Category: Uncategorized

  • Climber delays rope-free skyscraper ascent over rain

    Climber delays rope-free skyscraper ascent over rain


    Getty Images Alex Honnold at Yosemite National Park in CaliforniaGetty Images

    Alex Honnold was the first climber to perform a rope-free ascent of El Capitan in Yosemite National Park

    An American climber has postponed scaling the Taipei 101, one of the world’s tallest buildings, rope-free for another 24 hours due to wet weather.

    Alex Honnold, who scaled El Capitan in California’s Yosemite National Park without a rope in 2017, said on Saturday: “Sadly it’s raining in Taipei right now so I don’t get to go climbing.”

    The skyscraper in Taiwan’s capital measures 508m (1,667ft) and is made of steel, glass and concrete. It contains eight sections, each with a slight overhang designed to resemble joints on a bamboo stick.

    Netflix – which will stream the event – says there will be a delay on the live feed should the worst happen.

    “It’s obviously a conversation that everybody has,” Netflix executive Jeff Gaspin told Variety magazine. “We’ll cut away. We have a 10-second delay. Nobody expects or wants to see anything like that to happen.”

    The climb is now due to take place on Sunday. Announcing the delay, Netflix said: “Safety remains our top priority, and we appreciate your understanding.”

    Taipei 101 has been conquered before. In 2004, France’s Alain Robert, who called himself Spiderman, climbed it in four hours using a safety belt and rope.

    Netflix said there will be three stages to Honnold’s rope-free climb.

    First, there is an initital 113m section of sloping steel and glass followed by the eight “bamboo” boxes before reaching the final stage which includes scaling the spire at the very top of the tower.

    Getty Images People stand under umbrellas at the bottom of Taipei 101 in Taiwan Getty Images

    Taipei 101’s surfaces were deemed too wet for a climb on Saturday

    Honnold, 40, who is married with two children, said it was “a lifelong dream” to scale a skyscraper.

    His historic 2017 ascent of El Capitan without a rope was documented in the film Free Solo, which won an Academy Award.

    An enormous sheer granite rock face of approximately 3,000 feet (915m), El Capitan is a major landmark in Yosemite and entices big-wall rock climbers from all over the world.



    Source link

  • Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware

    Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware


    A new multi-stage phishing campaign has been observed targeting users in Russia with ransomware and a remote access trojan called Amnesia RAT.

    “The attack begins with social engineering lures delivered via business-themed documents crafted to appear routine and benign,” Fortinet FortiGuard Labs researcher Cara Lin said in a technical breakdown published this week. “These documents and accompanying scripts serve as visual distractions, diverting victims to fake tasks or status messages while malicious activity runs silently in the background.”

    The campaign stands out for a couple of reasons. First, it uses multiple public cloud services to distribute different kinds of payloads. While GitHub is mainly used to distribute scripts, binary payloads are staged on Dropbox. This separation complicates takedown efforts, effectively improving resilience.

    Another “defining characteristic” of the campaign, per Fortinet, is the operational abuse of defendnot to disable Microsoft Defender. Defendnot was released last year by a security researcher who goes by the online alias es3n1n as a way to trick the security program into believing another antivirus product has already installed on the Windows host.

    The campaign leverages social engineering to distribute compressed archives, which contain multiple decoy documents and a malicious Windows shortcut (LNK) with Russian-language filenames. The LNK file uses a double extension (“Задание_для_бухгалтера_02отдела.txt.lnk”) to give the impression that it’s a text file.

    When executed, it runs a PowerShell command to retrieve the next-stage PowerShell script hosted on a GitHub repository (“github[.]com/Mafin111/MafinREP111”), which then serves as a first-stage loader to establish a foothold, readies the system to hide evidence of malicious activity, and hands off control flow to subsequent stages.

    “The script first suppresses visible execution by programmatically hiding the PowerShell console window,” Fortinet said. “This removes any immediate visual indicators that a script is running. It then generates a decoy text document in the user’s local application data directory. Once written to disk, the decoy document is automatically opened.”

    Once the document is displayed to the victim to keep up the ruse, the script sends a message to the attacker using the Telegram Bot API, informing the operator that the first stage has been successfully executed. A deliberately-introduced 444 second delay later, the PowerShell script runs a Visual Basic Script (“SCRRC4ryuk.vbe”) hosted at the same repository location.

    This offers two crucial advantages in that it keeps the loader lightweight and allows the threat actors to update or replace the payload’s functionality on the fly without having to introduce any changes to the attack chain itself.

    Cybersecurity

    The Visual Basic Script is highly obfuscated and acts as the controller that assembles the next-stage payload directly in memory, thereby avoiding leaving any artifacts on disk. The final-stage script checks if it’s running with elevated privileges, and, if not, repeatedly displays a User Account Control (UAC) prompt to force the victim to grant it the necessary permissions. The script pauses for 3,000 milliseconds between attempts.

