Category: Uncategorized

  • Carney denies walking back Davos speech in phone call with Trump

    Carney denies walking back Davos speech in phone call with Trump


    Canadian Prime Minister Mark Carney has told reporters he stands behind his speech in Davos calling out unconstrained super powers, after a Trump official said he had “aggressively” walked it back in a call with US President Donald Trump.

    “To be absolutely clear, and I said this to the president, I meant what I said in Davos,” Carney said on Tuesday, confirming he and Trump had spoken by phone.

    US Treasury Secretary Scott Bessent had told Fox News on Monday that Carney was “very aggressively walking back” some of the remarks to Trump.

    Carney made global headlines for his Davos speech, in which he indirectly called out the US president for a “rupture” in the postwar world order.

    Trump responded in his own Davos speech the following day by saying that “Canada lives because of the United States”.

    Speaking to reporters in Ottawa on Tuesday, Carney denied Bessent’s recollection of the phone call.

    He added that it was the US president who had called him on Monday, and that the two had a “very good conversation on a wide range of subjects”, including Ukraine, Venezuela, Arctic security and Canada’s recent trade agreement with China.

    Carney said the two also discussed the USMCA, a free-trade pact between Canada, the US and Mexico that is up for a mandatory review later this year.

    Carney said his speech in Davos clearly outlined how “Canada was the first country to understand the change in US trade policy that (Trump) had initiated, and we’re responding to that”.

    He added that the president understood Canada’s position.

    In the Fox News interview on Monday, Bessent criticised Canada’s decision to negotiate a trade deal with China. He added that he was “not sure what the Prime Minister was thinking” when he made his speech in Davos.

    “Canada depends on the US,” Bessent said. “There’s much more north-south trade then there could ever be east-west trade.”

    “The prime minister should do what’s best for the Canadian people rather than try to push his globalist agenda,” the treasury secretary added.

    His remarks came after Trump threatened Canada with 100% tariffs on its goods if it allows Chinese goods to flow freely to the US, skirting levies.

    The deal between Ottawa and Beijing would lower levies on Canadian canola oil from 85% to 15% by March, while Canada will tax a limited number of Chinese electric vehicles, or EVs, at the most-favoured-nation rate, 6.1% – down from 100%.

    Carney said that Canada is not pursuing a free-trade deal with China and has “never” considered it.

    Speaking to reporters on Monday, Carney added that he believed Trump’s latest tariff threat is a negotiation tactic ahead of talks on USMCA.

    “The president is a strong negotiator, and I think some of these comments and positioning should be viewed in the broader context of that,” he said.



    Source link

  • ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services

    ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services


    Cybersecurity researchers have disclosed details of a new campaign that combines ClickFix-style fake CAPTCHAs with a signed Microsoft Application Virtualization (App-V) script to distribute an information stealer called Amatera.

    “Instead of launching PowerShell directly, the attacker uses this script to control how execution begins and to avoid more common, easily recognized execution paths,” Blackpoint researchers Jack Patrick and Sam Decker said in a report published last week.

    In doing so, the idea is to transform the App-V script into a living-off-the-land (LotL) binary that proxies the execution of PowerShell through a trusted Microsoft component to conceal the malicious activity.

    The starting point of the attack is a fake CAPTCHA verification prompt that seeks to trick users into pasting and executing a malicious command on the Windows Run dialog. But here is where the attack diverges from traditional ClickFix attacks.

    The supplied command, rather than invoking PowerShell directly, abuses “SyncAppvPublishingServer.vbs,” a signed Visual Basic Script associated with App-V to retrieve and execute an in-memory loader from an external server using “wscript.exe.”

    It’s worth noting that the misuse of “SyncAppvPublishingServer.vbs” is not new. In 2022, two different threat actors from China and North Korea, tracked as DarkHotel and BlueNoroff, were observed leveraging the LOLBin exploit to stealthily execute a PowerShell script. But this is the first time it has been observed in ClickFix attacks.

    “Adversaries may abuse SyncAppvPublishingServer.vbs to bypass PowerShell execution restrictions and evade defensive counter measures by ‘living off the land,’” MITRE notes in its ATT&CK framework. “Proxying execution may function as a trusted/signed alternative to directly invoking ‘powershell.exe.’”

    The use of an App-V script is also significant as the virtualization solution is built only into Enterprise and Education editions of Windows 10 and Windows 11, along with modern Windows Server versions. It’s not available for Windows Home or Pro installations.

    In Windows operating systems where App-V is either absent or not enabled, the execution of the command fails outright. This also indicates that enterprise managed systems are likely the primary targets of the campaign.

    The obfuscated loader runs checks to ensure that it’s not run within sandboxed environments, and then proceeds to fetch configuration data from a public Google Calendar (ICS) file, essentially turning a trusted third-party service into a dead drop resolver.

