President Donald Trump said Monday he's in no rush to respond to a coordinated attack that hit Saudi Arabia's oil industry over the weekend.Marketsread more
The price of oil could go sharply higher, depending on the duration of the disruption at Saudi oil facilities and whether there is a military response.Powering the Futureread more
Energy stocks, one of the worst-performing sectors this year, spiked Monday after an attack on Saudi Arabia's heart of oil production Saturday sent oil prices soaring.Marketsread more
The Saudi-led military coalition battling Yemen's Houthi movement said on Monday that the attack on Saudi oil plants was carried out by Iranian weapons and did not originate...Oilread more
After a series of setbacks on the road to an initial public offering, the parent company of real estate start-up WeWork is delaying the move, sources told CNBC Monday.Technologyread more
"The United States military, with our interagency team, is working with our partners to address this unprecedented attack and defend the international rules-based order that...Politicsread more
Crude oil's spike following attacks on Saudi Arabia's energy supply has experts weighing whether or not the gains will last.ETF Edgeread more
"In the old days, the averages would've plunged on this kind of oil shock. I know because I've lived through a bunch of them, starting in 1973," Jim Cramer says.Mad Money with Jim Cramerread more
Traders in the fed funds futures market on Monday were pricing in a 34% chance that the Fed will stay put on rates.The Fedread more
The meeting comes amid months of stalled trade talks between Washington and New Delhi, resulting in both sides taking retaliatory measures.Asia Politicsread more
Gas prices could rise by about 20 cents per gallon "starting tomorrow," oil analyst Andy Lipow says Monday.Oil and Gasread more
The Treasury Department announced sanctions Thursday against several Russian individuals and entities, including a notorious "troll farm," for their roles related to interference in the 2016 presidential campaign.
It is the Trump administration's most public rebuke yet of Russians over election meddling. Lawmakers of both parties had criticized President Donald Trump for not acting swiftly enough to enact sanctions passed by Congress last summer. Trump's critics have accused him of going soft on Russian President Vladimir Putin.
The fresh round of sanctions also includes Russian intelligence services, such as the Federal Security Service, or FSB, and Intelligence Directorate, or GRU.
The actions Thursday mean that "property and interests in property of the designated persons subject to U.S. jurisdiction are blocked, and U.S. persons are generally prohibited from engaging in transactions with them," Treasury said.
Russia's deputy foreign minister said Thursday that Moscow was preparing retaliatory measures against the U.S. over the sanctions.
The sanctions came at an especially fraught time for relations between Russia and western democracies. Wednesday, British Prime Minister Theresa May ordered the expulsion of 23 Russian diplomats in retaliation for a nerve agent attack on a former Russian spy in England. Russia denies it was involved in the March attack, which left former double agent Sergei Skripal and his daughter, Yulia, in critical condition. Trump said Thursday that "it looks like" Russia was involved in the poisoning.
The most prominent person named in the Treasury Department sanctions is Yevgeny Viktorovich Prigozhin, also known as "Putin's chef," who is closely linked to the Russian president. Also named is Internet Research Agency, a so-called "troll farm" based in St. Petersburg, Russia, which Progozhin allegedly controlled.
A grand jury accused them of engaging in an information warfare campaign aimed at tipping the election to Trump. U.S. intelligence agencies, as well, have concluded that Russia interfered in the 2016 presidential campaign using hacking and propaganda, an effort that eventually included efforts to help Trump win.
Trump has repeatedly denied allegations of collusion with the Kremlin.
"Since at least March 2016, Russian government cyber actors have also targeted U.S. government entities and multiple U.S. critical infrastructure sectors, including the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors," the Treasury Department said in announcing the sanctions.
The administration's action also relate to the NotPetya cyberattack, which U.S. and British authorities attributed to the Russian military last month.
A senior national security official, who spoke on the condition of anonymity, told CNBC that the NotPetya attack was the "most destructive cyberattack in our history."
The fresh round of U.S. sanctions comes three days before Russia's presidential vote in which Putin is widely expected to win another six-year stint.
