Category: Russian Federation

  • MIL-OSI Russia: Financial news: Individual performance indicators of credit institutions (by groups of credit institutions, ranked by asset size)

    Translation. Region: Russian Federal

    Source: Central Bank of Russia –

    An important disclaimer is at the bottom of this article.

    Information on funds attracted by credit institutions

    Volume of deposits from individuals attracted by credit institutions

    More Collapse –

    The volume of funds attracted by credit institutions from legal entities

    More Collapse –

    Volume of savings (deposit) certificates, bonds and bills issued by credit institutions

    More Collapse –

    Data on the amounts of bills of exchange discounted by credit institutions

    More Collapse –

    Data on the amounts of funds of legal entities and individuals attracted by issuing bills of exchange by credit institutions

    More Collapse –

    Data on the volume of attracted bank deposits

    More Collapse –

    Information on the amount of assets and equity (capital) of credit institutions

    More Collapse –

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Banking: BSTDB Backs Renewable Energy Expansion in Bulgaria and Romania with €40 Million Loan to Renalfa IPP

    Source: Black Sea Trade and Development Bank

    Press Release | 24-Jul-2025

    Joint €315 million international financing to accelerate clean energy investments

    The Black Sea Trade and Development Bank (BSTDB) is providing up to €40 million loan to support the development, hybridization, and expansion of Renalfa IPP’s renewable energy assets in Bulgaria and Romania. The financing forms part of a broader €315 million financing package secured from leading development finance institutions and commercial banks, including the European Bank for Reconstruction and Development (EBRD), Kommunalkredit Austria AG, OTP Hungary, NLB Slovenia, and UniCredit BulBank.

    The funds will enable Renalfa IPP to upgrade its portfolio of renewable energy and battery energy storage systems (BESS), contributing to the decarbonization of Bulgaria’s and Romania’s power systems. The project will help diversify the countries’ energy mix, enhance energy security, and accelerate their transition to low-carbon economies. The BSTDB financing will also help catalyze further private and public sector investments, generate employment during both the construction and operation phases, and create long-term value for local communities. The operation represents a major step forward in the region’s transition toward cleaner, more secure, and sustainable energy systems.

    “This investment marks an important milestone in BSTDB’s efforts to support the clean energy transition in the Black Sea region,” said Dr. Serhat Köksal, BSTDB President.  “By backing the development of solar, wind, and battery storage infrastructure in Bulgaria and Romania, we are strengthening the resilience and competitiveness of their electricity sectors. The operation will play a key role in addressing the countries’ growing energy demands, while also reducing carbon emissions and supporting their commitments to climate goals. Moreover, it aligns closely with BSTDB’s Climate Strategy and reinforces our commitment to financing sustainable infrastructure and regional growth.”

    Ivo Prokopiev, CEO of Renalfa IPP, commented: “The successful raising of growth funding is an important milestone for Renalfa IPP and for our whole group. It proves the competitiveness of our integrated model for developing, investing and operating large hybrid assets. The early implementation of long duration co-located BESS allows Renalfa IPP to start offering green baseload products to market in CEE for the first time. We are proud, together with our partners from RGreen, to be on the frontier of energy transition not only in CEE, but in the whole EU.”

    Renalfa IPP is a leading independent power producer based in Vienna, specializing in the development, construction, and operation of renewable energy projects across Central and Eastern Europe. As an established platform with strong business model capabilities, Renalfa IPP works across the full value chains from project origination to asset operation. The company focuses on solar, wind, and Battery Energy Storage Systems (BESS), supporting the region’s transition to a sustainable and low-carbon energy future. Renalfa IPP is a joint venture between Renalfa Solarpro Group and RGREEN INVEST. 

    Renalfa Solarpro Group is a Vienna based clean energy and e-mobility investment group with a focus on renewable energy generation assets. Renalfa Solarpro is an established platform with strong business model capabilities, working across the full solar PV, wind, and BESS value chains from project origination to asset operation.

    RGREEN INVEST is an independent French mission-driven investment management company committed to helping investors channel their capital towards financing projects dedicated to accelerating the energy transition, mitigation, and adaptation to climate change.

    https://www.renalfa.com

    https://www.rgreeninvest.com

     

    The Black Sea Trade and Development Bank (BSTDB) is an international financial institution established by Albania, Armenia, Azerbaijan, Bulgaria, Georgia, Greece, Moldova, Romania, Russia, Türkiye, and Ukraine. The BSTDB headquarters are in Thessaloniki, Greece. BSTDB supports economic development and regional cooperation by providing loans, credit lines, equity and guarantees for projects and trade financing in the public and private sectors in its member countries. The authorized capital of the Bank is EUR 3.45 billion. For information on BSTDB, visit www.bstdb.org.

     

    Contact: Haroula Christodoulou

    : @BSTDB

    MIL OSI Global Banks

  • MIL-OSI Russia: Chinese and Russian think tanks should strengthen cooperation – Alexander Lukin

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    ZHENGZHOU, July 25 (Xinhua) — In the current complex and changing international situation, think tanks in Russia and China should strengthen cooperation, said Alexander Lukin, research director of the Institute of China and Modern Asia at the Russian Academy of Sciences, on the sidelines of the SCO Media and Think Tank Summit, which is being held from July 23 to 27 in Zhengzhou, capital of Henan Province, central China.

    Many scientific centers in Russia are already working on this, including the Institute of China and Modern Asia of the Russian Academy of Sciences. Analytical centers of China and Russia are strengthening cooperation in such areas as economics, international security, world politics, etc., added A. Lukin.

    “Strengthening cooperation between analytical centers of China and Russia, first of all, contributes to mutual understanding between the peoples, scientists and governments of our countries,” said A. Lukin. “In addition, such cooperation helps to strengthen and improve the quality of analytics and scientific information of both countries, and its promotion both within their countries and in the world as a whole.”

    A. Lukin noted that China’s economic development at the end of the 20th and beginning of the 21st centuries is a completely unique achievement in the history of mankind. Its uniqueness lies in the fact that such a combination of these methods was found that was suitable for such a huge country as China.

    According to him, this successful experiment deserves a thorough study, which is what researchers in many countries around the world are doing. -0-

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: China’s Yunnan Province Donates Solar Street Lights to Myanmar

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    YANGON, July 25 (Xinhua) — A handover ceremony for solar-powered street lights donated by China was held in Yangon on Thursday.

    40 solar street lamps donated by the Yunnan Provincial People’s Association for Friendship with Foreign Countries were handed over to the head of Taketa Township.

    The move aims to improve safety during nighttime travel and reduce energy costs, and has also helped strengthen the friendship between China and Myanmar. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: Chinese company launches pilot autonomous taxi service in Saudi Arabia

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    RIYADH, July 25 (Xinhua) — Chinese technology company WeRide on Wednesday launched a pilot autonomous taxi service under the Robotaxi brand in Saudi Arabia.

    Several dozen vehicles serve King Khalid International Airport and several key areas of Riyadh, including major highways and select destinations in the city centre.

    WeRide said it expects to launch full commercial operations by the end of 2025.

    “The pilot launch of the autonomous taxi service reflects the Kingdom’s vision and strategic investment in the future of mobility,” said Saudi Arabia’s Minister of Transport and Logistics Services Saleh bin Nasser Al Jasser. “This step reinforces our commitment to fostering innovation, adopting cutting-edge technologies, and creating a globally competitive, efficient and sustainable transport sector that supports economic growth and improves quality of life for all,” he added.

    “The kingdom’s forward-thinking approach and commitment to innovation make it a natural market for our regional expansion,” said Li Xuan, WeRide’s chief financial officer and head of international. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: 166 trucks with humanitarian aid entered Gaza overnight – Egyptian source

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    CAIRO, July 25 (Xinhua) — About 166 trucks carrying humanitarian aid entered the Gaza Strip on the night from Wednesday to Thursday, Egyptian Al-Qahira Al-Ikhbariya TV reported, citing an anonymous source in the security forces.

    According to him, trucks carrying humanitarian aid entered the besieged enclave through the Zikim and Kerem Shalom /Kerem Abu Salem/ border crossings.

    The aid shipment included flour, food and medicine, the source said. “Egypt has stepped up its efforts with all international parties to deliver more aid to the Gaza Strip during this period,” he added.

    The humanitarian situation in the Palestinian enclave continues to deteriorate, with Israel cutting off supplies and food to Gaza after the first phase of the ceasefire agreement with Hamas expired in January.

    The UN Office for the Coordination of Humanitarian Affairs (OCHA) warned on Wednesday that hunger in the sector is at its worst ever, with aid workers and those they help exhausted, aid agencies say.

    A new round of indirect talks between Hamas and Israel resumed earlier this month in the Qatari capital Doha amid international efforts to end the conflict and resume humanitarian aid deliveries.

    Since October 2023, the Israeli military campaign has killed more than 59,210 Palestinians in the enclave and injured more than 143,040, according to Gaza’s medical authorities. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: China’s domestically produced civil search and rescue aircraft Xinzhou-60 completes maiden test flight

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    BEIJING, July 25 (Xinhua) — China’s independently developed civil search and rescue aircraft MA60 successfully completed its maiden flight, officially starting the flight test and validation stage, according to Aviation Industry Corporation of China (AVIC), a leading Chinese aircraft maker.

    AVIC announced on Thursday that the aircraft successfully completed its daytime testing tasks during the one-hour and 20-minute test flight and landed safely at the airport in Xi’an, capital of northwest China’s Shaanxi Province.

