Category: Russian Federation

  • MIL-OSI Russia: 2 dead, over 7,200 evacuated as heavy rains hit southwest China

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    KUNMING, July 10 (Xinhua) — Two of the five people who went missing after heavy rain hit Zhaotong City in southwest China’s Yunnan Province as of 6:40 p.m. Thursday have been confirmed dead, local authorities said.

    Active search and rescue operations are underway for the three remaining missing persons.

    Since 07:00 on July 8, continuous heavy rain has covered most of Zhaotong City, seriously affecting several counties including Zhenxiong, Weixin and Yongshan.

    Two houses collapsed as a result of the disaster in Luobu Township, Weixin County.

    Zhaotong authorities have mobilized all forces to organize emergency rescue operations. As of 7 p.m. Thursday, local authorities have already managed to evacuate more than 7,200 residents. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI United Kingdom: 64th Round of the Geneva International Discussions: UK statement to the OSCE

    Source: United Kingdom – Government Statements

    Speech

    64th Round of the Geneva International Discussions: UK statement to the OSCE

    Ambassador Holland welcomes the discussions held during the 64th round, and commends the Co-Chairs for their continued efforts to facilitate dialogue among all participants.

    The United Kingdom reaffirms its strong support for the Geneva International Discussions (GID) as a vital platform for addressing the consequences of the 2008 conflict in Georgia and promoting long-term peace and stability in the region. We commend the Co-Chairs for their continued efforts to facilitate dialogue among all participants.

    The UK reaffirms its full support for Georgia’s sovereignty and territorial integrity within its internationally recognised borders. We continue to call on the Russian Federation to reverse its recognition of the so-called independence of Georgia’s Abkhazia and South Ossetia regions.

    We welcome the discussions held during the 64th round, particularly the focus on security arrangements, non-use of force and humanitarian issues – including freedom of movement, documentation, and the rights of displaced persons. We regret that the agenda item on internally displaced persons and refugees could not be addressed due to a walkout by some participants, and we urge all parties to engage constructively in future rounds.

    The UK remains deeply concerned by the ongoing restrictions on freedom of movement and the human rights situation in the Georgian regions of Abkhazia and South Ossetia. We again call for full access for international humanitarian and human rights mechanisms.

    We look forward to the next round of discussions in November 2025 and encourage all parties to engage in good faith to achieve tangible progress for the benefit of all conflict-affected communities.

    Thank you, Madam Chair.

    Updates to this page

    Published 10 July 2025

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: 30th anniversary of the Srebrenica Genocide: UK statement to the OSCE, July 2025

    Source: United Kingdom – Government Statements

    Speech

    30th anniversary of the Srebrenica Genocide: UK statement to the OSCE, July 2025

    Ambassador Holland honours the memory of those killed in the Srebrenica genocide, and underlines the UK’s support to Bosnia and Herzegovina in its ongoing efforts to build a stable, inclusive country for all its citizens.

    Madam Chair, 30 years ago in Srebrenica, genocide took place in Europe for the first time since 1945. Over 8,000 innocent men and boys were brutally killed in a single month that summer, and more than 20,000 women and children were forcibly uprooted from their homes. We honour the memory of those killed, pay tribute to the survivors, and stand firm alongside them in their pursuit of justice and reconciliation.

    On 16 June, the UK marked our National Srebrenica Memorial Day at a ceremony in St Paul’s Cathedral, attended by the Deputy Prime Minister. Her Royal Highness the Duchess of Edinburgh will visit Bosnia and Herzegovina this week for the official Commemoration at the Srebrenica Memorial Centre.

    The International Criminal Tribunal for the former Yugoslavia found that several individuals were guilty of genocide in Srebrenica. Acknowledgement of that fact should in no way be seen as an attempt to blame an entire country or people for the suffering of another, and it should not be a cause for tension and division. Rather, it is a basis on which true reconciliation can be achieved.

    The UK stands with Bosnia and Herzegovina in its ongoing efforts to build a stable, inclusive country for all its citizens, regardless of religion or ethnicity, and to heal the divisions inflicted by war. It is deeply troubling that divisive and inciteful rhetoric, reckless secessionist ambitions, and direct attacks on the Dayton Peace Agreement – which remains Bosnia and Herzegovina’s constitutional framework – continue to threaten peace and stability.

    Madam Chair, this will be the fourth successive year that we mark this anniversary in the shadow of Russia’s war of aggression against Ukraine. Terrible events such as the genocide at Srebrenica show the consequences of inaction. We owe it to the victims to create societies that are stable, inclusive and cohesive, and to fight against prejudice, hatred, fear and division. Remaining true to our shared commitment to the concept of comprehensive security, articulated by the Helsinki principles and central to membership of the OSCE, remains the best way to achieve this.

    Only through such collective responsibility can we honour the past, respect the survivors’ enduring efforts, and work to ensure that atrocities such as the Srebrenica genocide are never repeated.

    Thank you, Madam Chair.

    Updates to this page

    Published 10 July 2025

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Report of the External Auditor, Audit Committee and Financial Report: UK statement to the OSCE, July 2025

    Source: United Kingdom – Government Statements

    Speech

    Report of the External Auditor, Audit Committee and Financial Report: UK statement to the OSCE, July 2025

    Ambassador Holland thanks Austria’s Court of Audit for their professional work as External Auditor, and urges other participating States to engage constructively towards agreeing an OSCE Unified Budget.

    The United Kingdom thanks the Secretary General, and representatives of the Austrian Court of Audit and the Audit Committee for their presentations today and their comprehensive reports.

    The External Auditor and Audit Committee reports provide an important overview of the OSCE’s financial health, and oversight of the organisation’s administration and internal controls. We recognise that the audit assessments have been made in the context of significant ongoing challenges – including the impact of Russia’s aggression against Ukraine, and the continued non-agreement of the OSCE Unified Budget.

    The UK welcomes the unqualified opinion of the External Auditor that the OSCE’s financial statements for 2024 presented fairly the financial position of the organisation. We appreciate the Austrian Court of Audit’s professional work in this role, and warmly welcome your earlier agreement to extend for a further two audit cycles until July 2026.

    Mr Chair, it is vital for the work of all OSCE structures that participating States agree a Unified Budget for 2025 and beyond. As the Reports and presentations this morning clearly illustrate, the continued non-agreement of the Unified Budget – and the lack of an updated Post Table – continue to severely constrain all parts of the organisation in delivering their mandates. We again urge all participating States to engage constructively with budget proposals and ensure the organisation is able to carry out its work effectively in line with the OSCE principles we have all signed up to.

    We welcome the assessments in the Reports that the OSCE’s overall financial liquidity remains sound. We commend the OSCE executive structures for their ongoing work to adapt to the financial challenges facing the organisation, and for helping to maintain continuity of business. We also appreciate the tireless efforts of successive Chairs-in-Office – Malta and Finland – in advancing budget proposals and agreeing additional expenditure authorisations.

    I again thank the Austrian Court of Audit and the Audit Committee for the comprehensive reports. As always, the UK looks forward to engaging constructively on the report recommendations.

    Thank you, Mr Chair.

    Updates to this page

    Published 10 July 2025

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Russia’s shameful record-breaking attacks on Ukrainian civilians and use of chemical weapons on the front line in Ukraine are a disgrace: UK statement to the OSCE

    Source: United Kingdom – Government Statements

    Speech

    Russia’s shameful record-breaking attacks on Ukrainian civilians and use of chemical weapons on the front line in Ukraine are a disgrace: UK statement to the OSCE

    Ambassador Holland condemns Russia’s latest aerial bombardment of Ukrainian cities, which have killed civilians and damaged civilian infrastructure, and highlights the UK’s recent sanctions package in response to Russia’s use of chemical weapons in Ukraine.

    Thank you, Mr Chair. Last week in this Council we said that Russia had launched its biggest aerial attacks of the war so far. One day later, it was already out of date.  Last Friday, on 4 July, Russia broke its record again, launching overnight 539 drones and 11 missiles at Ukraine. Apartments, businesses, a school, a medical facility and other civilian infrastructure were damaged. A thick smoke cloud hung over central Kyiv, prompting health warnings. And, overnight on Tuesday, 8 July, Russia exceeded that again, launching 728 drones and 13 missiles at Lutsk and other Ukrainian cities. This was the largest such attack in the war to date. Russia shows no sign of letting up these aerial assaults. The barrage and destruction continue.

    So far in 2025, Russia has launched over 20,000 drones at Ukraine. That’s around 3,500 per month. This is more than 3.5x the average in 2024. Russia has launched the nine largest daily air attacks of the war in the past six weeks.

    Mr Chair, the UN Office of the High Commissioner for Human Rights recently published its periodic report on the human rights situation in Ukraine. It stated: “Our findings strongly suggest a failure to distinguish between civilian and military targets, and to take all feasible precautions to verify the military nature of those targets – or worse, an intentional decision not to.”

    These aerial attacks are not the actions of a government that is serious about peace.  President Putin has demonstrated that amply in recent days by repeating his maximalist objectives for the war. Following his call with the Kremlin on 3 July, President Trump told reporters that he was ‘very disappointed with the conversation’ because Putin was ‘not looking to stop’. 

    Mr Chair, the statement published last week by the Dutch and German intelligence services indicating Russian use of chemical weapons on the front line is deeply concerning. The OPCW has now published three reports confirming the presence of CS gas in samples collected by Ukraine from the battlefield. We will not ignore such disregard of the Chemical Weapons Convention. That is why the UK announced a second package of sanctions this week against two senior Russian military officials and a Russian research institute for their involvement in Russia’s chemical weapons violations.

    Mr Chair, we must also redouble our efforts to support Ukraine to get through this, and to rebuild after the war is over. The Ukraine Recovery Conference being held in Rome this week is a pivotal moment for the international community to demonstrate its commitment. In total, the UK has committed £5.3 billion in non-military support to Ukraine. The World Bank has estimated that Ukraine’s recovery and reconstruction needs will cost USD $524bn over the next decade. Early recovery and reconstruction are vital to get through the war and secure a just and lasting peace. It is essential for all countries to step up their support, ensuring a unified and effective response to Ukraine’s recovery needs. Thank you.

    Updates to this page

    Published 10 July 2025

    MIL OSI United Kingdom

  • MIL-OSI Russia: GUU expands cooperation with Delovaya Rossiya

    Translation. Region: Russian Federal

    Source: Official website of the State –

    An important disclaimer is at the bottom of this article.

    Rector of the State University of Management Vladimir Stroyev and Vice-Rector Dmitry Bryukhanov held a working meeting with the Deputy Chairman, Head of the Executive Committee of the All-Russian Public Organization “Business Russia” Nonna Kagramanyan.

    The meeting discussed a wide range of issues of cooperation between the State University of Management and Delovaya Rossiya, including holding events aimed at developing entrepreneurial competencies among students and students of additional education programs, developing joint educational and expert activities, and developing a business education system.

    One of the key areas is cooperation within the framework of the implementation of MBA programs – creation of joint programs, their examination for compliance with market trends, involvement of experts from Delovaya Rossiya, and consulting of program students.

