp 65001" ascii

                  $headless = "start "" msedge --headless=new --disable-gpu" ascii

                  

                  $command_1 = "taskkill /im msedge.exe /f" ascii

                  $command_2 = "whoami>"%programdata%" ascii

                  $command_3 = "timeout" ascii

                  $command_4 = "copy "%programdata%" ascii

                  $non_generic_del_1 = "del /q /f "%programdata%" ascii

                  $non_generic_del_3 = "del /q /f "%userprofile%Downloads" ascii

     

                  $generic_del = "del /q /f" ascii

           condition:

                  (

                          $chcp 

                          and 

                          $headless

                  )

                  and

                  (

                          1 of ($non_generic_del_*)

                          or

                          ($generic_del)

                          or

                          3 of ($command_*)

                  )

    }

    MASEPIE

    rule APT28_MASEPIE {

           meta:

                  description = "Detects MASEPIE python script"

           strings:

                  $masepie_unique_1 = "os.popen('whoami').read()"

                  $masepie_unique_2 = "elif message == 'check'"

                  $masepie_unique_3 = "elif message == 'send_file':"

                  $masepie_unique_4 = "elif message == 'get_file'"

                  $masepie_unique_5 = "enc_mes('ok'"

                  $masepie_unique_6 = "Bad command!'.encode('ascii'"

                  $masepie_unique_7 = "{user}{SEPARATOR}{k}"

                  $masepie_unique_8 = "raise Exception("Reconnect"

           condition:

                  3 of ($masepie_unique_*)

    }

    STEELHOOK

    rule APT28_STEELHOOK {

           meta:

                  description = "Detects APT28's STEELHOOK powershell script"

           strings:

                  $s_1 = "$($env:LOCALAPPDATAGoogleChromeUser DataLocal State)"

                  $s_2 = "$($env:LOCALAPPDATAGoogleChromeUser DataDefaultLogin Data)"

                  $s_3 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataLocal State)"

                  $s_4 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataDefaultLogin Data)"

                  $s_5 = "os_crypt.encrypted_key"

                  $s_6 = "System.Security.Cryptography.DataProtectionScope"

                  $s_7 = "[system.security.cryptography.protectdata]::Unprotect"

                  $s_8 = "Invoke-RestMethod"

           condition:

                  all of them

    }

    PSEXEC

    rule GENERIC_PSEXEC {

           meta:

                  description = "Detects SysInternals PSEXEC executable"

           strings:

                  $sysinternals_1 = "SYSINTERNALS SOFTWARE LICENCE TERMS"

                  $sysinternals_2 = "/accepteula"

                  $sysinternals_3 = "SoftwareSysinternals"

                  $network_1 = "%sIPC$"

                  $network_2 = "%sADMIN$%s"

                  $network_3 = "DeviceLanmanRedirector%sipc$"

                  $psexec_1 = "PSEXESVC"

                  $psexec_2 = "PSEXEC-{}-"

                  $psexec_3 = "Copying %s to %s..."

                  $psexec_4 = "gPSINFSVC"

           condition:

                  (

                          ( uint16( 0x0 ) ==0x5a4d )

                          and

                          ( uint16( uint32( 0x3c )) == 0x4550 )

                  )

                  and 

                          filesize < 1024KB

                  and

                  (

                          ( any of ($sysinternals_*) and any of ($psexec_*) )

                          or

                          ( 2 of ($network_*) and 2 of ($psexec_*))

                  )

    }

    The cybersecurity industry provides overlapping cyber threat intelligence, IOCs, and mitigation recommendations related to GRU unit 26165 cyber actors. While not all encompassing, the following are the most notable threat group names related under MITRE ATT&CK G0007 and commonly used within the cybersecurity community: 

    • APT28 [14]
    • Fancy Bear [14]
    • Forest Blizzard [14]
    • Blue Delta [15]

    Note: Cybersecurity companies have different methods of tracking and attributing cyber actors, and this may not be a 1:1 correlation to the U.S. government’s understanding for all activity related to these groupings.

    Further Reference

    To search for the presence of malicious email messages targeting CVE-2023-23397, network defenders may consider using the script published by Microsoft: https://aka.ms/CVE-2023-23397ScriptDoc. 