    The new aircraft belongs to the domestically produced Xinzhou family of multi-role aircraft.

    According to AVIC experts, problems such as slow response times and limited coverage of the search system have long hampered the country’s ability to conduct maritime search and rescue operations over vast distances and in challenging conditions.

    Designed for search and rescue, terrain reconnaissance and personnel transportation, the Xinzhou-60 is designed to cover a wide range of application scenarios. It can perform search and rescue missions at sea, in high-altitude areas and in areas affected by natural disasters such as earthquakes and floods.

    The specialized aircraft is expected to greatly enhance China’s maritime search and rescue capabilities, significantly improving response speed and coverage area, AVIC said.

    The Xinzhou-60 aircraft development project was officially launched in December 2021. The production and delivery of major components was completed in December 2024, followed by final assembly and delivery work in May 2025. -0-

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: Global investors’ confidence in China market is growing

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    Global sovereign wealth funds are increasing their China holdings, optimistic about China’s advances in digital technology, renewable energy and advanced manufacturing, according to Invesco’s latest Global Sovereign Wealth Management 2025 research report.

    About 60% of Middle Eastern sovereign wealth funds plan to increase their Chinese holdings over the next five years, while sovereign wealth funds from Asia-Pacific, Africa and North America have also said they will increase their investment in the Chinese market.

    Factors contributing to the increase in investment include high returns in the Chinese market, diversification of investment portfolios and improved Chinese policies on market access for foreign investors.

    Respondents acknowledged China’s favorable policies and noted that China’s innovation leadership in science and technology has increased, with digital technology, advanced manufacturing, clean energy, and medicine and health care being the most attractive areas.

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Economics: ToolShell: a story of five vulnerabilities in Microsoft SharePoint

    Source: Securelist – Kaspersky

    Headline: ToolShell: a story of five vulnerabilities in Microsoft SharePoint

    On July 19–20, 2025, various security companies and national CERTs published alerts about active exploitation of on-premise SharePoint servers. According to the reports, observed attacks did not require authentication, allowed attackers to gain full control over the infected servers, and were performed using an exploit chain of two vulnerabilities: CVE-2025-49704 and CVE-2025-49706, publicly named “ToolShell”. Additionally, on the same dates, Microsoft released out-of-band security patches for the vulnerabilities CVE-2025-53770 and CVE-2025-53771, aimed at addressing the security bypasses of previously issued fixes for CVE-2025-49704 and CVE-2025-49706. The release of the new, “proper” updates has caused confusion about exactly which vulnerabilities attackers are exploiting and whether they are using zero-day exploits.

    Kaspersky products proactively detected and blocked malicious activity linked to these attacks, which allowed us to gather statistics about the timeframe and spread of this campaign. Our statistics show that widespread exploitation started on July 18, 2025, and attackers targeted servers across the world in Egypt, Jordan, Russia, Vietnam, and Zambia. Entities across multiple sectors were affected: government, finance, manufacturing, forestry, and agriculture.

    While analyzing all artifacts related to these attacks, which were detected by our products and public information provided by external researchers, we found a dump of a POST request that was claimed to contain the malicious payload used in these attacks. After performing our own analysis, we were able to confirm that this dump indeed contained the malicious payload detected by our technologies, and that sending this single request to an affected SharePoint installation was enough to execute the malicious payload there.

    Our analysis of the exploit showed that it did rely on vulnerabilities fixed under CVE-2025-49704 and CVE-2025-49706, but by changing just one byte in the request, we were able to bypass those fixes.

    In this post, we provide detailed information about CVE-2025-49704, CVE-2025-49706, CVE-2025-53770, CVE-2025-53771, and one related vulnerability. Since the exploit code is already published online, is very easy to use, and poses a significant risk, we encourage all organizations to install the necessary updates.

    The exploit

    Our research started with an analysis of a POST request dump associated with this wave of attacks on SharePoint servers.

    Snippet of the exploit POST request

    We can see that this POST request targets the “/_layouts/15/ToolPane.aspx” endpoint and embeds two parameters: “MSOtlPn_Uri” and “MSOtlPn_DWP”. Looking at the code of ToolPane.aspx, we can see that this file itself does not contain much functionality and most of its code is located in the ToolPane class of the Microsoft.SharePoint.WebPartPages namespace in Microsoft.SharePoint.dll. Looking at this class reveals the code that works with the two parameters present in the exploit. However, accessing this endpoint under normal conditions is not possible without bypassing authentication on the attacked SharePoint server. This is where the first Microsoft SharePoint Server Spoofing Vulnerability CVE-2025-49706 comes into play.

    CVE-2025-49706

    This vulnerability is present in the method PostAuthenticateRequestHandler, in Microsoft.SharePoint.dll. SharePoint requires Internet Information Services (IIS) to be configured in integrated mode. In this mode, the IIS and ASP.NET authentication stages are unified. As a result, the outcome of IIS authentication is not determined until the PostAuthenticateRequest stage, at which point both the ASP.NET and IIS authentication methods have been completed. Therefore, the PostAuthenticateRequestHandler method utilizes a series of flags to track potential authentication violations. A logic bug in this method enables an authentication bypass if the “Referrer” header of the HTTP request is equal to “/_layouts/SignOut.aspx”, “/_layouts/14/SignOut.aspx”, or “/_layouts/15/SignOut.aspx” using case insensitive comparison.

    Vulnerable code in PostAuthenticateRequestHandler method (Microsoft.SharePoint.dll version 16.0.10417.20018)

    The code displayed in the image above handles the sign-out request and is also triggered when the sign-out page is specified as the referrer. When flag6 is set to false and flag7 is set to true, both conditional branches that could potentially throw an “Unauthorized Access” exception are bypassed.

    Unauthorized access checks bypassed by the exploit

    On July 8, 2025, Microsoft released an update that addressed this vulnerability by introducing additional checks to detect the usage of the “ToolPane.aspx” endpoint with the sign-out page specified as the referrer.

    CVE-2025-49706 fix (Microsoft.SharePoint.dll version 16.0.10417.20027)

    The added check uses case insensitive comparison to verify if the requested path ends with “ToolPane.aspx”. Is it possible to bypass this check, say, by using a different endpoint? Our testing has shown that this check can be easily bypassed.

    CVE-2025-53771

    We were able to successfully bypass the patch for vulnerability CVE-2025-49706 by adding just one byte to the exploit POST request. All that was required to bypass this patch was to add a “/” (slash) to the end of the requested “ToolPane.aspx” path.

    Bypass for CVE-2025-49706 fix

    On July 20, 2025, Microsoft released an update that fixed this bypass as CVE-2025-53771. This fix replaces the “ToolPane.aspx” check to instead check whether the requested path is in the list of paths allowed for use with the sign-out page specified as the referrer.

    CVE-2025-53771 fix (Microsoft.SharePoint.dll version 16.0.10417.20037)

    This allowlist includes the following paths: “/_layouts/15/SignOut.aspx”, “/_layouts/15/1033/initstrings.js”, “/_layouts/15/init.js”, “/_layouts/15/theming.js”, “/ScriptResource.axd”, “/_layouts/15/blank.js”, “/ScriptResource.axd”, “/WebResource.axd”, “/_layouts/15/1033/styles/corev15.css”, “/_layouts/15/1033/styles/error.css”, “/_layouts/15/images/favicon.ico”, “/_layouts/15/1033/strings.js”, “/_layouts/15/core.js”, and it can contain additional paths added by the administrator.

    While testing the CVE-2025-49706 bypass with the July 8, 2025 updates installed on our SharePoint debugging stand, we noticed some strange behavior. Not only did the bypass of CVE-2025-49706 work, but the entire exploit chain did! But wait! Didn’t the attackers use an additional Microsoft SharePoint Remote Code Execution Vulnerability CVE-2025-49704, which was supposed to be fixed in the same update? To understand why the entire exploit chain worked in our case, let’s take a look at the vulnerability CVE-2025-49704 and how it was fixed.

    CVE-2025-49704

    CVE-2025-49704 is an untrusted data deserialization vulnerability that exists due to improper validation of XML content. Looking at the exploit POST request, we can see that it contains two URL encoded parameters: “MSOtlPn_Uri” and “MSOtlPn_DWP”. We can see how they are handled by examining the code of the method GetPartPreviewAndPropertiesFromMarkup in Microsoft.SharePoint.dll. A quick analysis reveals that “MSOtlPn_Uri”  is a page URL that might be pointing to an any file in the CONTROLTEMPLATES folder and the parameter “MSOtlPn_DWP” contains something known as WebPart markup. This markup contains special directives that can be used to execute safe controls on a server and has a format very similar to XML.

    WebPart markup used by the attackers

    While this “XML” included in the “MSOtlPn_DWP” parameter does not itself contain a vulnerability, it allows attackers to instantiate the ExcelDataSet control from Microsoft.PerformancePoint.Scorecards.Client.dll with CompressedDataTable property set to malicious payload and trigger its processing using DataTable property getter.

    Code of the method that handles the contents of ExcelDataSet’s CompressedDataTable property in the DataTable property getter

    Looking at the code of the ExcelDataSet’s DataTable property getter in Microsoft.PerformancePoint.Scorecards.Client.dll, we find the method GetObjectFromCompressedBase64String, responsible for deserialization of CompressedDataTable property contents. The data provided as Base64 string is decoded, unzipped, and passed to the BinarySerialization.Deserialize method from Microsoft.SharePoint.dll.