Military and intelligence officials have said that they have yet to receive directives from Trump to combat the online onslaught from Russia.
"I don't believe there is an effective unification across the interagency, with the energy and the focus that we could attain," Army Gen. Curtis Scaparrotti, who is also NATO's Supreme Allied Commander, Europe, told a Senate Armed Services Committee hearing last week.
"Because of today's capabilities and information, where they can use multiple platforms and generate great volume, it can really undermine a nation," added Scaparrotti, who oversees an area of responsibility that includes Russia.
One week prior to Scaparrotti's testimony, U.S. Cyber Command chief Navy Admiral Mike Rogers also said he was not directed by the president to counter Russian cyberoperators.
Rogers, who is also the director of the National Security Agency, added that the U.S. has "not opted to engage" with Moscow's continued interference.
Here is how the Treasury described the individuals and entities who were sanctioned:
E.O. 13694 Sanctions
Today's action includes the designation of three entities and 13 individuals pursuant to E.O. 13694, as amended, which targets malicious cyber actors, including those involved in interfering with election processes or institutions.
The Internet Research Agency LLC (IRA) tampered with, altered, or caused a misappropriation of information with the purpose or effect of interfering with or undermining election processes and institutions. Specifically, the IRA tampered with or altered information in order to interfere with the 2016 U.S. election. The IRA created and managed a vast number of fake online personas that posed as legitimate U.S. persons to include grassroots organizations, interest groups, and a state political party on social media. Through this activity, the IRA posted thousands of ads that reached millions of people online. The IRA also organized and coordinated political rallies during the run-up to the 2016 election, all while hiding its Russian identity. Further, the IRA unlawfully utilized personally identifiable information from U.S. persons to open financial accounts to help fund IRA operations.
Yevgeniy Viktorovich Prigozhin (Prigozhin) provided material assistance to the IRA. Specifically, Prigozhin funded the operations of the IRA. OFAC previously designated Prigozhin under E.O. 13661, "Blocking Property of Additional Persons Contributing to the Situation in Ukraine," on December 20, 2016.
Concord Management and Consulting LLCprovided material assistance to the IRA. Concord Management and Consulting LLC, which is controlled by Prigozhin, provided funding to the IRA. Concord Management and Consulting LLC was previously designated under E.O. 13661 on June 20, 2017.
Concord Catering provided material assistance to the IRA. Concord Catering, which is controlled by Prigozhin, provided funding to the IRA. OFAC previously designated Concord Catering under E.O. 13661 on June 20, 2017.
Dzheykhun Nasimi Ogly Aslanov (Aslanov) acted for or on behalf of and provided material and technological support to the IRA. Aslanov acted as the head of the translator project, a department which focused on the United States and conducted operations on multiple social media platforms. He also oversaw many of the operations that targeted the 2016 U.S. election.
Anna Vladislavovna Bogacheva (Bogacheva) acted for or on behalf of and provided material and technological support to the IRA. Bogacheva worked for the IRA from at least April 2014 to July 2014. She worked on the translator project.
Maria Anatolyevna Bovda (Bovda) acted for or on behalf of and provided material and technological support to the IRA. Bovda worked for the IRA from at least November 2013 to October 2014. She served as the head of the translator project and held other positions within the firm.
Robert Sergeyevich Bovda (Bovda) acted for or on behalf of and provided material and technological support to the IRA. Bovda worked for the IRA from at least November 2013 to October 2014. He served as the deputy head of the translator project and held other positions within the firm.
Mikhail Leonidovich Burchik (Burchik) acted for or on behalf of and provided material and technological support to the IRA. Burchik acted as the executive director of the IRA and held the firm's second-highest ranking position. He was involved in operational planning, infrastructure, and personnel throughout the firm's operations to interfere in the U.S. political system.
Mikhail Ivanovich Bystrov (Bystrov) acted for or on behalf of and provided material and technological support to the IRA. Bystrov acted as the general director of the IRA and served as the head of other entities used by the firm to mask its operations.