    Cybersecurity

    “By externalizing configuration in this way, the actor can rapidly rotate infrastructure or adjust delivery parameters without redeploying earlier stages of the chain, reducing operational friction and extending the lifespan of the initial infection vector,” the researchers pointed out.

    Parsing the calendar event file leads to the retrieval of additional loader stages, including a PowerShell script that functions as an intermediate loader to execute the next stage, another PowerShell script, directly in memory. This step, in turn, results in the retrieval of a PNG image from domains like “gcdnb.pbrd[.]co” and “iili[.]io” via WinINet APIs that conceals an encrypted and compressed PowerShell payload.

    The resulting script is decrypted, GZip decompressed in memory, and run using Invoke-Expression, ultimately culminating in the execution of a shellcode loader that’s designed to launch Amatera Stealer.

    “What makes this campaign interesting isn’t any single trick, but how carefully thought-out everything is when chained together,” Blackpoint concluded. “Each stage reinforces the last, from requiring manual user interaction, to validating clipboard state, to pulling live configuration from a trusted third-party service.”

    “The result is an execution flow that only progresses when it unfolds (almost) exactly as the attacker expects, which makes both automated detonation and casual analysis significantly harder.”

    The Evolution of ClickFix: JackFix, CrashFix, and GlitchFix

    The disclosure comes as ClickFix has become one of the most widely used initial access methods in the last year, accounting for 47% of the attacks observed by Microsoft.

    Recent ClickFix campaigns have targeted social media content creators by claiming they are eligible for free verified badges, instructing them via videos to copy authentication tokens from their browser cookies into a fake form to complete the supposed verification process. The embedded video also informs the user to “not log out for at least 24 hours” to keep the authentication tokens valid.

    The campaign, active since at least September 2025, is estimated to have used 115 web pages across the attack chain and eight exfiltration endpoints, per Hunt.io. The main targets of the activity include creators, monetized pages, and businesses seeking verification, with the end goal being to facilitate account takeover following token theft.

    “Defending against the ClickFix technique is uniquely challenging because the attack chain is built almost entirely on legitimate user actions and the abuse of trusted system tools,” Martin Zugec, technical solutions director at Bitdefender, said in a report last month. “Unlike traditional malware, ClickFix turns the user into the initial access vector, making the attack look benign from an endpoint defense perspective.”

    ClickFix is also constantly evolving, utilizing variants like JackFix and CrashFix to deceive the victim into infecting their own machines. While operators use several methods to attempt to convince a target to perform command execution, the growing popularity of the social engineering technique has paved the way for ClickFix builders that are advertised on hacker forums for anywhere between $200 to $1,500 per month.

    The latest entrant to this threat landscape is ErrTraffic, a traffic distribution system (TDS) that’s specifically designed for ClickFix-like campaigns by causing compromised websites injected with malicious JavaScript to glitch and then suggesting a fix to address the non-existent problem. This technique has been codenamed GlitchFix.

    The malware-as-a-service (MaaS) supports three different file distribution modes that involve using fake browser update alerts, fake “system font required” dialogs, and bogus missing system font errors to trigger the execution of malicious commands. ErrTraffic is explicitly blocked from running on machines located in the Commonwealth of Independent States (CIS) countries.

    “ErrTraffic doesn’t just show a fake update prompt, it actively corrupts the underlying page to make victims believe something is genuinely wrong,” Censys said. “It also applies CSS transformations that make everything look broken.”

    ClickFix has also been adopted by threat actors behind the ClearFake campaign, which is known to infect sites with fake web browser update decoys on compromised WordPress to distribute malware. ClearFake’s use of ClickFix was first recorded in May 2024, leveraging CAPTCHA challenges for delivering Emmenhtal Loader (aka PEAKLIGHT), which then drops Lumma Stealer.

    The attack chain also makes use of another known technique referred to as EtherHiding to retrieve the next-stage JavaScript code using smart contracts on Binance’s BNB Smart Chain (BSC) and eventually inject the ClickFix fake CAPTCHA obtained from a different smart contract into the web page. At the same time, the final stage avoids re-infecting already infected victims.

    Cybersecurity

    Like in the case of the Amatera Stealer attack, the ClickFix command copied to the clipboard abuses “SyncAppvPublishingServer.vbs” to obtain the final payload hosted on the jsDelivr content delivery network (CDN). Expel’s analysis of the ClearFake campaign shows that as many as 147,521 systems have likely been infected since late August 2025.

    “One of many factors security products use to decide if behavior is malicious or not is whether said behavior is being performed by a trusted application,” security researcher Marcus Hutchins said. “In this case, ‘SyncAppvPublishingServer.vbs’ is a default Windows component, and the file can only be modified by TrustedInstaller (a highly privileged system account used internally by the operating system). Therefore, the file and its behavior alone would not normally be suspect.”