    The Basic Department of “Business Russia” operates on the basis of the Higher School of Business and Technology of the State University of Management, which coordinates joint projects and provides scientific and methodological support in the field of entrepreneurship and business development management.

    “Delovaya Rossiya”, founded in 2001, unites more than 10 thousand businessmen of our country. The total number of employees at the enterprises of “Delovaya Rossiya” is more than 4.5 million people, and the total annual revenue of the enterprises exceeds 10 trillion rubles. More than 700 members of the organization are included in public councils of government bodies, working groups of state councils and national projects.

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: HSE took part in the BRICS summit

    Translation. Region: Russian Federal

    Source: State University “Higher School of Economics” –

    An important disclaimer is at the bottom of this article.

    The site may not display correctly in older browser versions. For optimal site experience, we recommend using a modern browser.

    We use cookies to improve the HSE website and make it more convenient to use. More detailed information about the use of cookies can be foundHere, our rules for processing personal data are –Here. By continuing to use the site, you confirm that you have been informed of the use of cookies by the HSE website and agree with our rules for processing personal data. You can disable cookies in your browser settings.

    ABC ABC ABC A A A A A

    Regular version of the site

    Date

    July 10

    Headings

    The article mentions

    Persons

    You may also be interested in:

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: China to increase basic pension payments

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    BEIJING, July 10 (Xinhua) — Chinese authorities on Thursday announced that basic pension payments for retirees will be increased in 2025.

    The average monthly old-age pension benefit will be increased by 2 percent from the 2024 level starting from Jan. 1, 2025, for those who retired before the end of 2024, according to a notice jointly released by the Ministry of Human Resources and Social Security and the Ministry of Finance. -0-

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: China takes steps to combat smuggling of strategic minerals

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    BEIJING, July 10 (Xinhua) — China has taken measures to crack down on smuggling of strategic minerals while continuing to process legitimate applications for their export for civilian use, Ministry of Commerce spokeswoman He Yongqian said Thursday.

    Responding to a question about strategic minerals reportedly transiting to the United States, He Yongqian said at a press conference that strategic minerals such as antimony and gallium have obvious dual-use properties, and export controls on them are in line with internationally accepted practices.

    In order to resolutely prevent the illegal export of such minerals, China launched a special operation to combat their smuggling in May this year, He Yongqian said, adding that relevant information is available on the ministry’s website.

    She stressed that China, as a responsible major country, fully takes into account the reasonable civilian needs of various countries for these strategic minerals.

    China reviews applications for export licenses in accordance with laws and regulations and approves those that meet the requirements, she said. -0-

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: Lu Ban’s Workshop Becomes a Bridge for Humanitarian Exchanges between SCO Countries

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    TIANJIN, July 10 (Xinhua) — Igor Khodachek, director of the Eurasian Studies Center of the European University at St. Petersburg, entered his name on a computer while visiting the Tianjin Vocational Institute of Light Industry and a laser marking machine engraved his name on the surface of a metal plate.

    “This is a wonderful souvenir of this trip,” said I. Khodachek, who participated in the “Dialogue of World Mayors – SCO Summit Cities,” which was held from July 6 to 9 in Tianjin, northern China. During the event, guests at the aforementioned institute visited an exhibition hall dedicated to Lu Ban’s Workshop and a base integrating production and training in the field of high-precision instrument manufacturing and intelligent manufacturing.

    Lu Ban Workshop, named after the famous ancient Chinese craftsman Lu Ban, is a brand of international vocational education initiated and promoted by Tianjin City Government.

    To date, China has built 34 Lu Ban Workshops in 30 countries and regions around the world. 10 of them were established in Kazakhstan, Tajikistan, Uzbekistan, Russia, Pakistan, Cambodia, Egypt and other SCO countries.

    With the construction of a practical training center and the provision of modern teaching equipment in Lu Ban Workshop, Chinese teachers and technical personnel are also sent to learn technical skills from local teachers who may be invited to China for experience exchange.

    Since 2022, Wu Zhengpeng, a teacher from Tianjin Vocational and Technical Institute of Urban Administration and Construction, has been teaching at Lu Ban Workshop in Tajikistan using China’s advanced equipment and 3D teaching resources.

    “We had a comprehensive discussion with the teachers of the Tajik side and jointly formulated the curriculum, discussed the methodology and agreed to invite them to Tianjin for exchanges,” Wu Zhengpeng shared. In July last year, representatives of the teachers and students of the Tajik Technical University named after Academician M.S. Osimi visited Tianjin as planned.

    Lu Ban’s workshop provides an opportunity for more and more young people from SCO countries to study abroad.

    Ibrahim Maher, a 21-year-old student from Egypt, is currently studying at Tianjin Light Industry Vocational and Technical Institute under the Lu Ban Workshop project, majoring in Computer Numerical Control (CNC) technology.

    “Lu Ban Workshop has many advanced teaching equipment and data centers from China, which enables students to transform theoretical knowledge into practical skills and adapt to the working environment more quickly. We are also provided with many opportunities to visit companies, participate in internships, and experience a large number of projects in practice,” he said.

    At the end of the tour, Director of the Institute of World Politics of Kyrgyzstan Sheradil Baktygulov said that Lu Ban’s Workshop provides assistance to Kyrgyzstan in developing such areas as robotics, autonomous driving and computer technology.

    At present, Lu Ban’s Workshop is an important platform for international exchanges and cooperation in the field of professional education, and also serves as a bridge to promote humanities exchanges and the rapprochement of peoples. -0-

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: Wang Yi talks about the achievements of mutually beneficial cooperation between China and ASEAN

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    KUALA LUMPUR, July 10 (Xinhua) — Chinese Foreign Minister Wang Yi, a member of the Politburo of the Communist Party of China Central Committee and a member of the Political Bureau of the Communist Party of China (CPC) Central Committee, spoke about the fruitful achievements of bilateral cooperation while delivering a speech at the China-ASEAN foreign ministers’ meeting here on Thursday.

    First, the community of shared future between neighboring countries has become stronger. In April 2025, Chinese President Xi Jinping made successful visits to Vietnam, Malaysia and Cambodia, which brought the construction of bilateral communities of shared future to a higher level and promoted mutually beneficial cooperation in the direction of improving quality.

    Secondly, steps towards regional openness and cooperation have become more decisive. The negotiations on the China-ASEAN Free Trade Area 3.0 have been fully completed, and the protocol is expected to be signed within a year. The ASEAN-China-GCC (Gulf Cooperation Council) summit has launched a new model of interregional cooperation.

    Third, security cooperation has deepened. The two sides completed the third reading of the draft text of the Code of Conduct in the South China Sea, effectively resolving differences and maintaining overall maritime stability. China has also joined hands with Myanmar, Laos, Thailand and other countries to combat transnational crimes such as online gambling and cyber fraud.

    Fourth, mutual travel has become easier. Over the past two years, the two sides have held more than 100 cultural and humanitarian events. The issuance of “Lancang-Mekong visa” and “ASEAN visa” has officially begun, making mutual travel as convenient and frequent as family reunions.

    Wang Yi noted that China always regards ASEAN as a priority area of its diplomatic relations with its neighbors. Beijing views this region as a pioneering platform for the creation of a community with a common future for mankind, the minister added.

    According to him, China will continue to adhere to the principles of good-neighborliness, stable and prosperous neighborhood, benevolence, sincerity, mutual benefit, inclusiveness and common destiny. China is willing to work with ASEAN to promote Asia’s values of peace, cooperation, openness and inclusiveness, and build a common home of peace, security, prosperity, beauty and friendship, Wang said. He also said that China and ASEAN will actively promote the building of an even closer community with a shared future, accelerating the rise of Asia amid the rapid strengthening of the Global South. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: China is a reliable partner for ASEAN in addressing complex challenges: Wang Yi

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    KUALA LUMPUR, July 10 (Xinhua) — China has always been the most reliable stabilizing force in a turbulent world and the most reliable partner for members of the Association of Southeast Asian Nations (ASEAN) in tackling difficult challenges, Chinese Foreign Minister Wang Yi, a member of the Politburo of the Communist Party of China (CPC) Central Committee, said at a China-ASEAN foreign ministers’ meeting here on Thursday.

    Noting that China and ASEAN have similar development concepts, common requirements and integrated interests, he added that Beijing regards ASEAN as a priority area for diplomatic relations with its neighbors and a pioneering platform for promoting the building of a community with a shared future for mankind.

    “We should support each other and achieve success for each other in advancing the modernization process of Asia,” Wang said.

    The minister spoke about the achievements of China-ASEAN cooperation and put forward four proposals.

    First, it must become a benchmark for upholding international justice. Wang said China and ASEAN must resolutely uphold the global system with the UN at its core and the international order based on international law.

    China supports ASEAN’s central position in the regional architecture and its greater role in regional and international affairs. China is willing to work with ASEAN to practice open regionalism and genuine multilateralism and make greater contributions to regional and global governance.

    Secondly, it should be a model for maintaining peace and stability in the region. Peace and stability in the region are extremely valuable and must be reliably protected, and geopolitical conflicts or bloc confrontations should not spread to Asia, Wang Yi said. China is ready to take a leading role in signing the Protocol to the Treaty on a Nuclear-Weapon-Free Zone in Southeast Asia, he added.

    The South China Sea is a common home for regional countries, not a “gladiator arena” for major powers, and China is willing to expand cooperation with ASEAN countries in areas such as marine environmental protection, shipping safety, maritime law enforcement and key maritime infrastructure, fully implement the Declaration on the Conduct of Parties in the South China Sea, facilitate consultations on the Code of Conduct in the South China Sea and always hold the initiative in the South China Sea issue, the Foreign Minister stressed.

    Third, it is necessary to set an example of mutually beneficial cooperation. According to Wang Yi, Beijing is ready to cooperate with ASEAN in building the China-ASEAN Free Trade Area 3.0, effectively implement the Regional Comprehensive Economic Partnership (RCEP), and build a high-level free trade network.

    China is willing to continue to use high-quality cooperation under the Belt and Road Initiative as a core platform, strengthen communication and cooperation with ASEAN in industrial and supply chains, and advance cooperation in areas such as artificial intelligence, digital transformation and clean energy, the minister said.

    China highly appreciates ASEAN’s firm commitment to free trade and the multilateral trading system, and holds that economic and trade differences should be resolved through equal dialogue and mutual benefit, while upholding its own dignity and fundamental principles and not encroaching on the interests of third parties, Wang said.

    Fourth, we should set an example in promoting inclusiveness and mutual learning. China is willing to continue to advocate dialogue, exchanges and mutual learning among different civilizations with ASEAN countries, the foreign minister said. The two sides should jointly hold a successful Year of People-to-People Exchanges, intensify exchanges in the fields of education, youth, think tanks, media and other areas, take concrete measures to implement the Global Civilization Initiative and promote mutual understanding, friendship and integration among peoples.

    The participating countries noted that China-ASEAN cooperation is the most dynamic and fruitful. China has always been one of ASEAN’s most important dialogue partners, they said, expressing gratitude to China for supporting the association’s central position. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: Xizang’s first scheduled cargo flight opens

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    LHASA, July 10 (Xinhua) — China’s SF Airlines on Thursday launched a cargo flight linking Lhasa in China’s Xizang Autonomous Region and Ezhou in Hubei Province.

