
US seeking 'handshake' on rare earths from China, White House aide says
WASHINGTON, June 9 (Reuters) - The three top U.S. trade negotiators are seeking a handshake with China in London talks to seal the agreement on rare earths reached by Presidents Donald Trump and Xi Jinping, White House economic adviser Kevin Hassett said on Monday.
"The purpose of the meeting today is to make sure that they're serious, but to literally get handshakes," Hassett, director of the National Economic Council, told CNBC in an interview.
"I expect it to be a short meeting with a big, strong handshake," Hassett added.
Treasury Secretary Scott Bessent, Commerce Secretary Howard Lutnick and U.S. Trade Representative Jamieson Greer were set to meet with Chinese counterparts in London on Monday to defuse the trade dispute between the two superpowers that has widened in recent weeks to include export controls over goods critical to global supply chains.
Chinese export controls on rare earths was a very significant sticking point, Hassett said.
With China controlling most of the global rare earth and magnet supply, its restrictions on sending those to the U.S. could disrupt production for American companies, including automakers, that rely on those materials, he said.
Asked about the Chinese objection to U.S. curbs on semiconductor exports, Hassett said: "Our expectation is that after the handshake, then immediately after the handshake, any export controls from the U.S. will be eased, and the rare earths will be released in volume, and then we can go back to negotiating smaller matters."
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Reuters
31 minutes ago
- Reuters
Space and defense tech firm Voyager raises $382.8 million in US IPO
June 10 (Reuters) - Voyager Technologies raised $382.8 million in its U.S. initial public offering, the space and defense tech company said on Tuesday, amid a global rush to amp up military spending. The company, which provides mission-critical space and defense technology solutions, along with some investors sold roughly 12.35 million shares at $31 per share, above its marketed range of $26 to $29. The offering is the latest in recent weeks as the U.S. IPO market regained its footing after being restricted by tariff-driven volatility. The Denver, Colorado–based company's IPO comes as President Donald Trump's administration looks to sharply increase spending on defense and space projects. Trump last month selected a design for his $175 billion Golden Dome project, a next-generation U.S. missile defense shield. The stock will trade on the New York Stock Exchange on Wednesday under the symbol "VOYG". Morgan Stanley and J.P. Morgan are the lead underwriters on the listing.


The Independent
39 minutes ago
- The Independent
DragonForce and Scattered Spider: Inside the hacker groups linked to M&S cyberattack
Marks & Spencer has finally reopened its online orders, months after a cyber attack which is set to cost the British high street retailer £300 million in profits this year. This comes as a new hacking group has been connected with the incident, after it was revealed the DragonForce group sent M&S CEO Stuart Machin an email days after it faced a major cyberattack gloating about the hack and demanding ransom payment. The email, seen and reported by the BBC, said: 'We have marched the ways from China all the way to the UK and have mercilessly raped your company and encrypted all the servers.' DragonForce aren't the only group that have been connected with the attack on the retailer, as the Scattered Spider network had previously been named as the enactors of the social engineering attack. According to Sergey Shyekevich, a researcher from cybersecurity company Checkpoint, more hacker groups are forming alliances on the dark web. 'Co-operation between two powerful groups is very interesting,' he says. 'It's one outcome we see on the dark web more and more, alliances between big groups.' Here's all we know about the two hacker groups What is DragonForce? DragonForce is a hacker organisation that offers Ransomware to cyber-criminal affiliates for a 20 per cent cut of any ransoms collected. This means that for a fee, they lease out their malware through dark web marketplaces to cyber-criminals. While the organisation originally started working in 2023, they've had a massive re-marketing of their business model in the past couple of months. 'In the last two months, they started to become very active in one of the biggest dark web forums,' says Sergey, who says they have marketed themselves as a 'Ransomware Cartel', cornering that market on the dark web in the past month. 'They started being more aggressive I think a few weeks before all the attacks in the UK,' he adds. Researchers have claimed they operate out of Malaysia, with some disputing this and saying they are located in Russia. As well as the M&S hack, DragonForce has been linked to the Co-op cyberattack. What is Scattered Spider? Scattered Spider is a community of hackers that targets huge organisations across different sectors using social engineering tactics. 'They're very good at social engineering of different types,' Sergey says, adding that in the past they have used SIM swapping and impersonated IT staff to trick people into letting them use their systems. Believed to be a community of young adults across the US and UK, the group gained notoriety for their involvement in hacking and extorting two of the largest casino and gambling companies in the United States. 'They understand human nature and how big corporations work,' says Sergey. 