    For the Impacket TTP, network defenders may consider using the following publicly available Impacket YARA detection rule:
    https://github.com/Neo23x0/signature-base/blob/master/yara/gen_impacket_tools.yar

    Works Cited

    [1] Microsoft. Defending Ukraine: Early Lessons from the Cyber War. 2022. https://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/  
    [2] FBI et al. Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations. 2024. https://media.defense.gov/2024/Feb/27/2003400753/-1/-1/0/CSA-Russian-Actors-Use-Routers-Facilitate-Cyber_Operations.PDF   
    [3] NSA et al. Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments. 2021. https://media.defense.gov/2021/Jul/01/2002753896/-1/-1/0/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF 
    [4] ANSSI. Campagnes d'attaques du mode opératoire APT28 depuis 2021. 2023. https://cert.ssi.gouv.fr/cti/CERTFR-2023-CTI-009/  
    [5] ANSSI. Targeting and compromise of french entities using the APT28 intrusion set. 2025. https://cert.ssi.gouv.fr/cti/CERTFR-2025-CTI-007/   
    [6] Polish Cyber Command. Detecting Malicious Activity Against Microsoft Exchange Servers. 2023. https://www.wojsko-polskie.pl/woc/articles/aktualnosci-w/detecting-malicious-activity-against-microsoft-exchange-servers/ 
    [7] IBM. Israel-Hamas Conflict Lures to Deliver Headlace Malware. 2023. https://securityintelligence.com/x-force/itg05-ops-leverage-israel-hamas-conflict-lures-to-deliver-headlace-malware/ 
    [8] CERT-UA. APT28: From Initial Attack to Creating Domain Controller Threats in an Hour. 2023. https://cert.gov.ua/article/6276894 
    [9] NSA. Embracing a Zero Trust Security Model. 2021. https://media.defense.gov/2021/Feb/25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF  
    [10] NSA et al. Keeping PowerShell: Security Measures to Use and Embrace. 2022. https://media.defense.gov/2022/Jun/22/2003021689/-1/-1/0/CSI_KEEPING_POWERSHELL_SECURITY_MEASURES_TO_USE_AND_EMBRACE_20220622.PDF 
    [11] National Institute of Standards and Technology (NIST). Special Publication 800-63B: Digital Identity Guidelines – Authentication and Lifecycle Management. 2020. https://pages.nist.gov/800-63-3/sp800-63b.html 
    [12] NSA. Selecting Secure Multi-factor Authentication Solutions. October 16, 2020. https://media.defense.gov/2024/Jul/31/2003515137/-1/-1/0/MULTIFACTOR_AUTHENTICATION_SOLUTIONS_UOO17091520.PDF  
    [13] NSA and CSA. NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations. 2023. https://media.defense.gov/2023/Oct/05/2003314578/-1/-1/0/JOINT_CSA_TOP_TEN_MISCONFIGURATIONS_TLP-CLEAR.PDF 

    [14] Department of Justice. Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU). 2024. https://www.justice.gov/archives/opa/pr/justice-department-conducts-court-authorized-disruption-botnet-controlled-russian  
    [15] Recorded Future. GRU’s BlueDelta Targets Key Networks in Europe with Multi-Phase Espionage Campaigns. 2024. https://go.recordedfuture.com/hubfs/reports/CTA-RU-2024-0530.pdf  
     

    Disclaimer of endorsement

    The information and opinions contained in this document are provided "as is" and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.

    Purpose

    This document was developed in furtherance of the authoring agencies’ cybersecurity missions, including their responsibilities to identify and disseminate threats and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.

    Contact

    United States organizations

    • National Security Agency (NSA)
    • Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI)
      • U.S. organizations are encouraged to reporting suspicious or criminal activity related to information in this advisory to CISA via the agency’s Incident Reporting System, its 24/7 Operations Center (report@cisa.gov or 888-282-0870), or your local FBI field office. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment user for the activity; the name of the submitting company or organization; and a designated point of contact.
    • Department of Defense Cyber Crime Center (DC3)

    United Kingdom organizations

    Germany organizations

    Czech Republic organizations

    Poland organizations

    Australian organizations

    • Visit cyber.gov.au or call 1300 292 371 (1300 CYBER 1) to report cybersecurity incidents and access alerts and advisories.