    DataSet with XML content exploiting CVE-2025-49704 (deserialized)

    Attackers use this method to provide a malicious DataSet whose deserialized content is shown in the image above. It contains an XML with an element of dangerous type “System.Collections.Generic.List1[[System.Data.Services.Internal.ExpandedWrapper2[…], System.Data.Services, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089]]”, which allows attackers to execute arbitrary methods with the help of the well-known ExpandedWrapper technique aimed at exploitation of unsafe XML deserialization in applications based on the .NET framework. In fact, this shouldn’t be possible, since BinarySerialization.Deserialize in Microsoft.SharePoint.dll uses a special XmlValidator designed to protect against this technique by checking the types of all elements present in the provided XML and ensuring that they are on the list of allowed types. However, the exploit bypasses this check by placing the ExpandedWrapper object into the list.

    Now, to find out why the exploit worked on our SharePoint debugging stand with the July 8, 2025 updates installed, let’s take a look at how this vulnerability was fixed. In this patch, Microsoft did not really fix the vulnerability but only mitigated it by adding the new AddExcelDataSetToSafeControls class to the Microsoft.SharePoint.Upgrade namespace. This class contains new code that modifies the web.config file and marks the Microsoft.PerformancePoint.Scorecards.ExcelDataSet control as unsafe. Because SharePoint does not execute this code on its own after installing updates, the only way to achieve the security effect was to manually run a configuration upgrade using the SharePoint Products Configuration Wizard tool. Notably, the security guidance for CVE-2025-49704 does not mention the need for this step, which means at least some SharePoint administrators may skip it. Meanwhile, anyone who installed this update but did not manually perform a configuration upgrade remained vulnerable.

    CVE-2025-53770

    On July 20, 2025, Microsoft released an update with a proper fix for the CVE-2025-49704 vulnerability. This patch introduces an updated XmlValidator that now properly validates element types in XML, preventing exploitation of this vulnerability without requiring a configuration upgrade and, more importantly, addressing the root cause and preventing exploitation of the same vulnerability through controls other than Microsoft.PerformancePoint.Scorecards.ExcelDataSet.

    DataSet with XML content exploiting CVE-2025-49704 (deserialized)

    CVE-2020-1147

    Readers familiar with previous SharePoint exploits might feel that the vulnerability CVE-2025-49704/CVE-2025-53770 and the exploit used by the attackers looks very familiar and very similar to the older .NET Framework, SharePoint Server, and Visual Studio Remote Code Execution Vulnerability CVE-2020-1147. In fact, if we compare the exploit for CVE-2020-1147 and an exploit for CVE-2025-49704/CVE-2025-53770, we can see that they are almost identical. The only difference is that in the exploit for CVE-2025-49704/CVE-2025-53770, the dangerous ExpandedWrapper object is placed in the list. This makes CVE-2025-53770 an updated fix for CVE-2020-1147.

    DataSet with XML content exploiting CVE-2020-1147

    Conclusions

    Despite the fact that patches for the ToolShell vulnerabilities are now available for deployment, we assess that this chain of exploits will continue being used by attackers for a long time. We have been observing the same situation with other notorious vulnerabilities, such as ProxyLogon, PrintNightmare, or EternalBlue. While they have been known for years, many threat actors still continue leveraging them in their attacks to compromise unpatched systems. We expect the ToolShell vulnerabilities to follow the same fate, as they can be exploited with extremely low effort and allow full control over the vulnerable server.

    To stay better protected against threats like ToolShell, we as a community should learn lessons from previous events in the industry related to critical vulnerabilities. Specifically, the speed of applying security patches nowadays is the most important factor when it comes to fighting such vulnerabilities. Since public exploits for these dangerous vulnerabilities appear very soon after vulnerability announcements, it is paramount to install patches as soon as possible, as a gap of even a few hours can make a critical difference.

    At the same time, it is important to protect enterprise networks against zero-day exploits, which can be leveraged when there is no available public patch for vulnerabilities. In this regard, it is critical to equip machines with reliable cybersecurity solutions that have proven effective in combatting ToolShell attacks before they were publicly disclosed.

    Kaspersky Next with its Behaviour detection component proactively protects against  exploitation of these vulnerabilities. Additionally, it is able to detect exploitation and the subsequent malicious activity.

    Kaspersky products detect the exploits and malware used in these attacks with the following verdicts:

    • UDS:DangerousObject.Multi.Generic
    • PDM:Exploit.Win32.Generic
    • PDM:Trojan.Win32.Generic
    • HEUR:Trojan.MSIL.Agent.gen
    • ASP.Agent.*
    • PowerShell.Agent.*

    MIL OSI Economics

  • MIL-OSI Economics: ToolShell: a story of five vulnerabilities in Microsoft SharePoint

    Source: Securelist – Kaspersky

    Headline: ToolShell: a story of five vulnerabilities in Microsoft SharePoint

    On July 19–20, 2025, various security companies and national CERTs published alerts about active exploitation of on-premise SharePoint servers. According to the reports, observed attacks did not require authentication, allowed attackers to gain full control over the infected servers, and were performed using an exploit chain of two vulnerabilities: CVE-2025-49704 and CVE-2025-49706, publicly named “ToolShell”. Additionally, on the same dates, Microsoft released out-of-band security patches for the vulnerabilities CVE-2025-53770 and CVE-2025-53771, aimed at addressing the security bypasses of previously issued fixes for CVE-2025-49704 and CVE-2025-49706. The release of the new, “proper” updates has caused confusion about exactly which vulnerabilities attackers are exploiting and whether they are using zero-day exploits.

    Kaspersky products proactively detected and blocked malicious activity linked to these attacks, which allowed us to gather statistics about the timeframe and spread of this campaign. Our statistics show that widespread exploitation started on July 18, 2025, and attackers targeted servers across the world in Egypt, Jordan, Russia, Vietnam, and Zambia. Entities across multiple sectors were affected: government, finance, manufacturing, forestry, and agriculture.

    While analyzing all artifacts related to these attacks, which were detected by our products and public information provided by external researchers, we found a dump of a POST request that was claimed to contain the malicious payload used in these attacks. After performing our own analysis, we were able to confirm that this dump indeed contained the malicious payload detected by our technologies, and that sending this single request to an affected SharePoint installation was enough to execute the malicious payload there.

    Our analysis of the exploit showed that it did rely on vulnerabilities fixed under CVE-2025-49704 and CVE-2025-49706, but by changing just one byte in the request, we were able to bypass those fixes.

    In this post, we provide detailed information about CVE-2025-49704, CVE-2025-49706, CVE-2025-53770, CVE-2025-53771, and one related vulnerability. Since the exploit code is already published online, is very easy to use, and poses a significant risk, we encourage all organizations to install the necessary updates.

    The exploit

    Our research started with an analysis of a POST request dump associated with this wave of attacks on SharePoint servers.

    Snippet of the exploit POST request

    We can see that this POST request targets the “/_layouts/15/ToolPane.aspx” endpoint and embeds two parameters: “MSOtlPn_Uri” and “MSOtlPn_DWP”. Looking at the code of ToolPane.aspx, we can see that this file itself does not contain much functionality and most of its code is located in the ToolPane class of the Microsoft.SharePoint.WebPartPages namespace in Microsoft.SharePoint.dll. Looking at this class reveals the code that works with the two parameters present in the exploit. However, accessing this endpoint under normal conditions is not possible without bypassing authentication on the attacked SharePoint server. This is where the first Microsoft SharePoint Server Spoofing Vulnerability CVE-2025-49706 comes into play.

    CVE-2025-49706

    This vulnerability is present in the method PostAuthenticateRequestHandler, in Microsoft.SharePoint.dll. SharePoint requires Internet Information Services (IIS) to be configured in integrated mode. In this mode, the IIS and ASP.NET authentication stages are unified. As a result, the outcome of IIS authentication is not determined until the PostAuthenticateRequest stage, at which point both the ASP.NET and IIS authentication methods have been completed. Therefore, the PostAuthenticateRequestHandler method utilizes a series of flags to track potential authentication violations. A logic bug in this method enables an authentication bypass if the “Referrer” header of the HTTP request is equal to “/_layouts/SignOut.aspx”, “/_layouts/14/SignOut.aspx”, or “/_layouts/15/SignOut.aspx” using case insensitive comparison.

    Vulnerable code in PostAuthenticateRequestHandler method (Microsoft.SharePoint.dll version 16.0.10417.20018)

    The code displayed in the image above handles the sign-out request and is also triggered when the sign-out page is specified as the referrer. When flag6 is set to false and flag7 is set to true, both conditional branches that could potentially throw an “Unauthorized Access” exception are bypassed.

    Unauthorized access checks bypassed by the exploit

    On July 8, 2025, Microsoft released an update that addressed this vulnerability by introducing additional checks to detect the usage of the “ToolPane.aspx” endpoint with the sign-out page specified as the referrer.

    CVE-2025-49706 fix (Microsoft.SharePoint.dll version 16.0.10417.20027)

    The added check uses case insensitive comparison to verify if the requested path ends with “ToolPane.aspx”. Is it possible to bypass this check, say, by using a different endpoint? Our testing has shown that this check can be easily bypassed.

    CVE-2025-53771

    We were able to successfully bypass the patch for vulnerability CVE-2025-49706 by adding just one byte to the exploit POST request. All that was required to bypass this patch was to add a “/” (slash) to the end of the requested “ToolPane.aspx” path.