    “Organizations and EDR are unlikely to outright block ‘SyncAppvPublishingServer.vbs’ from launching PowerShell in hidden mode, as it would prevent the component from being used for its intended purpose. Consequently, by abusing the command line injection bug in ‘SyncAppvPublishingServer.vbs,’ attackers can execute arbitrary code via a trusted system component.”

    Expel also characterized the campaign as highly sophisticated and very evasive, owing to the use of in-memory PowerShell code execution, coupled with its reliance on blockchain and popular CDNs, thus ensuring that it does not communicate with any infrastructure that’s not a legitimate service.

    Censys has described the broader fake CAPTCHA ecosystem as a “fragmented, fast-changing abuse pattern that uses trusted web infrastructure as the delivery surface,” wherein Cloudflare-style challenges act as a conduit for clipboard-driven execution of PowerShell commands, VB Scripts, MSI installers, and even hand-offs to browser-native frameworks like Matrix Push C2.

    “This aligns with a broader shift toward Living Off the Web: systematic reuse of security-themed interfaces, platform-sanctioned workflows, and conditioned user behavior to deliver malware,” the attack surface management firm said. “Attackers do not need to compromise trusted services; they inherit trust by operating inside familiar verification and browser workflows that users and tooling are trained to accept.”



    Source link

  • Rwanda takes legal action against UK over axed migrant deal

    Rwanda takes legal action against UK over axed migrant deal


    The Rwandan government has launched legal action against the UK to seek payments it claims it is owed under a scrapped migrant deal between the two countries.

    Rwanda has filed a case with the Netherlands-based Permanent Court of Arbitration, arguing the UK has failed to honour commitments made in a deal to send some asylum seekers to the African nation.

    Under the deal, which was signed by the previous Conservative government, the UK agreed to make payments to Rwanda to host asylum seekers and support its economy.

    But after Prime Minister Sir Keir Starmer axed the deal in 2024, the Home Office said £220m in “scheduled future payments will not have to be paid” to Rwanda.

    The BBC has asked the Home Office for comment.

    The prime minister’s spokesman said the government would “robustly defend our position to protect British taxpayers”.

    “The Rwanda scheme was a complete disaster,” the spokesman told reporters. “It wasted £700m of taxpayer cash to return just four volunteers.”

    The Rwandan government has not responded to the BBC’s requests for comment. But the country’s ministry of foreign affairs pointed us towards an article about the arbitration proceedings in the New Times, a Rwandan newspaper.

    The article says the arbitration “concerns the performance of specific commitments under the treaty”.

    The previous Conservative government spent some £700m on the Rwanda policy, which was intended to deter migrants from crossing the English Channel in small boats.

    Only four volunteers arrived in Rwanda when the deal was in force and Sir Keir said the plan was “dead and buried”, shortly after Labour won the 2024 general election.

    The deal included a break clause, which said “each party may terminate this agreement by giving notice to the other party in writing”.

    The £700m included £290m of payments to Rwanda.

    In December 2024, the Home Office said a further £100m of payments would have been due under the treaty, £50m each of the 2025-26 and 2026-27 financial years.

    In addition, the Home Office agreed to pay £120m upon the transfer of 300 people to Rwanda.

    The New Times article quotes a government adviser as saying Rwanda had “engaged in diplomatic exchanges before initiating arbitration”.

    Michael Butera, chief technical adviser to Rwanda’s minister of justice, told the newspaper: “Through arbitration, Rwanda seeks a legal determination of the parties’ respective rights and obligations under the treaty, in accordance with international law.”

    In the treaty signed by Rwanda and the UK, both countries agreed any dispute that could not be settled among themselves would be referred to the Permanent Court of Arbitration (PCA).

    The PCA, which is headquartered in The Hague, Netherlands, is a forum for resolving international disputes between states.

    It is a process that is similar to arbitration that companies regularly agree to as an alternative to potentially damaging and lengthy court battles.

    The PCA has the power to issue binding, final rulings if disputes cannot be settled by the countries involved.

    Rwanda began the arbitration proceedings under the asylum partnership agreement in November, according to the PCA’s website, which lists the case’s status as pending.

    The PCA has not yet indicated how and when the complaint from Rwanda will be handled.

    The arbitration body typically sets a timetable with the parties specifying when they need to present their arguments – and the cases can take years to resolve.

    Conservative shadow home secretary Chris Philp said the legal action was “yet another catastrophic consequence of Labour’s decision to scrap the Rwanda scheme before it even started”.

    “This legal action means the British taxpayer is now facing a huge bill for Labour’s weakness and incompetence,” Philp said.

    He said Labour was “too weak to see this crucial policy through, and it’s the British taxpayer who is left to pay the price”.

    The UK government previously said it was looking at what money could be recouped after scrapping the scheme.

    But the Rwandan government has said it is under “no obligation” to refund any money.



    Source link