    Canadian organizations

    Estonia organizations

    French organizations

    • French organizations are encouraged to report suspicious activity or incident related to information found in this advisory by contacting ANSSI/CERT-FR by email at cert-fr@ssi.gouv.fr or by phone at: 3218 or +33 9 70 83 32 18. 

    See Table 2 through Table 14 for all the threat actor tactics and techniques referenced in this advisory.

    Table 2: Reconnaissance
    Tactic/Technique Title ID Use
    Reconnaissance TA0043 Conducted reconnaissance on at least one entity involved in the production of ICS components for railway management.
    Gather Victim Identity Information: Email Addresses T1589.002 Conducted contact information reconnaissance to identify additional targets in key positions.
    Gather Victim Org Information T1591 Conducted reconnaissance of the cybersecurity department.
    Gather Victim Org Information: Identify Roles T1591.004 Conducted reconnaissance of individuals responsible for coordinating transport.
    Gather Victim Org Information: Business Relationships T1591.002 Conducted reconnaissance of other companies cooperating with the victim entity.
    Gather Victim Host Information T1592 Attempted to enumerate Real Time Streaming Protocol (RTSP) servers hosting IP cameras.
    Table 3: Resource development
    Tactic/Technique Title ID Use
    Compromise Accounts: Email Accounts T1586.002 Sent phishing emails using compromised accounts.
    Compromise Accounts: Cloud Accounts T1586.003 Sent phishing emails using compromised accounts.
    Table 4: Initial Access
    Tactic/Technique Title ID Use
    Trusted Relationship T1199 Conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access.
    Phishing T1566 Used spearphishing for credentials and delivering malware to gain initial access to targeted entities.
    Phishing: Spearphishing Attachment T1566.001 Sent emails with malicious attachments.
    Phishing: Spearphishing Link T1566.002 Used spearphishing with included links to fake login pages. Sent emails with embedded hyperlinks that downloaded a malicious archive.
    Phishing: Spearphishing Voice T1566.004 Attempted to use voice phishing to gain access to privileged accounts by impersonating IT staff.
    External Remote Services T1133 Exploited Internet-facing infrastructure, including corporate VPNs, to gain initial access to targeted entities.
    Exploit Public-Facing Application T1190 Exploited public vulnerabilities and SQL injection to gain initial access to targeted entities.
    Content Injection T1659 Leveraged a WinRAR vulnerability allowing for the execution of arbitrary code embedded in an archive.
    Table 5: Execution
    Tactic/Technique Title ID Use
    User Execution: Malicious Link T1204.001 Used malicious links to hosted shortcuts in spearphishing.
    User Execution: Malicious File T1204.002 Delivered malware executables via spearphishing.
    Scheduled Task/Job: Scheduled Task T1053.005 Used scheduled tasks to establish persistence.
    Command and Scripting Interpreter T1059 Delivered scripts in spearphishing. Executed arbitrary shell commands.
    Command and Scripting Interpreter: PowerShell T1059.001 PowerShell commands were often used to prepare data for exfiltration.
    Command and Scripting Interpreter: Windows Command Shell T1059.003 Used BAT script in spearphishing.
    Command and Scripting Interpreter: Visual Basic T1059.005 Used VBScript in spearphishing.
    Command and Scripting Interpreter: Python T1059.006 Installed python on infected machines to enable the execution of Certipy.
    Table 6: Persistence
    Tactic/Technique Title ID Use
    Account Manipulation: 
    Additional Email Delegate 
    Permissions

    T1098.002 

    Used manipulation of mailbox permissions to establish sustained email collection. 
    Modify Authentication Process: 
    Multi-Factor Authentication

    T1556.006 

    Enrolled compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access. 
    Hijack Execution Flow: DLL 
    Search Order Hijacking 
    T1574.001  Used DLL search order hijacking to facilitate malware execution. 
    Boot or Logon Autostart 
    Execution: Registry Run Keys / 
    Startup Folder

    T1547.001 

    Used run keys to establish persistence. 
    Boot or Logon Autostart 
    Execution: Shortcut 
    Modification

    T1547.009 

    Placed malicious shortcuts in the startup folder to establish persistence. 
    Table 7: Defense Evasion
    Tactic/Technique Title ID Use
    Indicator Removal: Clear 
    Windows Event Logs
    T1070.001  Deleted event logs through the wevtutil utility.
    Table 8: Credential access 
    Tactic/Technique Title ID Use

    Brute Force 

    Sent requests with Base64-encoded credentials for the RTSP server, which included publicly documented default credentials, and likely were generic attempts to brute force access to the devices. 