    The Boeing 757-200 of the company left Lhasa Konggar International Airport at 12:10 p.m., carrying agricultural products including tomatoes, chicken eggs, rapeseed oil and barley to Ezhou, becoming the first scheduled flight in Xijiang dedicated exclusively to cargo.

    According to the plan, round trip flights on this air route will be carried out once a week. The aircraft is capable of delivering more than 30 tons of cargo on the Lhasa-Ezhou route.

    The opening of the flight on the new route will make it more convenient to deliver products from Xizang not only to other regions of the country, but also beyond its borders, said Liu Shuxin, an employee of the Xizang branch of SF Airlines.

    Given Xijiang’s strategic location as the “gateway to South Asia,” the launch of the Lhasa-Ezhou route will help other regions in the country expand their supply of products to the South Asian market, he added.

    According to official data, airports in the Xizang Autonomous Region served 3.7 million passengers in the first half of this year. At the same time, the cargo turnover and the volume of parcels through them amounted to 26 thousand tons. These figures increased by 3.0 percent and 7.9 percent, respectively, year-on-year. -0-

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI: AleAnna, Inc. Announces Strong Early Production and Revenue Results at Longanesi Field

    Source: GlobeNewswire (MIL-OSI)

    • AleAnna and its partner Societa Padana Energia have recorded more than 6 weeks of continuous production history at the Longanesi Field, with steadily growing daily rates.
    • Results have been above expectations, with a stabilized natural gas production rate of approximately 28 MM cubic feet per day, which was achieved well ahead of the anticipated 3-month timeline for this milestone.
    • Strong natural gas prices in Italy, averaging about $13.50 / Mcf over the last 6 weeks, are providing AleAnna > $100,000 / day in revenues.
    • The European Union’s (EU) stated goal of eliminating Russian natural gas imports by year-end 2027 should create a longer-term demand for domestic natural gas in Italy.

    DALLAS and ROME, July 10, 2025 (GLOBE NEWSWIRE) — AleAnna, Inc. (“AleAnna” or the “Company”) (Nasdaq: ANNA) is pleased to announce strong early performance from the Longanesi Field. All five wells in the Phase 1 development are contributing to current daily production averaging 28 million cubic feet per day, which was AleAnna’s budgeted maximum rate for 2025. While striving to prevent damage to the reservoirs from early over-production, the impressive growth rate in daily production over the first 6 full weeks of production nonetheless signals potential for the Phase 1 development to outperform initial expectations.

    Combined with average Italian natural gas prices over this 6-week period of about $13.50 per thousand cubic feet, current production is generating in excess of $100,000 in revenue per day net to AleAnna’s account. In addition, the Company expects further expansions of reserves and additional increases in daily production, highlighting Longanesi’s importance as a driver of mid-to-longer term growth for AleAnna.

    Advantaged Natural Gas Environment in the EU
    About 20% of the EU’s natural gas supply continues to come from Russia. As part of a broader plan to improve energy security and independence, the EU has stated an overarching goal to completely eliminate Russian natural gas supply by year-end 2027. The need to replace this supply, combined with gas storage levels at 34% of capacity, has created an increased demand for new sources of domestic natural gas and a near-to-mid-term increase in the price of natural gas in the EU.

    AleAnna is committed to strengthening Italy’s long-term energy security while supporting the global transition to cleaner and more sustainable sources of energy. By advancing current and future investments at Longanesi, AleAnna aims to address the gap in natural gas supply left by the loss of Russian natural gas imports.

    Management Commentary
    Marco Brun, Chief Executive Officer of AleAnna, emphasized the importance of the positive early results from Longanesi, stating: “Strong early results from Longanesi are a signal of AleAnna’s growth potential and profitability. With an advantaged environment for natural gas producers in the EU, and the opportunity to further grow our Longanesi production, we are excited about the future of the Company.”

    About AleAnna
    AleAnna is a technology-driven energy company focused on bringing sustainability and new supplies of low-carbon natural gas and RNG to Italy, aligning traditional energy operations with renewable solutions, with developments like the Longanesi field leading the way in supporting a responsible energy transition. With three conventional gas discoveries in Italy already made and fourteen new natural gas exploration projects planned this decade, AleAnna plays a pivotal role in Italy’s energy transition. Italy’s extensive infrastructure, featuring 33,000 kilometers of gas pipelines, three major gas storage facilities, and a strong base of existing RNG facilities, aligns with AleAnna’s commitment to sustainability. AleAnna’s RNG projects’ portfolio includes three plants under development and almost 100 projects representing approximately €1.1 billion potential investment in the next few years. AleAnna operates regional headquarters in Dallas, Texas, and Rome, Italy.

    Forward-Looking Statements
    The information included herein contains “forward-looking statements” within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended. Certain statements, other than statements of present or historical fact included herein regarding AleAnna’s future operations, financial position, plans and objectives are forward-looking statements. When used herein, including any statements made in connection herewith, the words “could,” “should,” “will,” “may,” “believe,” “anticipate,” “intend,” “estimate,” “expect,” “project,” and other similar expressions are forward-looking statements. However, not all forward-looking statements contain such identifying words. Forward-looking statements are neither historical facts nor assurances of future performance. Instead, they are based only on AleAnna’s current beliefs, expectations and assumptions regarding the future of its business, future plans and strategies, the economy and other future conditions. Because forward-looking statements relate to the future, they are subject to inherent uncertainties, risks and changes in circumstances that are difficult to predict and many of which are outside of AleAnna’s control. AleAnna’s actual results and financial condition may differ materially from those indicated in the forward-looking statements. Therefore, you should not rely on any of these forward-looking statements, which speak only as of the date made. Important factors that could cause our actual results and financial condition to differ materially from those indicated in the forward-looking statements include, but are not limited to, those under “Risk Factors” in AleAnna’s definitive proxy statement/prospectus filed by AleAnna with the SEC on November 21, 2024, as well as general economic conditions; AleAnna’s need for additional capital; risks associated with the growth of AleAnna’s business; and changes in the regulatory environment in which AleAnna operates. Additional information concerning these and other factors that may impact AleAnna’s expectations and projections can be found in filings it makes with the SEC, and other documents filed or to be filed with the SEC by AleAnna. SEC filings are available on the SEC’s website at www.sec.gov. Except as otherwise required by applicable law, AleAnna disclaims any duty to update any forward-looking statements, all expressly qualified by the statements in this section, to reflect events or circumstances after the date hereof.

    Investor Relations Contact
    Bill Dirks
    wkdirks@aleannagroup.com

    Website
    https://www.aleannainc.com/

    The MIL Network

  • MIL-OSI Economics: Code highlighting with Cursor AI for $500,000

    Source: Securelist – Kaspersky

    Headline: Code highlighting with Cursor AI for $500,000

    Attacks that leverage malicious open-source packages are becoming a major and growing threat. This type of attacks currently seems commonplace, with reports of infected packages in repositories like PyPI or npm appearing almost daily. It would seem that increased scrutiny from researchers on these repositories should have long ago minimized the profits for cybercriminals trying to make a fortune from malicious packages. However, our investigation into a recent cyberincident once again confirmed that open-source packages remain an attractive way for attackers to make easy money.

    Infected out of nowhere

    In June 2025, a blockchain developer from Russia reached out to us after falling victim to a cyberattack. He’d had around $500,000 in crypto assets stolen from him. Surprisingly, the victim’s operating system had been installed only a few days prior. Nothing but essential and popular apps had been downloaded to the machine. The developer was well aware of the cybersecurity risks associated with crypto transactions, so he was vigilant and carefully reviewed his every step while working online. Additionally, he used free online services for malware detection to protect his system, but no commercial antivirus software.

    The circumstances of the infection piqued our interest, and we decided to investigate the origins of the incident. After obtaining a disk image of the infected system, we began our analysis.

    Syntax highlighting with a catch

    As we examined the files on the disk, a file named extension.js caught our attention. We found it at %userprofile%.cursorextensionssolidityai.solidity-1.0.9-universalsrcextension.js. Below is a snippet of its content:

    A request sent by the extension to the server

    This screenshot clearly shows the code requesting and executing a PowerShell script from the web server angelic[.]su: a sure sign of malware.

    It turned out that extension.js was a component of the Solidity Language extension for the Cursor AI IDE, which is based on Visual Studio Code and designed for AI-assisted development. The extension is available in the Open VSX registry, used by Cursor AI, and was published about two months ago. At the time this research, the extension had been downloaded 54,000 times. The figure was likely inflated. According to the description, the extension offers numerous features to optimize work with Solidity smart contract code, specifically syntax highlighting:

    The extension’s description in the Open VSX registry

    We analyzed the code of every version of this extension and confirmed that it was a fake: neither syntax highlighting nor any of the other claimed features were implemented in any version. The extension has nothing to do with smart contracts. All it does is download and execute malicious code from the aforementioned web server. Furthermore, we discovered that the description of the malicious plugin was copied by the attackers from the page of a legitimate extension, which had 61,000 downloads.

    How the extension got on the computer

    So, we found that the malicious extension had 54,000 downloads, while the legitimate one had 61,000. But how did the attackers manage to lull the developer’s vigilance? Why would he download a malicious extension with fewer downloads than the original?

    We found out that while trying to install a Solidity code syntax highlighter, the developer searched the extension registry for solidity. This query returned the following:

    Search results for “solidity”: the malicious (red) and legitimate (green) extensions

    In the search results, the malicious extension appeared fourth, while the legitimate one was only in eighth place. Thus, while reviewing the search results, the developer clicked the first extension in the list with a significant number of downloads – which unfortunately proved to be the malicious one.

    The ranking algorithm trap

    How did the malicious extension appear higher in search results than the legitimate one, especially considering it had fewer downloads? It turns out the Open VSX registry ranks search results by relevance, which considers multiple factors, such as the extension rating, how recently it was published or updated, the total number of downloads, and whether the extension is verified. Consequently, the ranking is determined by a combination of factors: for example, an extension with a low number of downloads can still appear near the top of search results if that metric is offset by its recency. This is exactly what happened with the malicious plugin: the fake extension’s last update date was June 15, 2025, while the legitimate one was last updated on May 30, 2025. Thus, due to the overall mix of factors, the malicious extension’s relevance surpassed that of the original, which allowed the attackers to promote the fake extension in the search results.

    The developer, who fell into the ranking algorithm trap, didn’t get the functionality he wanted: the extension didn’t do any syntax highlighting in Solidity. The victim mistook this for a bug, which he decided to investigate later, and continued his work. Meanwhile, the extension quietly installed malware on his computer.

    From PowerShell scripts to remote control

    As mentioned above, when the malicious plugin was activated, it downloaded a PowerShell script from https://angelic[.]su/files/1.txt.