    Bypass for CVE-2025-49706 fix

    On July 20, 2025, Microsoft released an update that fixed this bypass as CVE-2025-53771. This fix replaces the “ToolPane.aspx” check to instead check whether the requested path is in the list of paths allowed for use with the sign-out page specified as the referrer.

    CVE-2025-53771 fix (Microsoft.SharePoint.dll version 16.0.10417.20037)

    This allowlist includes the following paths: “/_layouts/15/SignOut.aspx”, “/_layouts/15/1033/initstrings.js”, “/_layouts/15/init.js”, “/_layouts/15/theming.js”, “/ScriptResource.axd”, “/_layouts/15/blank.js”, “/ScriptResource.axd”, “/WebResource.axd”, “/_layouts/15/1033/styles/corev15.css”, “/_layouts/15/1033/styles/error.css”, “/_layouts/15/images/favicon.ico”, “/_layouts/15/1033/strings.js”, “/_layouts/15/core.js”, and it can contain additional paths added by the administrator.

    While testing the CVE-2025-49706 bypass with the July 8, 2025 updates installed on our SharePoint debugging stand, we noticed some strange behavior. Not only did the bypass of CVE-2025-49706 work, but the entire exploit chain did! But wait! Didn’t the attackers use an additional Microsoft SharePoint Remote Code Execution Vulnerability CVE-2025-49704, which was supposed to be fixed in the same update? To understand why the entire exploit chain worked in our case, let’s take a look at the vulnerability CVE-2025-49704 and how it was fixed.

    CVE-2025-49704

    CVE-2025-49704 is an untrusted data deserialization vulnerability that exists due to improper validation of XML content. Looking at the exploit POST request, we can see that it contains two URL encoded parameters: “MSOtlPn_Uri” and “MSOtlPn_DWP”. We can see how they are handled by examining the code of the method GetPartPreviewAndPropertiesFromMarkup in Microsoft.SharePoint.dll. A quick analysis reveals that “MSOtlPn_Uri”  is a page URL that might be pointing to an any file in the CONTROLTEMPLATES folder and the parameter “MSOtlPn_DWP” contains something known as WebPart markup. This markup contains special directives that can be used to execute safe controls on a server and has a format very similar to XML.

    WebPart markup used by the attackers

    While this “XML” included in the “MSOtlPn_DWP” parameter does not itself contain a vulnerability, it allows attackers to instantiate the ExcelDataSet control from Microsoft.PerformancePoint.Scorecards.Client.dll with CompressedDataTable property set to malicious payload and trigger its processing using DataTable property getter.

    Code of the method that handles the contents of ExcelDataSet’s CompressedDataTable property in the DataTable property getter

    Looking at the code of the ExcelDataSet’s DataTable property getter in Microsoft.PerformancePoint.Scorecards.Client.dll, we find the method GetObjectFromCompressedBase64String, responsible for deserialization of CompressedDataTable property contents. The data provided as Base64 string is decoded, unzipped, and passed to the BinarySerialization.Deserialize method from Microsoft.SharePoint.dll.

    DataSet with XML content exploiting CVE-2025-49704 (deserialized)

    Attackers use this method to provide a malicious DataSet whose deserialized content is shown in the image above. It contains an XML with an element of dangerous type “System.Collections.Generic.List1[[System.Data.Services.Internal.ExpandedWrapper2[…], System.Data.Services, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089]]”, which allows attackers to execute arbitrary methods with the help of the well-known ExpandedWrapper technique aimed at exploitation of unsafe XML deserialization in applications based on the .NET framework. In fact, this shouldn’t be possible, since BinarySerialization.Deserialize in Microsoft.SharePoint.dll uses a special XmlValidator designed to protect against this technique by checking the types of all elements present in the provided XML and ensuring that they are on the list of allowed types. However, the exploit bypasses this check by placing the ExpandedWrapper object into the list.

    Now, to find out why the exploit worked on our SharePoint debugging stand with the July 8, 2025 updates installed, let’s take a look at how this vulnerability was fixed. In this patch, Microsoft did not really fix the vulnerability but only mitigated it by adding the new AddExcelDataSetToSafeControls class to the Microsoft.SharePoint.Upgrade namespace. This class contains new code that modifies the web.config file and marks the Microsoft.PerformancePoint.Scorecards.ExcelDataSet control as unsafe. Because SharePoint does not execute this code on its own after installing updates, the only way to achieve the security effect was to manually run a configuration upgrade using the SharePoint Products Configuration Wizard tool. Notably, the security guidance for CVE-2025-49704 does not mention the need for this step, which means at least some SharePoint administrators may skip it. Meanwhile, anyone who installed this update but did not manually perform a configuration upgrade remained vulnerable.

    CVE-2025-53770

    On July 20, 2025, Microsoft released an update with a proper fix for the CVE-2025-49704 vulnerability. This patch introduces an updated XmlValidator that now properly validates element types in XML, preventing exploitation of this vulnerability without requiring a configuration upgrade and, more importantly, addressing the root cause and preventing exploitation of the same vulnerability through controls other than Microsoft.PerformancePoint.Scorecards.ExcelDataSet.

    DataSet with XML content exploiting CVE-2025-49704 (deserialized)

    CVE-2020-1147

    Readers familiar with previous SharePoint exploits might feel that the vulnerability CVE-2025-49704/CVE-2025-53770 and the exploit used by the attackers looks very familiar and very similar to the older .NET Framework, SharePoint Server, and Visual Studio Remote Code Execution Vulnerability CVE-2020-1147. In fact, if we compare the exploit for CVE-2020-1147 and an exploit for CVE-2025-49704/CVE-2025-53770, we can see that they are almost identical. The only difference is that in the exploit for CVE-2025-49704/CVE-2025-53770, the dangerous ExpandedWrapper object is placed in the list. This makes CVE-2025-53770 an updated fix for CVE-2020-1147.

    DataSet with XML content exploiting CVE-2020-1147

    Conclusions

    Despite the fact that patches for the ToolShell vulnerabilities are now available for deployment, we assess that this chain of exploits will continue being used by attackers for a long time. We have been observing the same situation with other notorious vulnerabilities, such as ProxyLogon, PrintNightmare, or EternalBlue. While they have been known for years, many threat actors still continue leveraging them in their attacks to compromise unpatched systems. We expect the ToolShell vulnerabilities to follow the same fate, as they can be exploited with extremely low effort and allow full control over the vulnerable server.

    To stay better protected against threats like ToolShell, we as a community should learn lessons from previous events in the industry related to critical vulnerabilities. Specifically, the speed of applying security patches nowadays is the most important factor when it comes to fighting such vulnerabilities. Since public exploits for these dangerous vulnerabilities appear very soon after vulnerability announcements, it is paramount to install patches as soon as possible, as a gap of even a few hours can make a critical difference.

    At the same time, it is important to protect enterprise networks against zero-day exploits, which can be leveraged when there is no available public patch for vulnerabilities. In this regard, it is critical to equip machines with reliable cybersecurity solutions that have proven effective in combatting ToolShell attacks before they were publicly disclosed.

    Kaspersky Next with its Behaviour detection component proactively protects against  exploitation of these vulnerabilities. Additionally, it is able to detect exploitation and the subsequent malicious activity.

    Kaspersky products detect the exploits and malware used in these attacks with the following verdicts:

    • UDS:DangerousObject.Multi.Generic
    • PDM:Exploit.Win32.Generic
    • PDM:Trojan.Win32.Generic
    • HEUR:Trojan.MSIL.Agent.gen
    • ASP.Agent.*
    • PowerShell.Agent.*

    MIL OSI Economics

  • MIL-OSI Russia: Large-scale summer school “Cryptography and information security” ended in St. Petersburg

    Translation. Region: Russian Federal

    Source: Novosibirsk State University –

    An important disclaimer is at the bottom of this article.

    For more than two weeks, “Boiling Point – St. Petersburg. GUAP” was truly “boiling”, despite the midsummer. In each of the halls, the participants of the summer school “Cryptography and Information Security” were working. The traditional event, organized by the Cryptographic Center (Novosibirsk), International Mathematical Center in Akademgorodok, this year the GUAP venue hosted the event. The summer school was held for the seventh time, it brought together more than 35 teachers and over 165 students, postgraduates and schoolchildren from 35 cities of Russia. The geography of the participants is extensive: Tver, Novosibirsk, Voronezh, Khanty-Mansiysk, Sevastopol, St. Petersburg, Moscow, Ufa, Rostov-on-Don, Tyumen, Kaliningrad and other cities of our country.

    The head of the school is Natalia Tokareva, associate professor of the Department of Theoretical Cybernetics. Faculty of Mechanics and Mathematics of NSU, head of the Cryptographic Center (Novosibirsk). The organizers and partners of the summer school in 2025 were the St. Petersburg State University of Aerospace Instrumentation, Southern Federal University, Special Technology Center LLC, Practical Security Systems LLC, Infotex JSC, Enseucrypto-lab LLC and NeoQUEST. Vice-Rector for Educational Work and Youth Policy Larisa Nikolaeva and the GUAP team were responsible for the organizational issues of the large-scale event.

    Participants received knowledge from leading experts in the scientific and business fields, visited key enterprises in St. Petersburg and interesting excursions, and also united through training and sports games.

