BioLine RX Ltd
Change company Symbol lookup
Select an option...
BLRX BioLine RX Ltd
BLPH Bellerophon Therapeutics Inc
BLNK Blink Charging Co
CTXS Citrix Systems Inc
AFHIF Atlas Financial Holdings Inc
RIOCF RioCan Real Estate Investment Trust
OMP Oasis Midstream Partners LP
GMED Globus Medical Inc
TSN Tyson Foods Inc
VOO Vanguard S&P 500 ETF

Health Care : Biotechnology | Small Cap Value
Based in Israel
Company profile

BioLine RX Ltd is an Israel-based clinical-stage biopharmaceutical company focused on oncology. The Company is commited into in-license novel compounds, develop them through clinical stages, and then partner with pharmaceutical companies for further clinical development andcommercialization. The Company is commited into two projects: Motixafortide (BL-8040), which is a cancer therapy platform , and AGI-134, an immunotherapy treatment.

This security is an American depositary receipt
ADR Fees
American Depositary Receipt (ADR) Fee

ADR fees charged by custodial banks normally average from 1 to 3 cents per share. Other country fees might apply. To read more, see the Exception Fees tab at Brokerage Fees


Last Trade
-0.18 (-6.10%)
B/A Size

Market Hours

Closing Price
Day's Change
0.00 (0.00%)
Bid close
Ask close
B/A Size
Day's High
Day's Low

10-day average volume:

Russia assigned more than 1,000 expert engineers to execute SolarWinds hack, says Microsoft exec

4:41 pm ET February 23, 2021 (MarketWatch)

Chris Matthews

The attack was part of a 'multi-decade' campaign, Microsoft's Brad Smith tells senators

A cyberespionage campaign waged by Russian foreign intelligence on U.S. companies and government institutions was of a scale and sophistication never before seen, technology executives told the Senate Select Committee on Intelligence on Tuesday.

"A thousand very skilled, capable engineers worked on this," said Brad Smith, president of Microsoft Corp. (MSFT). "We haven't seen this level of sophistication matched with this kind of scale."

The attack was part of a "multi-decade campaign" on the part of the Russian government to infiltrate American corporations and government agencies, said Kevin Mandia, CEO of cybersecurity firm FireEye (FEYE), that began to spread widely after hackers surreptitiously installed malicious code into an update of SolarWinds Corp. (SWI) software used by thousands of companies and government agencies to administer information technology infrastructure.

Mandia said that the hackers did a "dry run" in October 2019, using innocuous code, to test whether malicious code would spread as widely as it did. The malicious code was launched in March 2020 and not discovered until December, when FireEye detected a breach of its own network and reported it publicly.

There has been some debate over the degree of confidence to which authorities can blame Russia for the attack, after former President Donald Trump said last year that China could be behind the attack, but the witnesses at the hearing said the campaign was likely waged by Russia. "We've seen substantial evidence that points to Russian foreign intelligence and we have no evidence that leads us anywhere else," Smith said.

Ann Neuberger, the Biden administration's deputy national security advisor for cyber and emerging technology, said last week that 18,000 different entities downloaded the malicious software update and that the hackers then chose nine federal agencies and roughly 100 private-sector companies to compromise. Reports indicate that the U.S. Departments of State, Homeland Security, Treasury and Defense were all breached.

The Biden administration is preparing sanctions ( and other measures to punish the Russian government for the SolarWinds attack and other transgressions, the Washington Post reported ( Tuesday, but senators were also eager to learn which new policies could be put in place to help defend against future attacks.

Sen. Mark Warner of Virginia, the Democratic chairman of the intelligence committee, suggested the implementation of a "mandatory reporting system" that would require companies to disclose breaches of their system to the government so that the public and private sector can more quickly respond in concert to threats.

Warner also suggested that broad international cooperation is needed to mitigate the threat of such attacks on countries around the world. "Do we need norms in cyberspace -- that are enforceable -- like we have in other forms of conflict?" he asked. "We don't bomb ambulances in war," he added, suggesting that international norms against subverting software update processes should be fought for.

Witnesses agreed that without effective diplomacy, it will be nearly impossible for U.S. companies to protect themselves from sophisticated foreign actors.

"We're all playing goalie and we're taking slap shots from Wayne Gretzky," FireEye's Mandia said. "The puck's going to get in the net sooner or later. Folks are taking slapshots and literally there are no risks of repercussion for those doing it."

-Chris Matthews; 415-439-6400;


(END) Dow Jones Newswires

February 23, 2021 16:41 ET (21:41 GMT)

Copyright (c) 2021 Dow Jones & Company, Inc.

Earnings Calendar and Events Data provided by |Terms of Use| © 2021 Wall Street Horizon, Inc.

Market data accompanied by is delayed by at least 15 minutes for NASDAQ, NYSE MKT, NYSE, and options. Duration of the delay for other exchanges varies.
Market data and information provided by Morningstar.

Options are not suitable for all investors as the special risks inherent to options trading may expose investors to potentially rapid and substantial losses.
Please read Characteristics and Risks of Standard Options before investing in options.

Information and news provided by ,, , Computrade Systems, Inc., , and

Copyright © 2021. All rights reserved.