    The PowerShell script contents

    The script checks if the ScreenConnect remote management software is installed on the computer. If not, it downloads a second malicious PowerShell script from: https://angelic[.]su/files/2.txt. This new script then downloads the ScreenConnect installer to the infected computer from https://lmfao[.]su/Bin/ScreenConnect.ClientSetup.msi?e=Access&y=Guest and runs it. From that point on, the attackers can control the infected computer via the newly installed software, which is configured to communicate with the C2 server relay.lmfao[.]su.

    Data theft

    Further analysis revealed that the attackers used ScreenConnect to upload three VBScripts to the compromised machine:

    • a.vbs
    • b.vbs
    • m.vbs

    Each of these downloaded a PowerShell script from the text-sharing service paste.ee. The download URL was obfuscated, as shown in the image below:

    The obfuscated URL for downloading the PowerShell script

    The downloaded PowerShell script then retrieved an image from archive[.]org. A loader known as VMDetector was then extracted from this image. VMDetector attacks were previously observed in phishing campaigns that targeted entities in Latin America. The loader downloaded and ran the final payload from paste.ee.

    Our analysis of the VBScripts determined that the following payloads were downloaded to the infected computer:

    • Quasar open-source backdoor (via a.vbs and b.vbs),
    • Stealer that collected data from browsers, email clients, and crypto wallets (via m.vbs). Kaspersky products detect this malware as HEUR:Trojan-PSW.MSIL.PureLogs.gen.

    Both implants communicated with the C2 server 144.172.112[.]84, which resolved to relay.lmfao[.]su at the time of our analysis. With these tools, the attackers successfully obtained passphrases for the developer’s wallets and then syphoned off cryptocurrency.

    New malicious package

    The malicious plugin didn’t last long in the extension store and was taken down on July 2, 2025. By that time, it had already been detected not only by us as we investigated the incident but also by other researchers. However, the attackers continued their campaign: just one day after the removal, they published another malicious package named “solidity”, this time exactly replicating the name of the original legitimate extension. The functionality of the fake remained unchanged: the plugin downloaded a malicious PowerShell script onto the victim’s device. However, the attackers sought to inflate the number of downloads dramatically. The new extension was supposedly downloaded around two million times. The following results appeared up until recently when users searched for solidity within the Cursor AI development environment (the plugin is currently removed thanks to our efforts).

    Updated search results for “solidity”

    The updated search results showed the legitimate and malicious extensions appearing side-by-side in the search rankings, occupying the seventh and eighth positions respectively. The developer names look identical at first glance, but the legitimate package was uploaded by juanblanco, while the malicious one was uploaded by juanbIanco. The font used by Cursor AI makes the lowercase letter l and uppercase I appear identical.

    Therefore, the search results displayed two seemingly identical extensions: the legitimate one with 61,000 downloads and the malicious one with two million downloads. Which one would the user choose to install? Making the right choice becomes a real challenge.

    Similar cyberattacks

    It’s worth noting that the Solidity extensions we uncovered are not the only malicious packages published by the attackers behind this operation. We used our open-source package monitoring tool to find a malicious npm package called “solsafe”. It uses the URL https://staketree[.]net/1.txt to download ScreenConnect. In this campaign, it’s also configured to use relay.lmfao[.]su for communication with the attackers.

    We also discovered that April and May 2025 saw three malicious Visual Studio Code extensions published: solaibot, among-eth, and blankebesxstnion. The infection method used in these threats is strikingly similar to the one we described above. In fact, we found almost identical functionality in their malicious scripts.

    Scripts downloaded by the VS Code extension (left) vs. Solidity Language (right)

    In addition, all of the listed extensions perform the same malicious actions during execution, namely:

    • Download PowerShell scripts named 1.txt and 2.txt.
    • Use a VBScript with an obfuscated URL to download a payload from paste.ee.
    • Download an image with a payload from archive.org.

    This leads us to conclude that these infection schemes are currently being widely used to attack blockchain developers. We believe the attackers won’t stop with the Solidity extensions or the solsafe package that we found.

    Takeaways

    Malicious packages continue to pose a significant threat to the crypto industry. Many projects today rely on open-source tools downloaded from package repositories. Unfortunately, packages from these repositories are often a source of malware infections. Therefore, we recommend extreme caution when downloading any tools. Always verify that the package you’re downloading isn’t a fake. If a package doesn’t work as advertised after you install it, be suspicious and check the downloaded source code.

    In many cases, malware installed via fake open-source packages is well-known, and modern cybersecurity solutions can effectively block it. Even experienced developers must not neglect security solutions, as these can help prevent an attack in case a malicious package is installed.

    Indicators of compromise

    Hashes of malicious JS files
    2c471e265409763024cdc33579c84d88d5aaf9aea1911266b875d3b7604a0eeb
    404dd413f10ccfeea23bfb00b0e403532fa8651bfb456d84b6a16953355a800a
    70309bf3d2aed946bba51fc3eedb2daa3e8044b60151f0b5c1550831fbc6df17
    84d4a4c6d7e55e201b20327ca2068992180d9ec08a6827faa4ff3534b96c3d6f
    eb5b35057dedb235940b2c41da9e3ae0553969f1c89a16e3f66ba6f6005c6fa8
    f4721f32b8d6eb856364327c21ea3c703f1787cfb4c043f87435a8876d903b2c

    Network indicators
    https://angelic[.]su/files/1.txt
    https://angelic[.]su/files/2.txt
    https://staketree[.]net/1.txt
    https://staketree[.]net/2.txt
    https://relay.lmfao[.]su
    https://lmfao[.]su/Bin/ScreenConnect.ClientSetup.msi?e=Access&y=Guest
    144.172.112[.]84

    MIL OSI Economics

  • MIL-OSI Economics: Code highlighting with Cursor AI for $500,000

    Source: Securelist – Kaspersky

    Headline: Code highlighting with Cursor AI for $500,000

    Attacks that leverage malicious open-source packages are becoming a major and growing threat. This type of attacks currently seems commonplace, with reports of infected packages in repositories like PyPI or npm appearing almost daily. It would seem that increased scrutiny from researchers on these repositories should have long ago minimized the profits for cybercriminals trying to make a fortune from malicious packages. However, our investigation into a recent cyberincident once again confirmed that open-source packages remain an attractive way for attackers to make easy money.

    Infected out of nowhere

    In June 2025, a blockchain developer from Russia reached out to us after falling victim to a cyberattack. He’d had around $500,000 in crypto assets stolen from him. Surprisingly, the victim’s operating system had been installed only a few days prior. Nothing but essential and popular apps had been downloaded to the machine. The developer was well aware of the cybersecurity risks associated with crypto transactions, so he was vigilant and carefully reviewed his every step while working online. Additionally, he used free online services for malware detection to protect his system, but no commercial antivirus software.

    The circumstances of the infection piqued our interest, and we decided to investigate the origins of the incident. After obtaining a disk image of the infected system, we began our analysis.

    Syntax highlighting with a catch

    As we examined the files on the disk, a file named extension.js caught our attention. We found it at %userprofile%.cursorextensionssolidityai.solidity-1.0.9-universalsrcextension.js. Below is a snippet of its content:

    A request sent by the extension to the server

    This screenshot clearly shows the code requesting and executing a PowerShell script from the web server angelic[.]su: a sure sign of malware.

    It turned out that extension.js was a component of the Solidity Language extension for the Cursor AI IDE, which is based on Visual Studio Code and designed for AI-assisted development. The extension is available in the Open VSX registry, used by Cursor AI, and was published about two months ago. At the time this research, the extension had been downloaded 54,000 times. The figure was likely inflated. According to the description, the extension offers numerous features to optimize work with Solidity smart contract code, specifically syntax highlighting:

    The extension’s description in the Open VSX registry

    We analyzed the code of every version of this extension and confirmed that it was a fake: neither syntax highlighting nor any of the other claimed features were implemented in any version. The extension has nothing to do with smart contracts. All it does is download and execute malicious code from the aforementioned web server. Furthermore, we discovered that the description of the malicious plugin was copied by the attackers from the page of a legitimate extension, which had 61,000 downloads.

    How the extension got on the computer

    So, we found that the malicious extension had 54,000 downloads, while the legitimate one had 61,000. But how did the attackers manage to lull the developer’s vigilance? Why would he download a malicious extension with fewer downloads than the original?

    We found out that while trying to install a Solidity code syntax highlighter, the developer searched the extension registry for solidity. This query returned the following:

    Search results for “solidity”: the malicious (red) and legitimate (green) extensions

    In the search results, the malicious extension appeared fourth, while the legitimate one was only in eighth place. Thus, while reviewing the search results, the developer clicked the first extension in the list with a significant number of downloads – which unfortunately proved to be the malicious one.

    The ranking algorithm trap

    How did the malicious extension appear higher in search results than the legitimate one, especially considering it had fewer downloads? It turns out the Open VSX registry ranks search results by relevance, which considers multiple factors, such as the extension rating, how recently it was published or updated, the total number of downloads, and whether the extension is verified. Consequently, the ranking is determined by a combination of factors: for example, an extension with a low number of downloads can still appear near the top of search results if that metric is offset by its recency. This is exactly what happened with the malicious plugin: the fake extension’s last update date was June 15, 2025, while the legitimate one was last updated on May 30, 2025. Thus, due to the overall mix of factors, the malicious extension’s relevance surpassed that of the original, which allowed the attackers to promote the fake extension in the search results.

    The developer, who fell into the ranking algorithm trap, didn’t get the functionality he wanted: the extension didn’t do any syntax highlighting in Solidity. The victim mistook this for a bug, which he decided to investigate later, and continued his work. Meanwhile, the extension quietly installed malware on his computer.

    From PowerShell scripts to remote control

    As mentioned above, when the malicious plugin was activated, it downloaded a PowerShell script from https://angelic[.]su/files/1.txt.

    The PowerShell script contents

    The script checks if the ScreenConnect remote management software is installed on the computer. If not, it downloads a second malicious PowerShell script from: https://angelic[.]su/files/2.txt. This new script then downloads the ScreenConnect installer to the infected computer from https://lmfao[.]su/Bin/ScreenConnect.ClientSetup.msi?e=Access&y=Guest and runs it. From that point on, the attackers can control the infected computer via the newly installed software, which is configured to communicate with the C2 server relay.lmfao[.]su.

    Data theft

    Further analysis revealed that the attackers used ScreenConnect to upload three VBScripts to the compromised machine:

    • a.vbs
    • b.vbs
    • m.vbs

    Each of these downloaded a PowerShell script from the text-sharing service paste.ee. The download URL was obfuscated, as shown in the image below:

    The obfuscated URL for downloading the PowerShell script

    The downloaded PowerShell script then retrieved an image from archive[.]org. A loader known as VMDetector was then extracted from this image. VMDetector attacks were previously observed in phishing campaigns that targeted entities in Latin America. The loader downloaded and ran the final payload from paste.ee.

    Our analysis of the VBScripts determined that the following payloads were downloaded to the infected computer:

    • Quasar open-source backdoor (via a.vbs and b.vbs),
    • Stealer that collected data from browsers, email clients, and crypto wallets (via m.vbs). Kaspersky products detect this malware as HEUR:Trojan-PSW.MSIL.PureLogs.gen.