    The event’s partners — universities and companies working in the field of cryptography and information security — provided the summer school participants with not only new and useful knowledge, expert lectures, but also career opportunities and development prospects in the profession. The students were able to learn everything about internships and future careers in companies such as OOO Special Technology Center, OOO Systems of Practical Security, AO Infotex, OOO Enseucrypto-lab and NeoQUEST. Representatives of these organizations personally talked to the students, answered all their questions and told them what steps they should take to take their first career steps in the field of information security.

    The basis of the summer school was work on projects. Divided into teams, in which scientific research was carried out under the supervision of curators, the guys were preparing to present each of the projects at the final conference. The topics of the projects touched upon various issues of modern cryptography and information security: algorithms of symmetric and asymmetric cryptography, issues of constructing cryptographic protocols for solving authentication, identification, key transfer, and messaging problems. The topics of the projects were suitable for both beginners in the field of cryptography and information security, and for advanced students who had already acquired knowledge as part of their studies.

    On July 21, the summer school’s final conference took place, where the teams presented the results of their work. 23 research projects developed by the participants were combined by the organizers into a collection of papers. It can be found on the event website.

    Participants shared what projects they worked on and what new things they learned during these two busy weeks.

    Daria Severukhina, Novosibirsk:

    — Our project was dedicated to the topic of post-quantum cryptography. We were engaged in the analysis of the vulnerability of a cryptosystem based on the “lattice theory”, namely, the study of side-channel attacks. Post-quantum cryptography is very relevant now, and the topic we were working on is one of the most promising in this area. I study at the Faculty of Mechanics and Mathematics and I study cryptography only in special courses that are held at our university. Therefore, this summer school is a great start to skills and knowledge in this area. In these two weeks, I learned so much information, met leading scientists in this area, I managed to work with them, which is very valuable. I am very glad that I got the opportunity to acquire this knowledge in practice.

    Alina Skibina, Saint Petersburg:

    — In our project on the topic of “Development of a prototype of a cryptographic hash function,” we developed a prototype of a hash function called “Gorynych.” We tried to create a hash function based on the Russian standard “Stribog,” inspired by the SURF function of Bernstein. This function has a simple design, high stability, and speed. These are the properties that modern hash functions should have. The team turned out to be friendly, well-coordinated, I enjoyed our interaction, I did not feel discomfort. There were many jokes, funny moments that diluted the intense work. I am very pleased with my participation in the summer school. This is not my first participation in such an event, so I was ready for intensive work. The most important skill is experience working in a team. And the lectures are very informative and interesting in that they touch on many areas of cryptography, and perhaps I will work in some of them in the future.

    Anna Kozubova, Novorossiysk

    — I finished the 9th grade and got to the summer school. Thanks to my participation, I decided on the direction that I would choose to study at GUAP — “Information Security”. Many useful lectures were held for us, and although they were more focused on people who were already studying in this specialty, I was able to study this topic additionally and become interested in it. I want to thank my team, where friendly and working relationships were formed over these two weeks. It was precisely because we united that we were able to prepare such a wonderful project. But none of this would have happened if it were not for our mentor — a true master of his craft — Bezzateev Sergey Valentinovich. In a word, the summer school became an important event for me.

    Kirill Gromov, Tver:

    — Our project was dedicated to electronic signatures of documents. We considered post-quantum algorithms, which have a higher complexity and are designed so that with the next stage of computer technology development they will not be hackable. We also considered vulnerabilities that are better known at the moment. This is a very good experience to find out what will change in this area now. The scientific community, the experts who supported our projects are, first of all, our like-minded people and people who are interested in the development of this area. To communicate and work with such people almost on equal terms is a very good experience. A wonderful team, new knowledge, a beautiful city, and, despite the fatigue, there was strength for communication.

    Artem Kolbeev, Sevastopol:

    — This is my second time participating in the summer school “Cryptography and Information Security” and working with the same scientific supervisor — Oleg Sergeevich Zaikin. He guides the team in the right direction. We managed to choose a promising topic for study. I really liked the organization of the summer school — everything was organized competently, and we were given time not only for work, but also for excursions, recreation, and sports. The venue is suitable for comfortable work. We were given a number of very interesting lectures. And several ideas for further scientific developments arose.

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: D. Trump visits Fed headquarters, calls again for lower interest rates

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    WASHINGTON, July 25 (Xinhua) — U.S. President Donald Trump visited the Federal Reserve’s headquarters in Washington on Thursday and reiterated his call for lower interest rates.

    “We have to lower interest rates,” Trump told reporters. “People can hardly buy a home because interest rates are too high,” he added.

    “We have no inflation, we have a lot of money coming in… We should have the lowest interest rate of any country,” the president emphasized. “We can speak for everybody, frankly, we want interest rates to go down. Our country is growing rapidly, and the interest rate is the last little hurdle,” D. Trump said.

    The White House chief said he had a “very productive conversation” with Fed Chairman Jerome Powell about rates. “He’ll be able to tell you about that at the next meeting, but I will say he did say that the country is doing very well,” he added. “I trust the chairman to do the right thing. I mean, it may be a little late, as they say, but I trust him to do the right thing,” the president said.

    Local media see D. Trump’s visit to the Fed as an attempt by the administration to increase pressure on J. Powell to lower interest rates. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: Thai army says clashes in Cambodian border areas

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    BANGKOK, July 25 (Xinhua) — Clashes broke out in several areas along the Thai-Cambodian border on Friday morning, the Thai army said.

    The Second Military District, which controls part of the border, advised the population on social media to avoid traveling to border areas.

    Artillery sounds were heard again near the border on Friday morning, the National Broadcasting Service of Thailand reported, citing a local official in Surin province.

    As of 9 p.m. Thursday local time, 14 Thais had been killed and 46 injured in military clashes near the Cambodian border, a deputy spokesman for Thailand’s Ministry of Public Health said.

    Cambodia did not release any information on casualties at the time.

    The situation escalated after shootings began on Thursday morning, with both sides accusing each other of violating international law. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: Death toll from Thais in Cambodian border clashes rises to 14

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    BANGKOK, July 25 (Xinhua) — Fourteen Thais have been killed and 46 injured in military clashes near the border with Cambodia as of 9 p.m. Thursday local time, a deputy spokesman for Thailand’s Public Health Ministry said.

    Cambodia did not release any information on casualties at the time.

    The situation escalated after shootings began on Thursday morning, with both sides accusing each other of violating international law. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: Media and think tanks strengthen the construction of the SCO community of common destiny

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    ZHENGZHOU, July 25 (Xinhua) — The Shanghai Cooperation Organization (SCO) Media and Think Tank Summit is being held in Zhengzhou, capital of central China’s Henan Province, from July 23 to 27, where building a community with a shared future for the SCO has become an important topic among leading media outlets and well-known think tanks from the SCO countries.

    Irina Akulovich, Director General of the Belarusian Telegraph Agency (BELTA), said that according to calculations, in recent months their agency has already published several hundred articles about the SCO, for the latest of which the key word has become “building a just world.”

    “The countries of the organization have different visions of solving many problems, but it is China that is becoming the center that helps strengthen dialogue, hear each other and develop solutions,” noted Irina Akulovich, adding that “when we talk about the SCO, we talk about it as an organization that is capable of influencing a new, fair construction of the world thanks to the initiatives that China is taking, and I am confident that Belarus will also have its say as a full member of the organization.”

    Director of the Institute of Russia, Eastern Europe and Central Asia of the Chinese Academy of Social Sciences (CASS) Sun Zhuangzhi noted that humanitarian cooperation within the SCO plays a particularly important role. The difference between the SCO community of common destiny and traditional regional cooperation is that its formation is promoted not only by the government, but also with the active participation of non-governmental organizations, especially the media and youth.

    Sun Zhuangzhi said that through various cultural and humanitarian exchange activities, the influence and prestige of the SCO as a whole has been enhanced, and the sense of accomplishment and confidence of ordinary people has been strengthened, which has laid a favorable foundation for public opinion in building a community with a shared future for the SCO.

    “The SCO is, without exaggeration, a unique association in which not only states but also civilizations have met. And the “Shanghai spirit” is not just recorded on paper. It manifests itself in trust,” noted Marina Dmitrieva, Deputy Director of the Oriental Institute for Science at the Far Eastern Federal University.

    In her opinion, in modern conditions, cooperation between representatives of the journalistic community and academic experts is becoming especially relevant in the formation of a community of common destiny for the SCO.

    “This helps to convey to the general public the goals and objectives of the organization, the principles of its work and the results of its interaction. Thanks to this, the idea of common challenges and mutual interest in sustainable development is beginning to take root in the public discourse of the SCO countries,” she added.

    “When we talk about the SCO, it is important to realize that we are not just talking about a regional security or economic cooperation structure, but an emerging civilizational platform,” said Professor Saida Agzamkhodjaeva of the Mirzo Ulugbek National University of Uzbekistan, noting that Uzbekistan, acting within the SCO framework, is contributing to the formation of a community of common destiny for the SCO.

    According to her, the uniqueness of the SCO lies in the fact that it unites states representing different cultures and systems of thought, but at the same time striving for common foundations of interaction – trust, prevention of conflicts and ensuring sustainable development.

    “The media and think tanks play a huge role in properly conveying objectivity,” said Cholpon Koichumanova, director of the E. Zh. Maanaev Institute of History and Social and Legal Education at the I. Arabaev Kyrgyz State University.