    In the next phase, the malware initiates a series of actions to suppress visibility, neutralize endpoint protection mechanisms, conduct reconnaissance, inhibit recovery, and ultimately deploy the main payloads –

    • Configure Microsoft Defender exclusions to prevent the program from scanning ProgramData, Program Files, Desktop, Downloads, and the system temporary directory
    • Use PowerShell to turn off additional Defender protection components
    • Deploy defendnot to register a fake antivirus product with the Windows Security Center interface and cause Microsoft Defender to disable itself to avoid potential conflicts
    • Conduct environment reconnaissance and surveillance via screenshot capture by means of a dedicated .NET module downloaded from the GitHub repository that takes a screengrab every 30 seconds, save it as a PNG image, and exfiltrates the data using a Telegram bot
    • Disable Windows administrative and diagnostic tools by tampering with the Registry-based policy controls
    • Implement a file association hijacking mechanism such that opening files with certain predefined extensions causes a message to be displayed to the victim, instructing them to contact the threat actor via Telegram

    One of the final payloads deployed after successfully disarming security controls and recovery mechanisms is Amnesia RAT (“svchost.scr”), which is retrieved from Dropbox and is capable of broad data theft and remote control. It’s designed to pilfer information stored in web browsers, cryptocurrency wallets, Discord, Steam, and Telegram, along with system metadata, screenshots, webcam images, microphone audio, clipboard, and active window title.

    “The RAT enables full remote interaction, including process enumeration and termination, shell command execution, arbitrary payload deployment, and execution of additional malware,” Fortinet said. “Exfiltration is primarily performed over HTTPS using Telegram Bot APIs. Larger datasets may be uploaded to third-party file-hosting services such as GoFile, with download links relayed to the attacker via Telegram.”

    In all, Amnesia RAT facilitates credential theft, session hijacking, financial fraud, and real-time data gathering, turning it into a comprehensive tool for account takeover and follow-on attacks.

    The second payload delivered by the script is a ransomware that’s derived from the Hakuna Matata ransomware family and is configured to encrypt documents, archives, images, media, source code, and application assets on the infected endpoint, but not before terminating any process that could interfere with its functioning.

    In addition, the ransomware keeps tabs on clipboard contents and silently modifies cryptocurrency wallet addresses with attacker-controlled wallets to reroute transactions. The infection sequence ends with the script deploying WinLocker to restrict user interaction.

    “This attack chain demonstrates how modern malware campaigns can achieve full system compromise without exploiting software vulnerabilities,” Lin concluded. “By systematically abusing native Windows features, administrative tools, and policy enforcement mechanisms, the attacker disables endpoint defenses before deploying persistent surveillance tooling and destructive payloads.”

    To counter defendnot’s abuse of the Windows Security Center API, Microsoft recommends that users enable Tamper Protection to prevent unauthorized changes to Defender settings and monitor for suspicious API calls or Defender service changes.

    Cybersecurity

    The development comes as human resources, payroll, and internal administrative departments belonging to Russian corporate entities have been targeted by a threat actor UNG0902 to deliver an unknown implant dubbed DUPERUNNER that’s responsible for loading AdaptixC2, a command-and-control (C2) framework. The spear-phishing campaign, codenamed Operation DupeHike, has been ongoing since November 2025.

    Seqrite Labs said the attacks involve the use of decoy documents centered around themes related to employee bonuses and internal financial policies to convince recipients into opening a malicious LNK file within ZIP archives that leads to the execution of DUPERUNNER.

    The implant reaches out to an external server to fetch and display a decoy PDF document, while system profiling and the download of the AdaptixC2 beacon are carried out in the background.

    In recent months, Russian organizations have also been likely targeted by another threat actor tracked as Paper Werewolf (aka GOFFEE), which has employed artificial intelligence (AI)-generated decoys and DLL files compiled as Excel XLL add-ins to deliver a backdoor referred to as EchoGather.

    “Once launched, the backdoor collects system information, communicates with a hardcoded command-and-control (C2) server, and supports command execution and file transfer operations,” Intezer security researcher Nicole Fishbein said. It “communicates with the C2 over HTTP(S) using the WinHTTP API.”



    Source link

  • Trump threatens Canada with 100% tariff over China trade talks

    Trump threatens Canada with 100% tariff over China trade talks


    US President Donald Trump threatened to hit Canada with a 100% tariff on all Canadian goods if the country’s prime minister strikes a trade deal with China.

    “If Canada makes a deal with China, it will immediately be hit with a 100% Tariff against all Canadian goods and products coming into the U.S.A.,” Trump wrote on his social media platform, Truth Social, on Saturday.

    Tensions between Trump and Canadian Prime Minister Mark Carney have escalated in recent days, after Carney gave a speech in Davos, Switzerland, pushing against the world’s great powers.

    He recently met with Chinese President Xi Jinping and announced their countries had reached a trade deal that included electric vehicles.

    At the time, Trump hailed the potential deal as “a good thing”.

    It is unclear if that deal has come into effect, or if Trump was referring to it specifically. The BBC has reached out to the White House, Carney’s office and Canada’s minister responsible for US-Canada trade for comment.

    In his Saturday post, Trump referred to the prime minister as “Governor Carney” and wrote that if “thinks he is going to make Canada a ‘Drop Off Port’ for China to send goods and products into the United States, he is sorely mistaken.”

    Trump did not provide a timeline or more information about the threatened tariff. Last year, when he first threatened new tariffs on the US northern neighbour, Trump began calling Canada the US’s “51st state” with Carney as its “governor”, and suggested he may try to acquire the country entirely.

    While the countries’ relationship had been improving in recent months, Trump’s push to take control of Greenland and his comments about Nato had put him at odds with Canadian and European leaders. Carney did not mention the president by name in his speech at the World Economic Forum in Switzerland this week, but he still angered Trump.

    “Canada lives because of the United States,” Trump said in his own address, which followed Carney’s.



    Source link