Trump Says US Won’t Kill Iran’s Supreme Leader, ‘At Least Not for Now'

US President Donald Trump speaks to reporters about the G7 Summit aboard Air Force One while travelling back to Washington from Canada on June 16, 2025. (AFP)
US President Donald Trump speaks to reporters about the G7 Summit aboard Air Force One while travelling back to Washington from Canada on June 16, 2025. (AFP)
TT
20

Trump Says US Won’t Kill Iran’s Supreme Leader, ‘At Least Not for Now'

US President Donald Trump speaks to reporters about the G7 Summit aboard Air Force One while travelling back to Washington from Canada on June 16, 2025. (AFP)
US President Donald Trump speaks to reporters about the G7 Summit aboard Air Force One while travelling back to Washington from Canada on June 16, 2025. (AFP)

President Donald Trump said on Tuesday the US knew exactly where Iran's Supreme Leader Ali Khamenei was "hiding", that he was an easy target but would not be killed, at least for now. 

"We know exactly where the so-called ‘Supreme Leader’ is hiding. He is an easy target, but is safe there - We are not going to take him out (kill!), at least not for now," Trump said in a post on Truth Social. 

"But we don't want missiles shot at civilians, or American soldiers. Our patience is wearing thin," Trump said. 

Earlier on Tuesday, Trump said he was aiming for a "real end" to the conflict between arch-rivals Israel and Iran, and not just a ceasefire.   

"Iran cannot have a nuclear weapon, it’s very simple," he told reporters on Air Force One during his overnight flight back to Washington from a G7 summit in Canada.   

He accused Iranian leaders of being unwilling to reach an agreement over their nuclear program, and suggested he was now less interested in talking with them.   

"They should have done the deal. I told them, do the deal," he said. "So, I don’t know. I’m not too much in the mood to negotiate."   

The Republican president, who said he plans to meet with advisers in the Situation Room, appears to be gradually building the public case for a more direct American role in the conflict.   

His shift in tone comes as the US has repositioned warships and military aircraft in the region to respond if the conflict between Israel and Iran further escalates.   

The president said he was looking for "an end, a real end, not a ceasefire," adding that he wanted a "complete give-up" by Iran.   

Trump predicted that Israel would not be slowing its attacks on Iran. "You're going to find out over the next two days. You're going to find out. Nobody's slowed up so far," the CBS journalist quoted Trump as saying on Air Force One.  

Trump said "I may", on the prospect of sending US Middle East Envoy Steve Witkoff or Vice President JD Vance to meet with Iran.  

However, he added that "it depends what happens when I get back", according to the CBS reporter. 



Global Hack on Microsoft Hits US State Agencies

The Microsoft logo seen at the Hannover Messe industrial trade fair on March 31, 2025, in Hanover, Germany (Reuters) 
The Microsoft logo seen at the Hannover Messe industrial trade fair on March 31, 2025, in Hanover, Germany (Reuters) 
TT
20

Global Hack on Microsoft Hits US State Agencies

The Microsoft logo seen at the Hannover Messe industrial trade fair on March 31, 2025, in Hanover, Germany (Reuters) 
The Microsoft logo seen at the Hannover Messe industrial trade fair on March 31, 2025, in Hanover, Germany (Reuters) 

Hackers exploited a major security flaw in widely used Microsoft server software to launch a global attack on government agencies and businesses in the past few days, breaching US federal and state agencies, universities, energy companies and an Asian telecommunications company, according to state officials and private researchers.

Microsoft on Saturday issued an alert about “active attacks” on self-hosted SharePoint servers, which are widely used by organizations to share documents and collaborate within organizations. SharePoint instances run off of Microsoft servers were unaffected.

The FBI said on Sunday it was aware of the attacks and was working closely with its federal and private-sector partners, but offered no other details.

The “zero-day” attack, so called because it targeted a previously unknown vulnerability, is only the latest cybersecurity embarrassment for Microsoft.

Last year, the company was faulted by a panel of US government and industry experts for lapses that enabled a 2023 targeted Chinese hack of US government emails, including those of then-Commerce Secretary Gina Raimondo.

This most recent attack compromises only those servers housed within an organization — not those in the cloud, such as Microsoft 365, officials said.

After first suggesting that users make modifications to or simply unplug SharePoint server programs from the internet, the company on Sunday evening released a patch for one version of the software.

Two other versions remain vulnerable and Microsoft said it is continuing to work to develop a patch.

Microsoft updated its guidance Sunday with instructions to fix the problem for SharePoint Server 2019 and SharePoint Server Subscription Edition. Engineers were still working on a fix for the older SharePoint Server 2016 software.

“Anybody who’s got a hosted SharePoint server has got a problem,” said Adam Meyers, senior vice president with CrowdStrike, a cybersecurity firm. “It’s a significant vulnerability.”

Pete Renals, a senior manager with Palo Alto Networks’ Unit 42 said, “We are seeing attempts to exploit thousands of SharePoint servers globally before a patch is available. We have identified dozens of compromised organizations spanning both commercial and government sectors.’’

With access to these servers, which often connect to Outlook email, Teams and other core services, a breach can lead to theft of sensitive data as well as password harvesting, Netherlands-based research company Eye Security noted, according to The Washington Post.

What’s also alarming, researchers said, is that the hackers have gained access to keys that may allow them to regain entry even after a system is patched.

“So pushing out a patch on Monday or Tuesday doesn’t help anybody who’s been compromised in the past 72 hours,” said one researcher, who spoke on the condition of anonymity because a federal investigation is ongoing.

It was not immediately clear who is behind the hacking of global reach or what its ultimate goal is.

One private research company found the hackers targeting servers in China as well as a state legislature in the eastern United States. Eye Security said it has tracked more than 50 breaches, including at an energy company in a large state and several European government agencies.

Others that were breached included a government agency in Spain, a local agency in Albuquerque and a university in Brazil, security researchers said.

One state official in the eastern US said the attackers had “hijacked” a repository of documents provided to the public to help residents understand how their government works. The agency involved can no longer access the material, but it wasn’t clear whether it was deleted.

Some security companies said they had not seen deletions in the SharePoint attacks, only the theft of cryptographic keys that would allow the hackers to reenter the servers.

CISA spokesperson Marci McCarthy said the agency was alerted to the issue Friday by a cyber research firm and immediately contacted Microsoft.

Microsoft has been faulted in the past for issuing fixes that are too narrowly designed and leave similar avenues open to attack.