    Both implants communicated with the C2 server 144.172.112[.]84, which resolved to relay.lmfao[.]su at the time of our analysis. With these tools, the attackers successfully obtained passphrases for the developer’s wallets and then syphoned off cryptocurrency.

    New malicious package

    The malicious plugin didn’t last long in the extension store and was taken down on July 2, 2025. By that time, it had already been detected not only by us as we investigated the incident but also by other researchers. However, the attackers continued their campaign: just one day after the removal, they published another malicious package named “solidity”, this time exactly replicating the name of the original legitimate extension. The functionality of the fake remained unchanged: the plugin downloaded a malicious PowerShell script onto the victim’s device. However, the attackers sought to inflate the number of downloads dramatically. The new extension was supposedly downloaded around two million times. The following results appeared up until recently when users searched for solidity within the Cursor AI development environment (the plugin is currently removed thanks to our efforts).

    Updated search results for “solidity”

    The updated search results showed the legitimate and malicious extensions appearing side-by-side in the search rankings, occupying the seventh and eighth positions respectively. The developer names look identical at first glance, but the legitimate package was uploaded by juanblanco, while the malicious one was uploaded by juanbIanco. The font used by Cursor AI makes the lowercase letter l and uppercase I appear identical.

    Therefore, the search results displayed two seemingly identical extensions: the legitimate one with 61,000 downloads and the malicious one with two million downloads. Which one would the user choose to install? Making the right choice becomes a real challenge.

    Similar cyberattacks

    It’s worth noting that the Solidity extensions we uncovered are not the only malicious packages published by the attackers behind this operation. We used our open-source package monitoring tool to find a malicious npm package called “solsafe”. It uses the URL https://staketree[.]net/1.txt to download ScreenConnect. In this campaign, it’s also configured to use relay.lmfao[.]su for communication with the attackers.

    We also discovered that April and May 2025 saw three malicious Visual Studio Code extensions published: solaibot, among-eth, and blankebesxstnion. The infection method used in these threats is strikingly similar to the one we described above. In fact, we found almost identical functionality in their malicious scripts.

    Scripts downloaded by the VS Code extension (left) vs. Solidity Language (right)

    In addition, all of the listed extensions perform the same malicious actions during execution, namely:

    • Download PowerShell scripts named 1.txt and 2.txt.
    • Use a VBScript with an obfuscated URL to download a payload from paste.ee.
    • Download an image with a payload from archive.org.

    This leads us to conclude that these infection schemes are currently being widely used to attack blockchain developers. We believe the attackers won’t stop with the Solidity extensions or the solsafe package that we found.

    Takeaways

    Malicious packages continue to pose a significant threat to the crypto industry. Many projects today rely on open-source tools downloaded from package repositories. Unfortunately, packages from these repositories are often a source of malware infections. Therefore, we recommend extreme caution when downloading any tools. Always verify that the package you’re downloading isn’t a fake. If a package doesn’t work as advertised after you install it, be suspicious and check the downloaded source code.

    In many cases, malware installed via fake open-source packages is well-known, and modern cybersecurity solutions can effectively block it. Even experienced developers must not neglect security solutions, as these can help prevent an attack in case a malicious package is installed.

    Indicators of compromise

    Hashes of malicious JS files
    2c471e265409763024cdc33579c84d88d5aaf9aea1911266b875d3b7604a0eeb
    404dd413f10ccfeea23bfb00b0e403532fa8651bfb456d84b6a16953355a800a
    70309bf3d2aed946bba51fc3eedb2daa3e8044b60151f0b5c1550831fbc6df17
    84d4a4c6d7e55e201b20327ca2068992180d9ec08a6827faa4ff3534b96c3d6f
    eb5b35057dedb235940b2c41da9e3ae0553969f1c89a16e3f66ba6f6005c6fa8
    f4721f32b8d6eb856364327c21ea3c703f1787cfb4c043f87435a8876d903b2c

    Network indicators
    https://angelic[.]su/files/1.txt
    https://angelic[.]su/files/2.txt
    https://staketree[.]net/1.txt
    https://staketree[.]net/2.txt
    https://relay.lmfao[.]su
    https://lmfao[.]su/Bin/ScreenConnect.ClientSetup.msi?e=Access&y=Guest
    144.172.112[.]84

    MIL OSI Economics

  • MIL-OSI Economics: Code highlighting with Cursor AI for $500,000

    Source: Securelist – Kaspersky

    Headline: Code highlighting with Cursor AI for $500,000

    Attacks that leverage malicious open-source packages are becoming a major and growing threat. This type of attacks currently seems commonplace, with reports of infected packages in repositories like PyPI or npm appearing almost daily. It would seem that increased scrutiny from researchers on these repositories should have long ago minimized the profits for cybercriminals trying to make a fortune from malicious packages. However, our investigation into a recent cyberincident once again confirmed that open-source packages remain an attractive way for attackers to make easy money.

    Infected out of nowhere

    In June 2025, a blockchain developer from Russia reached out to us after falling victim to a cyberattack. He’d had around $500,000 in crypto assets stolen from him. Surprisingly, the victim’s operating system had been installed only a few days prior. Nothing but essential and popular apps had been downloaded to the machine. The developer was well aware of the cybersecurity risks associated with crypto transactions, so he was vigilant and carefully reviewed his every step while working online. Additionally, he used free online services for malware detection to protect his system, but no commercial antivirus software.

    The circumstances of the infection piqued our interest, and we decided to investigate the origins of the incident. After obtaining a disk image of the infected system, we began our analysis.

    Syntax highlighting with a catch

    As we examined the files on the disk, a file named extension.js caught our attention. We found it at %userprofile%.cursorextensionssolidityai.solidity-1.0.9-universalsrcextension.js. Below is a snippet of its content:

    A request sent by the extension to the server

    This screenshot clearly shows the code requesting and executing a PowerShell script from the web server angelic[.]su: a sure sign of malware.

    It turned out that extension.js was a component of the Solidity Language extension for the Cursor AI IDE, which is based on Visual Studio Code and designed for AI-assisted development. The extension is available in the Open VSX registry, used by Cursor AI, and was published about two months ago. At the time this research, the extension had been downloaded 54,000 times. The figure was likely inflated. According to the description, the extension offers numerous features to optimize work with Solidity smart contract code, specifically syntax highlighting:

    The extension’s description in the Open VSX registry

    We analyzed the code of every version of this extension and confirmed that it was a fake: neither syntax highlighting nor any of the other claimed features were implemented in any version. The extension has nothing to do with smart contracts. All it does is download and execute malicious code from the aforementioned web server. Furthermore, we discovered that the description of the malicious plugin was copied by the attackers from the page of a legitimate extension, which had 61,000 downloads.

    How the extension got on the computer

    So, we found that the malicious extension had 54,000 downloads, while the legitimate one had 61,000. But how did the attackers manage to lull the developer’s vigilance? Why would he download a malicious extension with fewer downloads than the original?

    We found out that while trying to install a Solidity code syntax highlighter, the developer searched the extension registry for solidity. This query returned the following:

    Search results for “solidity”: the malicious (red) and legitimate (green) extensions

    In the search results, the malicious extension appeared fourth, while the legitimate one was only in eighth place. Thus, while reviewing the search results, the developer clicked the first extension in the list with a significant number of downloads – which unfortunately proved to be the malicious one.

    The ranking algorithm trap

    How did the malicious extension appear higher in search results than the legitimate one, especially considering it had fewer downloads? It turns out the Open VSX registry ranks search results by relevance, which considers multiple factors, such as the extension rating, how recently it was published or updated, the total number of downloads, and whether the extension is verified. Consequently, the ranking is determined by a combination of factors: for example, an extension with a low number of downloads can still appear near the top of search results if that metric is offset by its recency. This is exactly what happened with the malicious plugin: the fake extension’s last update date was June 15, 2025, while the legitimate one was last updated on May 30, 2025. Thus, due to the overall mix of factors, the malicious extension’s relevance surpassed that of the original, which allowed the attackers to promote the fake extension in the search results.

    The developer, who fell into the ranking algorithm trap, didn’t get the functionality he wanted: the extension didn’t do any syntax highlighting in Solidity. The victim mistook this for a bug, which he decided to investigate later, and continued his work. Meanwhile, the extension quietly installed malware on his computer.

    From PowerShell scripts to remote control

    As mentioned above, when the malicious plugin was activated, it downloaded a PowerShell script from https://angelic[.]su/files/1.txt.

    The PowerShell script contents

    The script checks if the ScreenConnect remote management software is installed on the computer. If not, it downloads a second malicious PowerShell script from: https://angelic[.]su/files/2.txt. This new script then downloads the ScreenConnect installer to the infected computer from https://lmfao[.]su/Bin/ScreenConnect.ClientSetup.msi?e=Access&y=Guest and runs it. From that point on, the attackers can control the infected computer via the newly installed software, which is configured to communicate with the C2 server relay.lmfao[.]su.

    Data theft

    Further analysis revealed that the attackers used ScreenConnect to upload three VBScripts to the compromised machine:

    • a.vbs
    • b.vbs
    • m.vbs

    Each of these downloaded a PowerShell script from the text-sharing service paste.ee. The download URL was obfuscated, as shown in the image below:

    The obfuscated URL for downloading the PowerShell script

    The downloaded PowerShell script then retrieved an image from archive[.]org. A loader known as VMDetector was then extracted from this image. VMDetector attacks were previously observed in phishing campaigns that targeted entities in Latin America. The loader downloaded and ran the final payload from paste.ee.

    Our analysis of the VBScripts determined that the following payloads were downloaded to the infected computer:

    • Quasar open-source backdoor (via a.vbs and b.vbs),
    • Stealer that collected data from browsers, email clients, and crypto wallets (via m.vbs). Kaspersky products detect this malware as HEUR:Trojan-PSW.MSIL.PureLogs.gen.

    Both implants communicated with the C2 server 144.172.112[.]84, which resolved to relay.lmfao[.]su at the time of our analysis. With these tools, the attackers successfully obtained passphrases for the developer’s wallets and then syphoned off cryptocurrency.

    New malicious package

    The malicious plugin didn’t last long in the extension store and was taken down on July 2, 2025. By that time, it had already been detected not only by us as we investigated the incident but also by other researchers. However, the attackers continued their campaign: just one day after the removal, they published another malicious package named “solidity”, this time exactly replicating the name of the original legitimate extension. The functionality of the fake remained unchanged: the plugin downloaded a malicious PowerShell script onto the victim’s device. However, the attackers sought to inflate the number of downloads dramatically. The new extension was supposedly downloaded around two million times. The following results appeared up until recently when users searched for solidity within the Cursor AI development environment (the plugin is currently removed thanks to our efforts).

    Updated search results for “solidity”

    The updated search results showed the legitimate and malicious extensions appearing side-by-side in the search rankings, occupying the seventh and eighth positions respectively. The developer names look identical at first glance, but the legitimate package was uploaded by juanblanco, while the malicious one was uploaded by juanbIanco. The font used by Cursor AI makes the lowercase letter l and uppercase I appear identical.