Irina Viktorovna Kaverzina (Kaverzina) acted for or on behalf of and provided material and technological support to the IRA. Kaverzina worked for the translator project and operated multiple U.S. personas that she used to post, monitor, and update social media content for the IRA.
Aleksandra Yuryevna Krylova (Krylova) acted for or on behalf of and provided material and technological support to the IRA. Krylova worked for the IRA from at least September 2013 to November 2014, where she served as a director and was the firm's third-highest ranking position.
Vadim Vladimirovich Podkopaev (Podkopaev) acted for or on behalf of and provided material and technological support to the IRA. Podkopaev was responsible for conducting U.S.-focused research and drafting social media content for the IRA.
Sergey Pavlovich Polozov (Polozov) acted for or on behalf of and provided material and technological support to the IRA. Polozov acted as the manager of the IRA's information technology department and oversaw the procurement of U.S. servers and other computer infrastructure that masked the firm's location when conducting operations within the United States.
Gleb Igorevich Vasilchenko (Vasilchenko) acted for or on behalf of and provided material and technological support to the IRA. Vasilchenko worked for the IRA from at least August 2014 to September 2016, and was responsible for controlling social media content and posing as U.S. persons or U.S. grassroots organizations.
Vladimir Venkov (Venkov) acted for or on behalf of and provided material and technological support to the IRA. Venkov worked for the translator project and operated multiple U.S. personas that were used to post, monitor, and update social media content for the IRA.
These entities and individuals are subjects of an indictment announced on February 16, 2018.
Today's action also includes the designation of two entities and six individuals pursuant to section 224 of CAATSA, which targets cyber actors operating on behalf of the Russian government.
Federal Security Service (FSB), a Russian intelligence organization, knowingly engages in significant activities that undermine cybersecurity on behalf of the Russian government. Specifically, the FSB has utilized its cyber tools to target Russian journalists and politicians critical of the Russian government; Russian citizens and government officials; former officials from countries bordering Russia; and U.S. government officials, including cyber security, diplomatic, military, and White House personnel. Additionally, in 2017, the U.S. Department of Justice indicted two FSB officers for their involvement in the 2014 hacking of Yahoo that compromised millions of Yahoo accounts. OFAC previously sanctioned the FSB under E.O. 13694, as amended, on December 28, 2016.
Main Intelligence Directorate (GRU), a Russian military intelligence organization, knowingly engages in significant activities that undermine cybersecurity on behalf of the Russian government. The GRU was directly involved in interfering in the 2016 U.S. election through cyber-enabled activities. The Russian military, of which the GRU is a part, was also directly responsible for the NotPetya cyber-attack in 2017. OFAC previously sanctioned the GRU under E.O. 13694, as amended, on December 28, 2016.
Sergei Afanasyev (Afanasyev) acts for or on behalf of the GRU. As of February 2017, Afanasyev was a senior GRU official.
Vladimir Alexseyev (Alexseyev) acts for or on behalf of the GRU. As of December 2016, Alexseyev was a First Deputy Chief of the GRU. OFAC previously sanctioned Alexseyev under E.O. 13694, as amended, on December 28, 2016.
Sergey Gizunov (Gizunov) acts for or on behalf of the GRU. As of July 2017, Gizunov was the Deputy Chief of the GRU. OFAC previously sanctioned Gizunov under E.O. 13694, as amended, on December 28, 2016.
Igor Korobov (Korobov) acts for or on behalf of the GRU. As of January 2018, Korobov was the Chief of the GRU. OFAC previously sanctioned Korobov under E.O. 13694, as amended, on December 28, 2016.
Igor Kostyukov (Kostyukov) acts for or on behalf of the GRU. As of December 2016, Kostukov was a First Deputy Chief of the GRU. OFAC previously sanctioned Kostyukov under E.O. 13694, as amended, on December 28, 2016.
Grigoriy Molchanov (Molchanov) acts for or on behalf of the GRU. As of April 2016, Molchanov was a senior GRU official.