'They're very successful.' In 2023 they were linked to the hacking and extortion of Caesars Entertainment and MGM Resorts International, which led the former to pay a ransom of approximately £11 million ($15 million). They were able to access a significant number of driver's licence numbers and possibly even Social Security numbers of the casino customers through the ransomware demand. A 17-year-old hacker from the United Kingdom was arrested in connection with the hack and attempted ransom in July 2024. How did the cyberattack happen? M&S first disclosed they had experienced a cyberattack on 22 April, which had disrupted their online operations and even halted contactless payments. Hundreds of agency workers at the company were told not to come into work as the retailer dealt with the fallout of the cyberattack. Customer personal data – which could have included names, email addresses, postal addresses and dates of birth – was also taken by hackers in the attack. M&S revealed last month that the attack was caused by 'human error', as Mr Machin said in an annual figures report in May that the hackers gained access to the company's IT systems through a third party. He said at the time: 'We didn't leave the door open, this wasn't anything to do with under-investment. Everyone is vulnerable. For us, we were unlucky on this particular day through some human error.' Responding to attacks on the retail sector, the NCSC put out advice to the industry and responded to speculation that the Scattered Spider group had used social engineering to target IT help desks and perform password and MFA (multi-factor authentication) resets. 'Criminal activity online – including, but not limited to, ransomware and data extortion – is rampant,' their blog post wrote. 'Attacks like this are becoming more and more common. And all organisations, of all sizes, need to be prepared.' Deputy Director Paul Foster, head of the NCA's National Cyber Crime Unit, said: 'Specialist NCA cybercrime officers are working closely with law enforcement partners to investigate the recent cyber incidents affecting the retail sector. Identifying the criminals responsible and bringing them to justice is a top priority. 'We are considering the incidents individually, but have a range of hypotheses and are mindful they may be linked. 'The impact of these incidents has been significant and businesses will understandably be concerned. I'd encourage all organisations to follow advice on the NCSC's website to ensure they have effective cyber security measures in place to help prevent attacks. 'I'd also urge those that do unfortunately fall victim to an attack to engage with law enforcement as part of the reporting process. The NCA and policing will investigate covertly and discreetly, as well as support the recovery of systems and data.' How much money has M&S lost? The fallout from the cyberattack saw the company lose £650 million of value in a matter of days. M&S said it expected to take an estimated £300 million hit to profits this year, as they predicted disruption to its online business to last into July. What has M&S said in response? As M&S reopened its online operations, they put out a statement which said: 'You can now place online orders with standard delivery to England, Scotland and Wales. Delivery to Northern Ireland will resume in the coming weeks. 'We will resume click and collect, next-day delivery, nominated-day delivery and international ordering in the coming weeks.'


Reuters
41 minutes ago
- Reuters
UK lawyer loses bid to overturn misconduct findings over $3 bln windfall
LONDON, June 10 (Reuters) - A British lawyer who stood to receive up to $3 billion from Nigeria over a collapsed gas project on Tuesday lost a bid to overturn court findings that he acted corruptly out of greed. Seamus Andrew had represented Process & Industrial Developments (P&ID), a little-known British Virgin Islands-based company, in a long-running legal battle with Nigeria that ended in a court victory for Africa's most populous country. Nigeria had been facing a bill for $11 billion, representing around a third of its foreign exchange reserves, after P&ID won an arbitration case over the collapse of a 2010 gas supply deal. But London's High Court in 2023 overturned the damages bill after finding that P&ID had paid bribes in connection with the underlying contract and the resulting arbitration. P&ID had denied paying bribes and accused Nigeria of institutional incompetence. Its application to appeal against the High Court's decision was refused. The court had also found that P&ID's lawyers, including Andrew, received confidential Nigerian documents during the arbitration, which they knew they were not entitled to see, with a judge describing Andrew's conduct as "indefensible." Andrew could have received 20% of all proceeds recovered from Nigeria, up to $3 billion of the $11 billion award, after becoming a director of P&ID and acquiring a stake in the company in 2017 following the end of the arbitration. Andrew applied to the Court of Appeal to overturn the findings against him, arguing that inadequate reasons were given for the criticism and that he was not given proper notice that findings would be made against him. But his application for permission to appeal was refused, with Judge Julian Flaux ruling on Tuesday that Andrew had brought his application too late and that, in any event, the criticism was adequately reasoned, foreseeable and justified. "Overall, the finding that Mr Andrew's conduct was indefensible was plainly correct," Flaux added. Andrew said in a statement: "Although I am disappointed by the outcome of my appeal, I believe that I acted in accordance with my professional duties and I am confident that my position will be vindicated in due course."