    Therefore, the search results displayed two seemingly identical extensions: the legitimate one with 61,000 downloads and the malicious one with two million downloads. Which one would the user choose to install? Making the right choice becomes a real challenge.

    Similar cyberattacks

    It’s worth noting that the Solidity extensions we uncovered are not the only malicious packages published by the attackers behind this operation. We used our open-source package monitoring tool to find a malicious npm package called “solsafe”. It uses the URL https://staketree[.]net/1.txt to download ScreenConnect. In this campaign, it’s also configured to use relay.lmfao[.]su for communication with the attackers.

    We also discovered that April and May 2025 saw three malicious Visual Studio Code extensions published: solaibot, among-eth, and blankebesxstnion. The infection method used in these threats is strikingly similar to the one we described above. In fact, we found almost identical functionality in their malicious scripts.

    Scripts downloaded by the VS Code extension (left) vs. Solidity Language (right)

    In addition, all of the listed extensions perform the same malicious actions during execution, namely:

    • Download PowerShell scripts named 1.txt and 2.txt.
    • Use a VBScript with an obfuscated URL to download a payload from paste.ee.
    • Download an image with a payload from archive.org.

    This leads us to conclude that these infection schemes are currently being widely used to attack blockchain developers. We believe the attackers won’t stop with the Solidity extensions or the solsafe package that we found.

    Takeaways

    Malicious packages continue to pose a significant threat to the crypto industry. Many projects today rely on open-source tools downloaded from package repositories. Unfortunately, packages from these repositories are often a source of malware infections. Therefore, we recommend extreme caution when downloading any tools. Always verify that the package you’re downloading isn’t a fake. If a package doesn’t work as advertised after you install it, be suspicious and check the downloaded source code.

    In many cases, malware installed via fake open-source packages is well-known, and modern cybersecurity solutions can effectively block it. Even experienced developers must not neglect security solutions, as these can help prevent an attack in case a malicious package is installed.

    Indicators of compromise

    Hashes of malicious JS files
    2c471e265409763024cdc33579c84d88d5aaf9aea1911266b875d3b7604a0eeb
    404dd413f10ccfeea23bfb00b0e403532fa8651bfb456d84b6a16953355a800a
    70309bf3d2aed946bba51fc3eedb2daa3e8044b60151f0b5c1550831fbc6df17
    84d4a4c6d7e55e201b20327ca2068992180d9ec08a6827faa4ff3534b96c3d6f
    eb5b35057dedb235940b2c41da9e3ae0553969f1c89a16e3f66ba6f6005c6fa8
    f4721f32b8d6eb856364327c21ea3c703f1787cfb4c043f87435a8876d903b2c

    Network indicators
    https://angelic[.]su/files/1.txt
    https://angelic[.]su/files/2.txt
    https://staketree[.]net/1.txt
    https://staketree[.]net/2.txt
    https://relay.lmfao[.]su
    https://lmfao[.]su/Bin/ScreenConnect.ClientSetup.msi?e=Access&y=Guest
    144.172.112[.]84

    MIL OSI Economics

  • MIL-OSI United Kingdom: British investment boost in Ukraine to benefit both countries

    Source: United Kingdom – Executive Government & Departments

    Press release

    British investment boost in Ukraine to benefit both countries

    British investment boost in Ukraine to support security and prosperity of both countries

    • New UK package of support for Ukraine’s immediate and longer-term needs at Ukraine Recovery Conference.
    • UK and Ukraine conclude historic deal for Thales Air Defence missiles, boosting British growth and jobs and keeping Ukraine in the fight.
    • UK also confirms up to £283 million in bilaterial assistance for Ukraine over the next year.

    Two hundred British jobs will be created and another 700 safeguarded in a major defence deal between the UK and Ukraine to be signed at this year’s Ukraine Recovery Conference (URC). 

    The jobs at Thales in Belfast come as the UK and Ukraine successfully conclude the largest export credit agency-backed deal in Ukraine.  

    Supported by a £2.5 billion guarantee with a 19-year financing agreement, the funds can now be released. This enables the delivery of more than 5000 Air Defence missiles from British business Thales – in what is not only a major boost to the UK’s defence capabilities but will also keep Ukraine in the fight, boosting their defence against Russia’s illegal full-scale invasion.  

    Representing the Prime Minister at the conference, Deputy Prime Minister Angela Rayner and Minister for Exports Gareth Thomas will formally sign the agreement with the Government of Ukraine, marking a key milestone in the UK-Ukraine defence cooperation.  

    The deal delivers on this Government’s Plan for Change, by spending more on defence and creating jobs we will keep the country safe and boost economic growth.  

    In a speech at the conference in Rome, the Deputy Prime Minister will also reaffirm the UK’s bilateral assistance to Ukraine for the financial year 2025-2026 of up to £283 million. This will keep the country in the fight and ensure Ukrainians living through Russia’s illegal full-scale invasion have access to vital support across humanitarian, energy, stabilisation, reform, recovery and reconstruction needs.  

    Deputy Prime Minister Angela Rayner said:

    As we continue to witness the enduring strength of the Ukrainian people, the UK stands by their side to provide the assistance their country needs to not only stay in the fight, but to rebuild and recover.

    This announcement underlines our continued support for Ukraine – boosting their air defences against devastating drone and missile attacks and supporting the critical work to reconstruct this nation and provide the hope that they need.

    This will also provide skilled jobs in the UK and is all part of our Plan for Change – bolstering the UK defence industry and strengthening our international ties.

    Minister for Services, Small Business and Exports Gareth Thomas said on the Thales deal: 

    This landmark agreement is a powerful example of how British expertise is supporting Ukraine’s defence and recovery while creating high-quality jobs at home. 

    By unlocking UKEF-backed finance, we’re enabling the delivery of vital equipment to Ukraine and strengthening our own defence industrial base. 

    It’s a clear demonstration of our Plan for Change in action—backing British business, boosting exports, and standing shoulder to shoulder with Ukraine in the face of Russian aggression.” 

    The UK will provide up to £10.5 million for the Governance Reform Programme and up to £1 million in support of Ukraine’s Green Transition Office in financial year 2025 to 2026 to help Ukraine reform for the future. £10.5 million will go towards efforts on rule of law, justice and anti-corruption while £1 million will fund work on green transition and energy, both supporting Ukraine on its path to becoming a prosperous, green and modern European nation.   

    During the conference, British International Investment (BII) will also confirm €30 million for MHP, a leading Ukrainian agribusiness. MHP employs over 30,000 people in Ukraine, with more than 40% being women. The loan will help them to safeguard jobs and boost resilience in the food and agriculture sectors during Russia’s full-scale invasion. MHP, Ukraine’s largest poultry and processed meat producer, exports to over 70 countries.  

    Underpinning much of these efforts, the UK will endorse the Government of Ukraine’s insurance agreement. This initiative seeks to make insurance more affordable and widely accessible for businesses, including those in the UK, helping to derisk their investments into Ukraine. 

    The UK is committed to supporting Ukraine win the war and the peace, emerging as a stronger, more prosperous and free nation, resilient to Russian threats. Our 100 Year Partnership, alongside the commitments made at URC, reaffirm the UK’s iron-clad support for Ukraine now and into the future.  

    In total, the UK has committed £18.3 billion for Ukraine with £13 billion in military support and £5.3 billion in non-military support.  

    Background:  
    • More information on the UK’s overall support to Ukraine can be found here
    • The £10.5 million and £1 million funding commitments sit within the £283 million for the financial year 2025-2026.  
    • The UK and Ukraine will sign the UKEF financing agreement on Thales, with representatives from both governments formalizing the deal’s conclusion at URC.  
    • The BII investment will be funded from capital the UK Government has already provided (£250 million) to support BII’s expansion into Ukraine.  
    • More information on MHP can be found here.

    Updates to this page

    Published 10 July 2025

    MIL OSI United Kingdom

  • MIL-OSI Russia: Mikhail Mishustin gave instructions following the strategic session on the development of the auto industry

    Translation. Region: Russian Federal

    Source: Government of the Russian Federation – Government of the Russian Federation –

    An important disclaimer is at the bottom of this article.

    The draft Strategy for the Development of the Automotive Industry will be updated taking into account the need to improve support measures for domestic manufacturers. This instruction was given by Prime Minister Mikhail Mishustin following the results of strategic session on the development of the Russian auto industry.

    State support measures provided to Russian automobile industry enterprises are to be developed for the main segments of motor vehicles. At the same time, the conditions for access to them must be defined, including a high actual level of localization of products, consumer properties of the car, as well as prospects for export deliveries. Performance indicators for each support measure will be fixed in the state program “Development of Industry and Increasing Its Competitiveness”. The authorized ministries must submit their proposals on this matter by the end of November.

    The draft strategy being finalized should also provide for measures to increase labor productivity in the industry and reduce production costs. Another instruction concerns the formation of a forecast for the structure of the vehicle fleet, taking into account the development of the market for transport on alternative types of fuel, unmanned and connected transport. In the process of this work, long-term plans for the development of public transport infrastructure, increasing requirements for environmental protection, changing consumer preferences of citizens should be taken into account, and the segmentation of vehicles by type of fuel depending on the purpose of the transport and types of transportation, taking into account their range.

    In the course of updating the draft strategy for the development of the automotive industry, the authorized ministries will also have to work out issues of forming a technological map of cooperation between manufacturers of vehicles, automotive components and materials, and software developers in a manner similar to that for national projects to ensure technological leadership.

    In addition, Mikhail Mishustin instructed to take into account the need to establish legal foundations for the functioning of the institute of chief designers, bearing in mind their participation in the formation of technological policy.

    The strategic session on the development of the automotive industry took place on June 17. During his speech, Mikhail Mishustin emphasized that in order to strengthen technological sovereignty, it is important to expand industrial capacity, increase the production of domestic vehicles, and generally continue to form a modern ecosystem around the automotive sector.

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI Russia: The Caucasus Investment Forum 2026 will be held from May 17 to 19 in Mineralnye Vody.

    Translation. Region: Russian Federal

    Source: Ministry of Economic Development (Russia) – Ministry of Economic Development (Russia) –

    An important disclaimer is at the bottom of this article.

    Deputy Prime Minister of the Russian Federation Alexander Novak, who oversees the North Caucasus Federal District, held the first meeting of the Organizing Committee for the preparation and holding of the Caucasus Investment Forum in 2026.

    The event was attended by representatives of federal authorities, heads of regions that are part of the North Caucasus Federal District, top managers of the largest state corporations, members of business associations and public organizations, representatives of industry communities. According to the decision of the Organizing Committee for the preparation and holding of KIF-2026, next year the Forum will be held from 17 to 19 May in Mineralnye Vody at the MinvodyEXPO IEC.

    The Caucasus Investment Forum is held in order to increase the investment potential of the North Caucasus Federal District and in the interests of its sustainable socio-economic development.