    Brute Force: Password Guessing 

    T1110.001 

    Used credential guessing to gain initial access to targeted entities. 

    Brute Force: Password Spraying 

    T1110.003 

    Used brute force to gain initial access to targeted entities. Conducted a brute force password spray via LDAP. 

    Multi-Factor Authentication Interception 

    Used multi-stage redirectors to provide MFA relaying capabilities in some campaigns. 

    Input Capture 

    Used multi-stage redirectors to provide CAPTCHA relaying capabilities in some campaigns. 

    Forced Authentication 

    Used an Outlook NTLM vulnerability to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations. 

    OS Credential Dumping: NTDS 

    T1003.003 

    Attempted to dump Active Directory NTDS.dit domain databases. 

    Unsecured Credentials: Group Policy Preferences 

    T1552.006 

    Retrieved plaintext passwords via Group Policy Preferences using Get-GPPPassword.py. 

    Table 9: Discovery
    Tactic/Technique Title ID Use

    Account Discovery: Domain Account

    T1087.002

    Used a modified ldap-dump.py to enumerate the Windows environment.

    Table 10: Command and Control
    Tactic/Technique Title ID Use

    Hide Infrastructure 

    T1665 

    Abused SOHO devices to facilitate covert cyber operations, as well as proxy malicious activity, via devices with geolocation in proximity to the target. 

    Proxy: External Proxy 

    T1090.002 

    Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers. 

    Proxy: Multi-hop Proxy 

    T1090.003 

    Used Tor and commercial VPNs as part of their anonymization infrastructure 

    Encrypted Channel 

    T1573 

    Connected to victim infrastructure using encrypted TLS. 

    Multi-Stage Channels 

    T1104 

    Used multi-stage redirectors for campaigns. 

    Table 11: Defense evasion (mobile framework)
    Tactic/Technique Title ID Use

    Execution Guardrails 

    Used multi-stage redirectors to verify browser fingerprints in some campaigns. 

    Execution Guardrails: Geofencing 

    T1627.001 

    Used multi-stage redirectors to verify IP-geolocation in some campaigns. 

    Table 12: Lateral movement
    Tactic/Technique Title ID Use

    Lateral Movement 

    Used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment. 

    Remote Services: Remote Desktop Protocol 

    T1021.001 

    Moved laterally within the network using RDP. 

    Table 13: Collection
    Tactic/Technique Title ID Use

    Email Collection 

    Retrieved sensitive data from email servers. 

    Email Collection: Remote Email Collection 

    T1114.002 

    Used server data exchange protocols and APIs such as Exchange Web Services (EWS) and IMAP to exfiltrate data from email servers. 

    Automated Collection 

    Used periodic EWS queries to collect new emails. 

    Video Capture 

    Attempted to gain access to the cameras’ feeds. 

    Archive Collected Data 

    Accessed files were archived in .zip files prior to exfiltration. 

    Archive Collected Data: Archive via Utility 

    T1560.001 

    Prepared zip archives for upload to the actors’ infrastructure. 

    Table 14: Exfiltration
    Tactic/Technique Title ID Use

    Exfiltration Over Alternative Protocol 

    Attempted to exfiltrate archived data via a previously dropped OpenSSH binary. 

    Scheduled Transfer 

    Used periodic EWS queries to collect new emails sent and received since the last data exfiltration. 

    Appendix B: CVEs exploited

    Table 15: Exploited CVE information
    CVE  Vendor/Product  Details

    CVE-2023-38831 

    RARLAB WinRAR 

    Allows execution of arbitrary code when a user attempts to view a benign file within a ZIP archive. 