    “The political and economic core of the SCO is China, which became one of the initiators of the creation and co-founder of the organization,” noted Denis Mukha, director of the Institute of Economics of the National Academy of Sciences of Belarus.

    According to him, the SCO format opens up opportunities for developing and implementing new forms of Belarusian-Chinese economic cooperation with the participation of other partners of the organization, launching the process of creating favorable conditions in the field of trade and investment and forming a new economic macroregion as an element of a multipolar world order. -0-

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: Three days of mourning declared in Amur Region and Khabarovsk Krai due to plane crash

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    Vladivostok, July 25 (Xinhua) — A three-day mourning has been declared in Russia’s Amur Region and Khabarovsk Krai over the crash of the An-24 plane, Amur Region Governor Vasily Orlov and Khabarovsk Krai Governor Dmitry Demeshin announced on their Telegram channels on Thursday.

    As V. Orlov wrote, on July 25, 26 and 27, flags will be lowered in all territories of the Amur Region. Also, entertainment events will be cancelled in the region, and a memorial service for the victims of the air crash will be held in all churches of the Blagoveshchensk Diocese.

    According to D. Demeshin, a three-day mourning has been declared in Khabarovsk Krai from July 25 — flags will be lowered throughout the region as a sign of grief. The families of the victims will receive a million rubles each, and they will also be paid for travel to the crash site, he noted.

    On Thursday at about 13:00 local time, contact was lost with the crew of the An-24 of Angara Airlines, which was flying from Khabarovsk to Blagoveshchensk to Tynda. The wreckage of the missing plane was found on a mountain slope 16 km from Tynda. All those on board the plane — 43 passengers and 6 crew members — died. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: International Environmental Conference

    Translation. Region: Russian Federal

    Source: Government of the Russian Federation – Government of the Russian Federation –

    An important disclaimer is at the bottom of this article.

    The theme of the plenary session is “Environmental challenges: towards sustainable development”.

    Previous news Next news

    Joint photo session of the heads of delegations of the International Environmental Conference

    The International Environmental Conference is taking place on July 25 in the Altai Republic on the territory of the Manzherok resort. Eight countries are participating in it: the Russian Federation, the Republic of Armenia, the Republic of Belarus, the Kyrgyz Republic, the Republic of Kazakhstan, the Republic of Tajikistan, the Republic of Uzbekistan and Turkmenistan. All states are long-standing partners and interact on environmental issues both bilaterally and within the framework of international associations.

    The international conference will open with a plenary session entitled “Environmental Challenges: Towards Sustainable Development,” in which the prime ministers of Russia, Armenia, Belarus, Kazakhstan, Kyrgyzstan, Tajikistan, and Uzbekistan will talk about the environmental and ecological agendas of their countries.

    Ministers of natural resources, ecology and the environment will speak at the expert session “How to maintain the global water balance?”. The heads of departments will discuss how climate change affects water resources and what measures need to be taken now to minimize the consequences.

    Drive

    The thematic session “Ecological tourism: the calling card of the state” is devoted to issues of regulating anthropogenic load on natural complexes, the role of ecotourism in economic development, issues of developing and equipping ecological routes and the functioning of transboundary reserves and national parks, and joint projects.

    The conference will also discuss the development of transboundary ecotourism, protection of specially protected natural areas and conservation of biodiversity. For example, the joint efforts of five countries to restore the snow leopard population: the rare cat lives only in Russia, Kazakhstan, Kyrgyzstan, Tajikistan and Uzbekistan.

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • Sensex, Nifty fall as FPI selling, weak global cues weigh on sentiment

    Source: Government of India

    Source: Government of India (4)

    India’s benchmark indices declined in early trade on Friday, weighed down by sustained selling by Foreign Portfolio Investors (FPIs) and weak global cues.

    The Nifty fell 110 points, or 0.44 per cent, to 24,943, while the Sensex shed 290 points, or 0.35 per cent, to 82,065.76.

    Ajay Bagga, Banking and Market Expert, said, “Indian markets are pointing to a continued negative outlook as per the traded futures. FPIs remain sellers while DIIs are absorbing the selling. Key support levels are being tested, making today’s price action crucial for the market’s health.”

    He added, “Earnings have largely remained weak, and with no India–US trade deal expected before the August 1 deadline, markets are entering a zone of concern. Fasten seat belts—we are seeing key support holding mainly due to resilient Indian retail investors, who continue to buy on dips and maintain faith in domestic management and the economy.”

    Broad market indices were also under pressure, with the Nifty 100 down 0.53 per cent, the Nifty Midcap 100 slipping 0.34 per cent, and the Nifty Smallcap 100 losing 0.56 per cent.

    Among sectors, only Nifty Pharma stayed in the green, up 0.26 per cent. Others posted losses: Nifty Auto fell 0.66 per cent, Nifty IT 0.19 per cent, Nifty Media 0.40 per cent, and Nifty Metal 0.46 per cent.

    Akshay Chinchalkar, Head of Research at Axis Securities, said, “The Nifty erased all its Wednesday gains on Thursday, dropping 159 points to close at 25,062. Yesterday’s candle formed another bearish engulfing: two in quick succession, which is rare. The key levels now are 25,000 as vital support and 25,245 as resistance. Bears will retain control unless we see a close above 25,340.”

    On the earnings front, several major companies are scheduled to report their quarterly results today, including Bajaj Finserv, Bank of Baroda, Cipla, Shriram Finance, SBI Cards, Schaeffler India, SAIL, Petronet LNG, Laurus Labs, Poonawalla Fincorp, Tata Chemicals, Aadhar Housing Finance, Grindwell Norton, and ACME Solar Holdings.

    Meanwhile, global cues remained weak. Upcoming US–China trade talks in Sweden on Monday are expected to shape the tone for US–India trade negotiations, particularly amid discussions on Russian oil supplies.

    With the RBI’s monetary policy meeting scheduled for August 6, investors are bracing for a potentially weak end to the week.

    Across Asia, markets traded lower. Japan’s Nikkei 225 was down 0.79 per cent, Singapore’s Straits Times slipped 0.48 per cent, Hong Kong’s Hang Seng dropped 1.19 per cent, and Taiwan’s Weighted Index edged down 0.08 per cent. South Korea’s KOSPI was the lone gainer, rising 0.35 per cent.

    (With inputs from ANI)

  • Indian Embassy in Thailand issues travel advisory amid Thai-Cambodia border tensions

    Source: Government of India

    Source: Government of India (4)

    The Indian Embassy in Thailand on Friday issued a travel advisory amid escalating tensions along the Thailand-Cambodia border, urging Indian tourists to remain vigilant and stay updated through official Thai sources, including the Tourism Authority of Thailand (TAT) newsroom.

    “In view of the situation near the Thailand-Cambodia border, all Indian travelers to Thailand are advised to check updates from Thai official sources, including the TAT Newsroom. As per the Tourism Authority of Thailand, places mentioned in the following link are not recommended for travel,” the Embassy of India in Thailand said in a post on X.

    The Tourism Authority of Thailand has announced that several attractions across seven provinces — Ubon Ratchathani, Surin, Sisaket, Buriram, Sa Kaeo, Chanthaburi, and Trat — are currently not recommended for visiting.

    Thailand’s Ministry of Public Health said 14 Thais — including 13 civilians and one soldier — were killed and 46 others injured in clashes along the border. Cambodia has not released casualty figures.

    The violence followed a landmine blast on Wednesday that wounded five Thai soldiers. Thailand accused Cambodia of planting new Russian-made mines, while Cambodia called the accusation “baseless,” blaming unexploded ordnance from past conflicts.

    Fighting intensified on Thursday in at least six locations near the border, including around the Ta Muen Thom temple. The Thai air force launched strikes using F-16 jets in response to alleged Cambodian rocket attacks, which the Thai Foreign Ministry described as “an act of self-defence.”

    Cambodian Prime Minister Hun Manet called on the UN Security Council to convene an emergency meeting. Cambodia’s Defence Ministry said Thai airstrikes hit a road near the Preah Vihear temple, a UNESCO World Heritage site, and vowed legal action.

    UN Secretary-General António Guterres urged both countries to “exercise maximum restraint” and resolve the crisis through dialogue, according to deputy spokesperson Farhan Haq.

    Diplomatic relations between the two countries have deteriorated sharply, with both sides expelling ambassadors earlier this week.

    IANS

  • MIL-OSI Russia: UN chief urges Thailand, Cambodia to exercise utmost restraint

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    UNITED NATIONS, July 24 (Xinhua) — UN Secretary-General Antonio Guterres has called on Thailand and Cambodia to exercise maximum restraint, his deputy spokesman Farhan Haq said at a daily briefing on Thursday.

    “The Secretary-General follows with concern reports of armed clashes along the border between Cambodia and Thailand. The Secretary-General urges both sides to exercise maximum restraint and to resolve any issues through dialogue and in a spirit of good neighbourliness with a view to finding a lasting solution to the dispute,” he said.

    The situation on the Thai-Cambodian border escalated after skirmishes on Thursday. Following the escalation, the two sides traded accusations, with Cambodian Prime Minister Hun Manet calling on the UN Security Council to convene an urgent meeting to discuss the issue. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: A report by a think tank affiliated with Xinhua News Agency highlights China’s approaches to preserving cultural heritage

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    ZHENGZHOU, July 25 (Xinhua) — The Xinhua Institute, a think tank affiliated with the Xinhua News Agency, on Friday released a report on China’s concept and practice of cultural heritage preservation.