    Opening the meeting, Deputy Prime Minister of the Russian Federation Alexander Novak thanked the organizers, members of the Organizing Committee, representatives of departments and companies that took part in organizing the Caucasus Investment Forum in 2025, noted the high assessment of the past event by the country’s leadership, the high-quality composition of the participants, including foreign ones. “The Caucasus Investment Forum 2025 in Mineralnye Vody was an important step forward – both in terms of organization and content. We were able to exceed the bar of last year, and this is the result of the teamwork of all participants. I thank the Organizing Committee, the Government of the Stavropol Territory and the Ministry of Economic Development of Russia for their contribution to the preparation of the Forum. Special thanks to the Roscongress Foundation, the team and partners – your support made the Forum meaningful and large-scale. The Vershina Award showed an increase in investor interest in the region – 266 applications from 49 regions. I consider it important to continue holding it in 2026. The youth program covered key areas – IT, science, entrepreneurship, tourism. This confirms that the Caucasus has a strong human resource. Today we are already starting preparations for KIF-2026 in order to hold it even more effectively,” noted Alexander Novak.

    Adviser to the President of the Russian Federation, Executive Secretary of the Organizing Committee of the Caucasus Investment Forum Anton Kobyakov noted that the North Caucasus is a promising region with many growth points. “Among the areas of active development of the regions of the district are tourism, agriculture, employment. Systematic work on the infrastructure development of the North Caucasus continues. Holding the Caucasus Investment Forum opens up broad opportunities for cooperation between the North Caucasus Federal District and other regions of Russia, including in terms of attracting new economic partners and expanding prospects for the development of industrial and agricultural production, as well as strengthening the region’s position in the tourism market.”

    The business program of KIF-2026 will be attended by heads of government bodies, representatives of Russian and international companies, mass media, youth and scientific communities. The forum will become a platform for negotiations and conclusion of business contracts for the purpose of developing investment projects and public-private partnerships in Russian regions.

    The business program in 2026 will place special emphasis on expanding international economic cooperation, primarily with the countries of the Azov-Black Sea and Caspian basins. It is planned that representatives of these states will actively participate in the forum, which will open up new opportunities for creating international transport and logistics routes and implementing joint investment projects in such areas as mining, ecology and cultural interaction.

    The organizer of the KIF is the Roscongress Foundation with the support of the Ministry of Economic Development of the Russian Federation.

    The Roscongress Foundation is a socially oriented non-financial development institution and a major organizer of national and international congress, exhibition, business, public, youth, sporting, and cultural events, created in accordance with the decision of the President of the Russian Federation.

    The Foundation was established in 2007 with the aim of promoting the development of economic potential, advancing national interests and strengthening the image of Russia. The Foundation comprehensively studies, analyzes, forms and covers issues of the Russian and global economic agenda. Provides administration and facilitates the promotion of business projects and attracting investments, promotes the development of social entrepreneurship and charitable projects.

    The Foundation’s events bring together participants from 209 countries and territories, more than 15,000 media representatives work annually at Roscongress venues, and more than 5,000 experts in Russia and abroad are involved in analytical and expert work.

    The Foundation interacts with UN structures and other international organizations. It develops multi-format cooperation with 226 foreign economic partners, associations of industrialists and entrepreneurs, financial, trade and business associations in 89 countries of the world, with 358 Russian public organizations, federal and regional executive and legislative bodies of the Russian Federation.

    Official Telegram channels of the Roscongress Foundation: in Russian — t. me/Roscongress, in English — t. me/RoscongressDirect, in Spanish — t. me/RoscongressEsp, in Arabic — t. me/RosCongressArabic. Official website and Information and Analytical System of the Roscongress Foundation: roscongress.org.

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI Russia: Yuri Trutnev: VEB.RF will support the creation of more than 1,000 new jobs in the Far East

    Translation. Region: Russian Federal

    Source: Government of the Russian Federation – Government of the Russian Federation –

    An important disclaimer is at the bottom of this article.

    The state corporation VEB.RF will provide preferential credit funds (with a Far Eastern subsidy) in the amount of 16 billion rubles for the construction of the world’s first interstate cable car, which will connect Russia and China across the Amur River. In addition, three more projects in the Amur Region and Primorye will be financed. The implementation of these projects will ensure the creation of more than 1 thousand jobs. The corresponding decision was made following a meeting of the Presidium of the Government Commission on the Socio-Economic Development of the Far East, chaired by Deputy Prime Minister – Plenipotentiary Representative of the President in the Far Eastern Federal District Yuri Trutnev.

    “Attracting investment to the regions creates conditions for growth. We help all investors who are ready to work and develop the Far East, invest in the territory of Russia. Investors in the Far East receive a wide range of benefits provided by the conditions of preferential regimes, reimbursement of infrastructure costs. A number of projects significant for the Far East are already receiving preferential lending from the state corporation VEB.RF. We will continue to support investment projects aimed at developing the economy of the Far Eastern regions and improving the quality of life of Far Easterners,” said Yuri Trutnev.

    “VEB.RF will provide preferential financing in the amount of more than 16 billion rubles for the construction of the world’s first interstate cable car, which will connect Russia and China via the Amur. Support will be provided, among other things, for the construction of a production and logistics complex in Belogorsk for the deep processing of soybeans and rapeseed, the creation of a fishing port on the Nazimov Peninsula in Vladivostok, and the construction of the Artem multimodal transport and logistics center in Primorsky Krai. The implementation of these projects will ensure the creation of more than 1,000 jobs,” said Artem Dovlatov, Deputy Chairman of VEB.RF.

    The Blagoveshchensk-Heihe cable car construction project is the creation of the world’s first cable car that will connect not only neighboring cities, but also countries. The cross-border cable car is an innovative and high-tech infrastructure solution that facilitates communication between two neighboring countries. The project involves the construction of cable car stations and passenger terminals on opposite banks of the Amur River on the Russian and Chinese sides.

    The project to create a cross-border cable car is being implemented within the framework of the intergovernmental agreement between Russia and China dated September 3, 2015. According to the design documentation, the journey along the future cable car from Blagoveshchensk to Heihe should take about three minutes, and the capacity of the cable car terminal will be 6,850 passengers per day, or up to 2.5 million passengers per year.

    The project to build a production and logistics complex in the city of Belogorsk in the Amur Region will also receive preferential financing from the 16 billion rubles allocated by VEB.RF. Deep processing of soybeans and rapeseed will be organized at one of the largest processing plants in Russia. The new enterprise should be launched next year.

    Two projects in Primorye will also receive support. The first is for the development of a fishing port on the Nazimov Peninsula (stage II) in Vladivostok. The project envisages the construction of a modern cold warehouse with a capacity of 25 thousand tons of one-time storage of fish products, a crab holding pool, and a site for storing refrigerated containers.

    The second is the construction of the multimodal transport and logistics center “Artem”. The creation of a high-tech logistics complex includes the construction of modern railway, terminal, warehouse and customs infrastructure: a container site, 70 km long intra-terminal railway tracks with a connection to the Artem-Primorsky-1 and Artem-Primorsky-2 stations of the Far Eastern Railway.

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI Russia: Alexander Novak held the first meeting of the organizing committee for the preparation of the Caucasus Investment Forum – 2026

    Translation. Region: Russian Federal

    Source: Government of the Russian Federation – Government of the Russian Federation –

    An important disclaimer is at the bottom of this article.

    Deputy Prime Minister Alexander Novak, who oversees the North Caucasus Federal District, held the first meeting of the organizing committee for the preparation and holding of the Caucasus Investment Forum in 2026.

    The event was attended by representatives of federal authorities, heads of regions that are part of the North Caucasus Federal District, top managers of the largest state corporations, members of business associations and public organizations, and representatives of industry communities.

    The Caucasus Investment Forum is held in order to increase the investment potential of the North Caucasus Federal District and in the interests of its sustainable socio-economic development.

    Opening the meeting, Alexander Novak thanked the organizers, members of the organizing committee, representatives of departments and companies that took part in organizing the Caucasus Investment Forum in 2025, noted the high assessment of the past event by the country’s leadership, the high-quality composition of the participants, including foreign ones.

    Over the three days, the forum was attended by over 4,100 people from 32 countries, including 1,450 representatives of Russian and foreign businesses, nine federal ministers, heads of four federal agencies, seven heads of constituent entities of the Russian Federation, as well as high-ranking delegations from Abkhazia, South Ossetia, Kazakhstan and Qatar. 86 agreements worth over 206 billion rubles were signed, including five agreements with international partners. The forum program covered over 78 events with the participation of 440 speakers and an emphasis on key development areas – from industry and logistics to education and healthcare. Particular attention was paid to the youth agenda: over 1,000 students from 40 universities in the country took part in a rich program dedicated to career development, leadership and creative industries.

    “The Caucasus Investment Forum 2025 in Mineralnye Vody was an important step forward – both in terms of organization and content. We were able to exceed last year’s bar, and this is the result of the teamwork of all participants. The growth of investor interest in the region was demonstrated by the “Vershina” award – 266 applications from 49 regions. I believe it is important to continue holding it in 2026. The youth program covered key areas – IT, science, entrepreneurship, tourism. This confirms that the Caucasus has a strong human resource. Today, we are already starting preparations for the CIF-2026 in order to hold it even more effectively,” said Alexander Novak.

    Adviser to the President, responsible secretary of the organizing committee of the KIF-2025 Anton Kobyakov emphasized that the development of the North Caucasus is among the strategic priorities. He paid attention to the participation of Russian regions in the future Caucasus Investment Forum.

    “I expect that the subjects of the Russian Federation and companies interested in investing in the North Caucasus Federal District will take a more active part in the preparation and holding of KIF-2026. It is important to have a mutual movement here: on the one hand, the regions’ interest in the possibilities of the North Caucasus Federal District, on the other, the proactive position of the North Caucasus subjects and businesses themselves. It is necessary to present their projects more widely, attract partners, and form sustainable business ties. It is this approach – mutual interest and openness – that we will lay in the concept of the forum’s exhibition program and the basis of the invitation campaign for KIF-2026 participants,” said Anton Kobyakov.

    The business program of KIF-2026 will be attended by heads of government bodies, representatives of Russian and international companies, mass media, youth and scientific communities. The forum will become a platform for negotiations and conclusion of business contracts for the purpose of developing investment projects and public-private partnerships in Russian regions.

    The business program in 2026 will place special emphasis on expanding international economic cooperation, primarily with the countries of the Azov-Black Sea and Caspian basins. It is planned that representatives of these countries will actively participate in the forum, which will open up new opportunities for creating international transport and logistics routes and implementing joint investment projects in such areas as mining, ecology and cultural interaction.

    According to the decision of the organizing committee for the preparation and holding of KIF-2026, next year the forum will be held from May 17 to 19 in the city of Mineralnye Vody at the MinvodyExpo IEC.

    The organizer of the CIF is the Roscongress Foundation with the support of the Ministry of Economic Development.

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI Russia: To teachers, students, postgraduates and graduates of the Moscow State Institute of Culture

    Translation. Region: Russian Federal

    Source: Government of the Russian Federation – Government of the Russian Federation –

    An important disclaimer is at the bottom of this article.

    On July 10, 2025, MGIK will celebrate its 95th anniversary.

    Dear friends!

    I sincerely congratulate you on the 95th anniversary of the Moscow State Institute of Culture.

    All these decades he remained faithful to the best traditions of higher professional education.