    CVE-2023-23397 

    Microsoft Outlook 

    External actors could send specially crafted emails that cause a connection from the victim to an untrusted location of the actor’s control, leaking the Net-NTLMv2 hash of the victim that the actor could then relay to another service to authenticate as the victim. 

    CVE-2021-44026 

    Roundcube Webmail 

    Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search params. 

    CVE-2020-35730 

    Roundcube Webmail 

    An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16 and 1.4.x before 1.4.10, where a plaintext email message with JavaScript in a link reference element is mishandled by linkref_addindex in rcube_string_replacer.php. 

    CVE-2020-12641 

    Roundcube Webmail 

    Roundcube Webmail before 1.4.4 allows arbitrary code execution via shell metacharacters in a configuration setting for im_convert_path or im_identify_path in rcube_image.php. 

    Appendix C: MITRE D3FEND Countermeasures

    Table 16: MITRE D3FEND countermeasures
    Countermeasure Title  ID  Details 

    Network Isolation 

    Employ appropriate network segmentation. Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers. 

    Access Mediation 

    Limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions. Configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. 

    Inbound Traffic Filtering 

    Implement host firewall rules to block connections from other devices on the network, other than from authorized management devices and servers, to prevent lateral movement. 

    Resource Access Pattern Analysis 

    Use automated tools to audit access logs for security concerns and identify anomalous access requests. 

    Outbound Traffic Filtering 

    Block NTLM/SMB requests to external infrastructure. 

    Platform Monitoring 

    Install EDR/logging/cybersecurity solutions onto high value systems with large amounts of sensitive data such as mail servers and domain controllers. 

    System File Analysis 

    Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly. 

    Application Hardening 

    Enable optional security features in Windows to harden endpoints and mitigate initial access techniques. 

    Application-based Process Isolation 

    Enable attack surface reduction rules to prevent executable content from email. 

    Executable Allowlisting 

    Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA%. 

    Execution Isolation 

    Unless users are involved in the development of scripts, limit the execution of scripts (such as batch, JavaScript, and PowerShell) to known scripts. 

    Application Configuration Hardening 

    Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode. Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication. Turn off other ports/services not in use (e.g., FTP, web interface, etc.). 

    Process Spawn Analysis 

    Use open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters. 

    URL Reputation Analysis 

    Use services that provide enhanced browsing services and safe link checking. 

    Network Access Mediation 

    Do not allow incoming traffic, especially logins to systems, from public VPN services. Where possible, logins from public VPNs, including exit nodes in the same country as target systems, should be blocked or, if allowed, alerted on for further investigation. Ensure cameras and other Internet of Things devices are protected by a security appliance, if possible. 

    DNS Denylisting 

    D3-DNSDL 

    Do not allow outgoing traffic to hosting and API mocking services frequently used by malicious actors. 

    Domain Name Reputation Analysis 

    Heuristic detections for web requests to new subdomains may uncover malicious phishing activity. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims. 

    Multi-factor Authentication 

    Use MFA with strong factors and require regular re-authentication, especially for management accounts. 

    Job Function Access Pattern Analysis 

    D3-JFAPA 

    Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts. 

    User Account Permissions 

    Separate privileged accounts by role and alert on misuse of privileged accounts. Audit user accounts on all devices to ensure they are an accurate reflection of your organization and that they are being used as expected. 

    Token-based Authentication 

    Reduce reliance on passwords; instead, consider using services like single sign-on. 

    Credential Hardening 

    Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts. 

    Authentication Event Threshholding 

    Use account throttling or account lockout. Throttling progressively increases time delay between successive login attempts. If using account lockout, allow between 5 to 10 attempts before lockout. 

    Strong Password Policy 

    Use a service to check for compromised passwords before using them. 

    Credential Rotation 

    Change all default credentials. 

    Encrypted Tunnels 

    Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols). Use a VPN for remote connections to devices. 

    Software Update 

    Apply security patches and firmware updates to all devices. Ensure devices are currently supported. Replace devices that are end-of-life. 

    Agent Authentication 

    Ensure authentication is enabled for remote access to devices. If supported on IP cameras, enable authenticated RTSP access only. 

    User Behavior Analysis 

    Review all authentication activity for remote access to make sure it is valid and expected. Investigate any unexpected or unusual activity. 

    MIL OSI USA News -