    The report, titled “Jointly Protecting the Treasures of Human Civilization: China’s Concept and Practice of Cultural Heritage Preservation in the New Era,” provides a detailed explanation of China’s vibrant and colorful practice of cultural heritage protection and inheritance. -0-

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • Thailand, Cambodia exchange heavy artillery fire as fighting rages for second day

    Source: Government of India

    Source: Government of India (4)

    Thailand and Cambodia exchanged heavy artillery fire on Friday as their worst fighting in more than a decade stretched for a second day, despite calls from the region and beyond for an immediate ceasefire in an escalating border conflict that has killed at least 16 people.

    Thailand’s military reported clashes from before dawn in the Ubon Ratchathani and Surin provinces and said Cambodia had used artillery and Russian-made BM-21 rocket systems. Authorities said 100,000 people had been evacuated from conflict areas on the Thai side.

    “Cambodian forces have conducted sustained bombardment utilising heavy weapons, field artillery and BM-21 rocket systems,” the Thai military said in a statement.

    “Thai forces have responded with appropriate supporting fire in accordance with the tactical situation.”

    Both sides blamed each other for starting the conflict on Thursday at a disputed border area, which quickly escalated from small arms fire to heavy shelling in at least six locations 209 km (130 miles) apart along a frontier where sovereignty has been disputed for more than a century.

    Reuters journalists in Surin province reported hearing intermittent bursts of explosions on Friday, amid a heavy presence of armed Thai soldiers along roads and gas stations in the largely agrarian area.

    A Thai military convoy, including around a dozen trucks, armoured vehicles and tanks, cut across provincial roads ringed by paddy fields and moved toward the border.

    The fighting erupted on Thursday just hours after Thailand recalled its ambassador to Phnom Penh the previous night and expelled Cambodia’s envoy, in response to a second Thai soldier losing a limb to a landmine that Bangkok alleged had been laid recently by rival troops. Cambodia has dismissed that as baseless.

    DEATH TOLL RISES

    The Thai death toll rose to 15 as of early Friday, 14 of them civilians, according to the health ministry. It said 46 people were wounded, including 15 soldiers.

    Cambodia’s national government has not provided details of any casualties or evacuations of civilians. A government spokesperson did not immediately respond to a request for comment on the latest clashes.

    Meth Meas Pheakdey, spokesperson for the provincial administration of Cambodia’s Oddar Meanchey province, said one civilian had been killed and five were wounded, with 1,500 families evacuated.

    Thailand had positioned six F-16 fighter jets on Thursday in a rare combat deployment, one of which was mobilised to strike a Cambodian military target, among measures Cambodia called “reckless and brutal military aggression”.

    Thailand’s use of an F-16 underlines its military advantage over Cambodia, which has no fighter aircraft and significantly less defence hardware and personnel, according to the London-based International Institute for Strategic Studies

    The United States, a long-time treaty ally of Thailand, called for an “immediate cessation of hostilities, protection of civilians and a peaceful resolution.”

    Malaysian Prime Minister Anwar Ibrahim, the chair of the Association of Southeast Asian Nations, of which Thailand and Cambodia are members, said he had spoken to leaders of both countries and urged them to find a peaceful way out.

    “I welcome the positive signals and willingness shown by both Bangkok and Phnom Penh to consider this path forward. Malaysia stands ready to assist and facilitate this process in the spirit of ASEAN unity and shared responsibility,” he said in a social media post late on Thursday.

    -REUTERS

  • MIL-OSI Russia: Magnitude 6.6 earthquake hits Wallis and Futuna Islands – USGS

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    BEIJING, July 25 (Xinhua) — An earthquake with a magnitude of 6.6 jolted 167 km southeast of Mata-Utu (Wallis and Futuna) at 23:37 GMT on Thursday, the U.S. Geological Survey said.

    According to preliminary data, the epicenter of the tremors was located at a point with coordinates of 14.75 degrees south latitude and 175.79 degrees west longitude. The hypocenter was located at a depth of 324 km. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: Exclusive: Role of Media and Think Tanks in SCO Matters – Kyrgyz Expert

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    BISHKEK, July 25 (Xinhua) — Against the backdrop of the current global situation, the role of media and think tanks within the Shanghai Cooperation Organization (SCO) is gaining strategic importance, Kanatbek Aziz, director of the Research Institute of Geopolitics and Strategy of Kyrgyzstan, said in a recent exclusive interview with Xinhua.

    “In the context of increasing geopolitical turbulence and the crisis of the global narrative, the role and responsibility of the SCO media and analytical centers is acquiring strategic significance, going beyond information support and moving into the plane of intellectual construction of the future,” noted K. Aziz.

    According to him, the media and analytical centers within the SCO perform a dual function: a relay function, ensuring that the “Shanghai Spirit” is conveyed to national and international audiences and forming a holistic image of the SCO as a responsible participant in the global dialogue; and a conceptual and design function, developing new meanings, forming strategic guidelines and providing intellectual support for integration processes.

    “Their responsibility is institutional in nature: not just to support political messages, but to fill them with arguments based on historical and civilizational codes, regional characteristics and universal principles – justice, sovereignty, balance of interests, collective security,” he said, adding that in the era of fragmentation of the information space, their task is not so much to broadcast as to build trust, protect the semantic field of the SCO from external distortion and promote the establishment of a new format of multilateralism.

    “It is precisely in the connection of media platforms with analytical centers that the intellectual framework of multipolar solidarity can be laid, capable of turning the expert-information track into a fulcrum for the strategic subjectivity of the SCO and into a stabilizing contour of the entire Eurasian architecture,” he emphasized, stating that cooperation between the media and analytical centers of the SCO states has significant potential for transformation into a stable, strategically verified system.

    In the third ten days of July, the city of Zhengzhou in Henan Province /Central China/ will host the SCO Media and Analytical Centers Summit, in which K. Aziz will participate. He believes that the upcoming event should be viewed not only as a platform for exchanging opinions, but also as a potential launch point for a new systemic architecture of cooperation between the media community and analytical centers of the SCO countries.

    “In the context of increasing fragmentation of the global information field, growing competition between narratives and loss of trust in universal platforms, the creation of a common intellectual and media space within the SCO is becoming a strategic task,” he said.

    The expert clarified that this is not about another discussion, but about building a sustainable ecosystem of expert-informational interaction, where analytics and media work in sync, disseminating objective information and promoting regional solutions in the international arena.

    “This is especially relevant against the backdrop of attempts by external pressure on the domestic agenda of the member countries and the distortion of the SCO’s image in the global public discourse,” he emphasized.

    Overall, according to the expert, the Zhengzhou summit could lay the foundations for a new model of institutional interaction aimed at strengthening a single discourse, coordinating strategic narratives, and linking information, educational, and analytical tools.

    “The integration of multilateralism as a philosophy of cooperation is of particular importance: not as an alternative to confrontation, but as a new model of international interaction based on equality, respect for the cultural and civilizational code and recognition of the legitimacy of national choice,” the expert said.

    In this context, the humanitarian track goes beyond the secondary. It becomes a point of strategic convergence of civilizations, a mechanism for restoring interstate trust and a channel for the formation of long-term sustainable ties, the expert noted.

    “It is in these areas – convergence, trust, multilateralism and humanitarian connectivity – that the institutional base of the SCO is being formed,” he said. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: Inner Mongolia Autonomous Region Government Sets Up Investigation Team to Probe Mining and Processing Plant Incident

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    HOHHOT, July 25 (Xinhua) — The people’s government of north China’s Inner Mongolia Autonomous Region has set up an investigation team to look into the cause of an incident in which six university students drowned after falling into a flotation tank during a field trip to a local copper-molybdenum processing plant.

    The Inner Mongolia Autonomous Region authorities have increased the level of investigation to quickly clarify the causes, determine the nature of the incident, and develop measures to correct the situation. At present, the investigation team has arrived at the scene of the tragedy and has begun work.

    According to the Hulunbuir City Emergency Management Department, the incident occurred at about 10:20 a.m. Wednesday at a plant operated by mining company China National Gold Group Co., Ltd. in Hulunbuir City. The students, all of whom were studying at Northeastern University, were observing the flotation process when a grate plate collapsed, trapping them in the flotation cell.

    All six were pulled out of the cell, but doctors later declared them dead. A teacher was also injured in the incident. -0-

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: Cambodia, Thailand trade accusations of escalation, Hun Manet calls for urgent UN Security Council meeting

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    PHNOM PENH/BANGKOK, July 25 (Xinhua) — Cambodia and Thailand on Thursday accused each other of escalating tensions in border areas, and Cambodian Prime Minister Hun Manet called on the United Nations Security Council to urgently convene a meeting to discuss the issue.

    In a letter to Pakistan’s permanent representative to the UN, Asim Iftikhar Ahmad, whose country holds the presidency of the Security Council in July, the prime minister said that Thai armed forces had been attacking Cambodian positions since Thursday morning. These attacks violated the fundamental principles of international law, he stressed.

    Cambodia calls on Thailand to immediately cease all hostilities, withdraw troops crossing the border and refrain from any further provocations that could escalate the situation, Hun Manet said.

    The Thai government, in turn, called on Cambodia to take responsibility for these incidents, put an end to attacks on civilian and military targets and stop all actions that violate Thailand’s sovereignty, the country’s Foreign Ministry said in a statement.

    In case of refusal, Bangkok is ready to strengthen self-defense measures in accordance with international law and relevant principles, the department emphasized.