    Today, relying on solid experience, one of the oldest universities in the country trains choreographers, directors, actors, musical performers, specialists in the field of mass media, management, and also conducts active scientific work. A unique creative space has been created here, the latest methods are used. Teachers help students master knowledge, develop their talent, teach them the intricacies of professional skill, readiness to serve culture faithfully, and treat the audience with respect and love.

    The Institute is proud of its graduates, many of whom have become Honored and People’s Artists and have won public recognition.

    I wish the faculty, students, postgraduates and graduates of MGIK inspiration, success, new bright projects and premieres.

    M. Mishustin

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI Russia: 35 new “life situations” will appear on the government services portal by the end of the year.

    Translation. Region: Russian Federal

    Source: Government of the Russian Federation – Government of the Russian Federation –

    An important disclaimer is at the bottom of this article.

    Priority services “life situations” were approved at a meeting of the subcommittee on improving the quality of public services under the leadership of Deputy Prime Minister – Head of the Government Staff Dmitry Grigorenko. They will become available on the public services portal within a year.

    In total, 35 new “life situations” will appear in 2025 for both citizens and businesses. These are services for solving such issues as planning and having a child, formalizing guardianship and trusteeship, organizing children’s leisure and separately – organizing children’s recreation, caring for pets, entering college and technical school, the desire to become a volunteer, applying for a tax deduction, launching an IT company, undergoing a medical examination, supporting Russian citizens abroad and such difficult situations as the loss of a loved one, disability.

    The list of “life situations” was formed on the basis of feedback from citizens, the results of the analysis of the quality of services provided, as well as research conducted in user testing laboratories.

    With the help of the “life situations” services for citizens and businesses, the time it takes to receive government services, the number of visits to departments and documents that need to be provided are reduced. The concept is based on the unification of services to solve a specific issue of a person, when he does not have to receive all the services separately and look for where to go, and all the necessary services and reference information are collected in one place, on a special page of this “life situation” on the government services portal.

    “The “life situations” services are a new stage in the evolution of public services. Once upon a time, people stood in lines at various departments, then it became possible to receive public services online. At the next stage, the state offered citizens to apply for services through a “single window” – at the MFC with paper applications and to “Gosuslugi” via the Internet. Now there are more than 1.6 thousand such services and services on the portal. To make it easier to navigate them, we are combining them according to the “life situations” principle – citizens solve their problems comprehensively, quickly and in one place,” said Dmitry Grigorenko.

    At the federal level, the “life situations” services are being implemented since 2023. Currently, 35 of them have been implemented. With the federal “life situations” services planned for launch, there will be 70 of them by the end of 2025.

    Thanks to federal services, “life situations” on average:

    The time to receive government services has been reduced by 35% (from 102 to 66 days); the number of required documents has been reduced by 29% (from 28 to 20 units); the need to visit departments has been reduced by 64% (from 14 to 5 visits).

    At the same time, some “life situations” are available entirely online. Since 2024, regional “life situations” services have also been implemented. More than 150 of them have been launched so far. Work on implementing “life situations” services is being carried out within the framework of the federal project “State for People”.

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI Russia: Financial news: Insurance license revoked from SK KHATKHOR LLC (10.07.2025)

    Translation. Region: Russian Federal

    Source: Central Bank of Russia –

    An important disclaimer is at the bottom of this article.

    By order No. OD-1469 dated 10.07.2025, the Bank of Russia revoked the license dated 28.12.2023 OS No. 4404-03 for the implementation of compulsory motor third party liability insurance (MTPL) of the limited liability company INSURANCE COMPANY HATHOR (registration number according to the unified state register of insurance entities 4404, hereinafter referred to as SK HATHOR LLC).

    The Bank of Russia made this decision on the basis of subparagraph 3 of paragraph 2 of Article 32.8 of Law No. 4015-1 of the Law of the Russian Federation of 27.11.1992 “On the Organization of Insurance Business in the Russian Federation” (hereinafter referred to as Law No. 4015-1), guided by the fact that SK KHATKHOR LLC:

    violated the minimum permissible value of the standard ratio of own funds (capital) and accepted liabilities established by the Bank of Russia in accordance with paragraph 4.1 of Article 25 of Law No. 4015-1, which creates a threat to the rights and legitimate interests of policyholders, insured persons, and beneficiaries. In order to comply with the requirements of the financial stability of the insurer, the minimum permissible value of the standard ratio is 1. The value of the standard ratio of SK KHATKHOR LLC has been steadily decreasing in 2025 from 0.75 on 31.01.2025 to 0.31 on 31.05.2025; previously violated the requirements of insurance legislation, in connection with which the Bank of Russia applied to it for one year the measures provided for in the third paragraph of subparagraph 2 of paragraph 2 of Article 32.5-1 of Law No. 4015-1.

    The decision came into force on the day of its adoption.

    By order of the Bank of Russia dated 10.07.2025 No. OD-1470, a temporary administration of SK KHATKHOR LLC was appointed from 10.07.2025 for a period of six months.

    The functions of the temporary administration are assigned to the State Corporation “Deposit Insurance Agency”, which exercises the powers of the executive bodies of LLC “SK “KHATKHOR”, identifies creditors of LLC “SK “KHATKHOR” and maintains a list of submitted claims.

    After the revocation of the license of SK KHATKHOR LLC, the MTPL contracts continue to be valid until their expiration.

    Compensation payments for damage caused to the life, health or property of the victim under the OSAGO contracts of LLC “SK “KHATKHOR” will be carried out by the Russian Union of Auto Insurers (RSA). Information on the implementation of compensation payments can be found on the official website of the RSABBV. Autoins.ru, section “Compensation payments”.

    In connection with the revocation of the license of LLC “SK “KHATKHOR”, policyholders have the right to terminate the MTPL agreement early. In this case, the policyholder must be returned a portion of the insurance premium minus the costs of implementing MTPL and deductions to the reserve for compensation payments, in the amount of the share attributable to the unexpired term of the agreement or the unexpired period of use of the vehicle.

    For early termination of the MTPL agreement, as well as other issues related to the activities of LLC “SK “KHATKHOR”, please contact the following address: 283001, Donetsk People’s Republic, Donetsk city district, Donetsk city, Ilyicha ave., 3.

    When using the material, a link to the Press Service of the Bank of Russia is required.

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    MIL OSI Russia News

  • MIL-OSI Russia: China to reap bumper summer grain harvest in 2025

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    BEIJING, July 10 (Xinhua) — China has produced a stable and bumper summer grain harvest this year, totaling 149.74 million tonnes, official data showed Thursday.

    According to the National Bureau of Statistics (NBS), China’s grain harvest in the summer period slightly decreased by 0.1 percent compared with last year due to difficult weather conditions.

    The decline in the summer grain harvest was minimal, and the overall harvest remained stable overall, said Wei Fenghua, an official with the National Grain Bureau.

    “A stable and large grain harvest in China in 2025 lays a solid foundation for overall annual grain production, providing strong support for responding to the complex international environment and promoting sustainable economic growth,” he said.

    A severe drought has hit major agricultural areas including Henan and Shaanxi provinces, causing some problems. However, active irrigation measures including large-scale water diversion have ensured that most farmland is effectively irrigated, Wei Fenghua explained.

    As China enters its main flood season, the Ministry of Agriculture and Rural Affairs has launched a 100-day campaign to boost crop yields, mitigate disasters and ensure the autumn grain harvest, which is of great significance to China’s food security.

    To achieve China’s grain production target of about 700 million tons this year, the ministry will dispatch teams to guide field work to ensure reliable crop emergence, prevent natural disasters and control pests. -0-

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: Ministerial meeting of the Global Dialogue of Civilizations opens in Beijing

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    BEIJING, July 10 (Xinhua) — The ministerial meeting of the Global Dialogue of Civilizations on “Preserving the Diversity of Human Civilizations for World Peace and Development” kicked off in Beijing on Thursday.

    The two-day event, which will focus on the importance of cultural diversity and mutual learning in advancing human progress, attracted more than 600 guests from 140 countries and regions.

    At the parallel sub-forums, participants will discuss the key role of inter-civilizational exchanges and mutual enrichment in creating an inclusive world, promoting global development and prosperity, activating cultural heritage and innovation, strengthening mutual understanding and friendship among peoples, stimulating scientific and technological progress and expanding academic exchanges.

    The meeting is organized by the Propaganda Department of the CPC Central Committee and the International Relations Department of the CPC Central Committee. -0-

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: Chinese and Turkish freight carriers launch regular express trains from Southwest China to Europe

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    CHONGQING, July 10 (Xinhua) — An express train loaded with telecommunications equipment, auto parts and other goods departed from the southwest Chinese metropolis of Chongqing on the China-Europe international rail freight route at around 12 p.m. on Wednesday, marking the start of regular freight express service on the route.

    The new services are said to be a new logistics product jointly developed by Chongqing-based supply chain management company Yuxinou and Turkish company Pacific Global Logistics.

    The train will cross the border at the Khorgos checkpoint in Northwest China’s Xinjiang Uyghur Autonomous Region, pass through Azerbaijan and Georgia, and eventually reach Turkey and then European cities.

    Regular operation of such an express will reduce the time for delivery of goods from Chongqing to Europe via the Middle Corridor /Trans-Caspian International Transport Route/ to 25-30 days, which is at least ten days faster than the traditional method, said the chairman of the board of the above-mentioned Turkish company, Askar Sadik.

    On the same day, a project was also signed to transform Chongqing into an international procurement hub along the Middle Corridor, establish a cooperation network for enterprises in the fields of trade, industrial chains and supply chains in Eurasia, and establish a mechanism for their regular dialogue. -0-

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: Breaking: China Ready to Facilitate Early Ceasefire in Gaza – Li Qiang

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    CAIRO, July 10 (Xinhua) — China is ready to maintain close communication with Egypt and promote an early ceasefire in the Gaza Strip, Chinese Premier Li Qiang said at a meeting with Egyptian President Abdel Fattah al-Sisi here on Thursday.

    According to him, the Chinese side is also willing to work with Egypt to alleviate the humanitarian crisis, prevent the spread and escalation of the conflict, and make unremitting efforts for a comprehensive, fair and lasting settlement of the Palestinian issue. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News

  • MIL-OSI Russia: Breaking: China Considering Deepening Cooperation with Egypt under Belt and Road Initiative – Li Qiang

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    An important disclaimer is at the bottom of this article.

    Source: People’s Republic of China – State Council News

    CAIRO, July 10 (Xinhua) — China is willing to strengthen cooperation with Egypt under the Belt and Road Initiative in areas including economy, trade, finance, manufacturing, new energy, science and technology, as well as cultural and people-to-people exchanges, Chinese Premier Li Qiang said here on Thursday during a meeting with Egyptian President Abdel Fattah el-Sisi.

    China is ready to encourage more competitive Chinese companies to invest in Egypt’s economy, he added. –0–

    Please note: This information is raw content obtained directly from the source of the information. It is an accurate report of what the source claims and does not necessarily reflect the position of MIL-OSI or its clients.

    .

    MIL OSI Russia News