    The Thai embassy in Cambodia has urged its citizens to leave the neighboring country. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: Chinese-Belarusian relations have entered a high-speed development trajectory and reached a historically high level – Chinese Ambassador to Belarus

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    MINSK, July 25 /Xinhua/ — Chinese-Belarusian relations have entered a high-speed development trajectory and reached the highest level in history, Chinese Ambassador to Belarus Zhang Wenchuan said at a press conference here on Thursday.

    “Under the strategic leadership of Chinese President Xi Jinping and Belarusian President Alexander Lukashenko, Chinese-Belarusian relations have entered a high-speed development trajectory, reaching a historically high level and becoming a model of mutual respect, trust and mutually beneficial cooperation between states,” the diplomat noted.

    He also stressed that mutually beneficial cooperation between the two countries is progressing in every way. “In the first half of 2025, the volume of bilateral trade exceeded 4 billion US dollars, which is 3.8 percent more than in the same period last year,” Zhang Wenchuan said.

    In addition, the ambassador noted that cooperation between the two countries within the framework of the Belt and Road initiative is progressing at an accelerated pace.

    “The Great Stone China-Belarus Industrial Park has already registered 152 residents from 15 countries with a total declared investment of over $1.5 billion, and has created over 3,100 jobs. In May, the China-Europe freight train was officially launched on the Beijing-Minsk route. In June, the National Football Stadium, built with China’s support, was officially opened in Belarus,” Zhang Wenchuan said. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI China: SCO scholars expect better connectivity for regional development

    Source: People’s Republic of China – State Council News

    Participants of the Shanghai Cooperation Organization (SCO) Media and Think Tank Summit pose for photos outside the venue in Zhengzhou, central China’s Henan Province, July 24, 2025. Themed “Upholding the ‘Shanghai Spirit’ to Build a More Beautiful Home,” the SCO Media and Think Tank Summit is held here from July 23 to 27. (Xinhua/Wu Jingdan)

    Scholars from the Shanghai Cooperation Organization (SCO) countries are upbeat that greater connectivity will enhance cooperation and joint development, as they gathered in central China’s Henan Province to discuss the SCO’s role and sustainable development in a changing world.

    The ongoing SCO Media and Think Tank Summit is taking place in Zhengzhou, the capital of Henan, from Wednesday to Sunday. Co-hosted by Xinhua News Agency, the Chinese Academy of Social Sciences (CASS), and the Henan provincial government, the event has attracted more than 400 representatives from media outlets, think tanks and governments of 26 SCO countries, as well as international and regional organizations.

    Since its establishment in 2001 with a focus on security cooperation, the SCO has expanded from six member states to 10 member states with two observer states and 14 dialogue partners. The participating scholars believe that the SCO can support closer economic and people-to-people ties, creating a new pattern of regional cooperation.

    “The SCO possesses the practical conditions to become a new type of geo-economic entity,” said Sun Zhuangzhi, head of the Institute of Russian, Eastern European and Central Asian Studies under the CASS, at a think tank forum held at the summit on Thursday.

    Sun highlighted that with the accession of Iran and Belarus as member states, the SCO has the potential to develop multiple overland corridors, which can support regional economic prosperity.

    As a key Eurasia hub, the SCO can establish an open and efficient transportation system, significantly contributing to economic development and connectivity across the continent, he added.

    Cholpon Koichumanova, a senior scholar at Kyrgyz State University named after I. Arabaev, remarked that the SCO has gained increased influence and respect over the past few years, demonstrating its relevance in global processes.

    “In the context of global transformations and shifting values, economic cooperation between Central Asia and China is especially important,” she said, noting that the China-Kyrgyzstan-Uzbekistan Railway will play a critical role not just for the countries involved but also for infrastructure development and mutual ties enhancement across Central Asia.

    Economic connectivity has evidently grown within the SCO since its establishment. China’s customs data show that from 2001 to 2020, the share of global trade of SCO member states rose from 5.4 percent to 17.5 percent. In 2024, trade between China and other SCO member states, observers and dialogue partners reached a record 890 billion U.S. dollars.

    Zhang Ting, a senior researcher at the Chinese Academy of International Trade and Economic Cooperation with China’s Ministry of Commerce, said that while the potential for economic cooperation among SCO members continues to be unleashed, there remains a shortage in connectivity regarding infrastructure and digital trade.

    “Such factors have limited deeper regional economic integration and development,” she said.

    She thus suggested strengthening policy research collaboration to build an institutional framework for coordinated regional development based on the sustainable development strategies of member states, and deepening research in key areas such as the digital economy, green development, and industrial chain cooperation.

    Hassan Daud Butt, a senior associate professor at Bahria University in Pakistan, highlighted the importance of regional connectivity and integration in transforming underperforming regions into centers of opportunity.

    Butt regards the SCO as a critical framework for inclusive globalization, where “development is attuned to regional realities while connected to global opportunities,” in a world striving to balance resilience with openness.

    Therefore, he anticipates that the SCO framework will not only promote trade and logistics but, more importantly, empower and connect people, with a focus on quality, sustainability, digital and green connectivity.

    Kin Phea, director general of the International Relations Institute of Cambodia, Royal Academy of Cambodia, recommended leveraging digital technologies to encourage shared knowledge and real-time cooperation. This includes the establishment of a shared digital platform for media and research institutions.

    He also advised inclusive dialogue mechanisms that facilitate the exchange and cooperation among municipal authorities, think tanks, and academic institutions of the SCO countries in specific sectors such as urban innovation and public health.

    According to Sun Zhuangzhi, as the SCO has entered a “relatively mature stage of development,” it should shift from emphasizing the construction of consultation mechanisms to focusing more on action-oriented mechanisms, with measures to build a community with a shared future within the SCO framework.

    Building a community with a shared future under the SCO is a shared aspiration of countries in the region, and also a long-term task, Sun said.

    “Based on broad consensus, member states need to deepen practical cooperation across political, security, economic and cultural fields to gradually turn this vision into reality,” he said. 

    MIL OSI China News

  • MIL-OSI China: Inter-civilizational dialogue among SCO countries highlights mutual trust

    Source: People’s Republic of China – State Council News

    TIANJIN, July 24 — The Inter-Civilizational Dialogue among Shanghai Cooperation Organization (SCO) Countries 2025 has been held in north China’s Tianjin Municipality, highlighting enhanced mutual understanding and trust.

    Centered on the theme “Promoting the Global Civilization Initiative and Building a Beautiful Common Home of the SCO,” the event on Wednesday drew over 300 delegates from government departments, think tanks, and cultural, artistic, and educational sectors across 10 SCO countries.

    Sohail Khan, deputy secretary-general of the SCO, said that people-to-people exchanges and civil diplomacy are important topics explicitly included in the organization’s founding documents, noting that this dialogue embodies the SCO’s commitment to providing Eurasian nations with a platform for mutual learning and respect.

    Zainidin Kurmanov, vice-rector of the Diplomatic Academy of the Ministry of Foreign Affairs of Kyrgyzstan, said that against a backdrop of global turbulence, the Global Civilization Initiative’s principles — respecting civilizational diversity, championing shared human values, preserving cultural heritage, and strengthening international exchanges — align closely with the “Shanghai Spirit,” and offer wisdom for addressing contemporary challenges through civilizational dialogue and are integral to building a community with a shared future for humanity.

    Dmitry Novikov, first deputy chairman of the Russian State Duma Committee on International Affairs and deputy chairman of the Central Committee of the Communist Party of the Russian Federation, expects to further practice new-model civilizational dialogue, promoting mutual learning, inspiration, and respect.

    “As the SCO family continues to grow, we need to expand exchange platforms for media, think tanks, cultural circles, and youth communities. This will fully mobilize the enthusiasm and initiative of all sectors in contributing to SCO friendship initiatives, ensuring our bond endures across generations,” said Du Zhanyuan, president of China International Communications Group.

    Parallel sessions focused on sustainable development, cultural heritage, and exchanges of diverse visual arts. The event also released a report titled “Building a Community with a Shared Digital Future: China’s Initiative and the Future of SCO,” and an initiative named “SCO Youth in Action: Tianjin Initiative for Upholding the Diversity of Civilizations.”

    MIL OSI China News

  • MIL-OSI Russia: Belarus estimates volume of recoverable hydrocarbon reserves at 46 million tons

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    MINSK, July 24 /Xinhua/ — Belarus has 46 million tons of recoverable hydrocarbon reserves, of which 56 percent are hard to recover, Deputy Director General for Geology of the Belarusian state company Belorusneft Pyotr Povzhik said on Thursday. The relevant information was published by the online publication sb.by.

    “The volume of hydrocarbon production in our region will only grow every year. In this regard, our task is to increase competencies, knowledge and technological breakthroughs, to acquire and implement the best world practices so that we can continue to improve the quality of development and increase the volume of extraction of hard-to-recover reserves,” noted P. Povzhik.

    In Belarus, in the first half of this year, the increase in the volume of oil produced compared to the 2024 level amounted to more than 4.5 percent. The task for 2025 is to exceed the oil production level of 2 million tons, which Belorusneft reached more than 30 years ago. By 2030, annual oil production is projected to increase to 2.3 million tons.

    The production association “Belorusneft” was established in 1966. The enterprise conducts exploration, prospecting and development of oil fields, drilling wells, producing oil and associated petroleum gas in Belarus, and operates in the oil sector of other countries. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News