

We curate threat intelligence to provide situational awareness and actionable insights
Threat Identifier Detections
Atomic detections that serve as the foundation of our detection framework.
Threat Scenario Detections
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
Reports Hot Off the Forge
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024




All Threat Reports
Relentless Phishing from Gamaredon
Gamaredon, a Russian threat group, persistently targets Ukrainian organizations with phishing campaigns. Deploying GammaLoad and GammaSteel malware variants, they aim to steal credentials and exfiltrate data from critical infrastructure, defense, and government sectors. CERT-UA reports at least 70 incidents in 2022.
Law Enforcement Intervenes in Hive Ransomware Operations
An international law enforcement operation led by the US Department of Justice and Europol seized Hive ransomware's Tor payment and data leak sites. The intervention prevented $130 million in ransom payments, provided decryption keys to over 1,300 victims, and disrupted Hive's operations.
Increased Levels of Cyber Threat from Russia and Iran
The U.K. NCSC alerts on increased cyber threats from Russian and Iranian groups targeting defense, education, government, NGOs, and think tanks. Spear-phishing campaigns leverage fake social media personas and event invitations to collect data and compromise email credentials.
Five Data Wipers Had Been Deployed Against Ukrinform
CERT-UA's investigation into the January 17th attack on Ukrinform reveals five data-wiping malware strains: CaddyWiper, ZeroWipe, SDelete, AwfulShred, and BidSwipe. Despite the attempt, Ukrinform's operations were not disrupted. CERT-UA suspects the Russian-state-sponsored group Sandworm orchestrated the attack.
CISA Warns of Refund Scams Using Remote Management Software
CISA warns of refund scams using remote management software like AnyDesk. Cybercriminals gain local user access through phishing emails, impersonating well-known brands. They manipulate bank account summaries to steal funds and potentially sell access to other cybercriminals.
Abuse of Google Ads Leads to Ransomware Attacks
Security researchers reveal threat actors exploiting Google Ads to distribute Royal and CLOP ransomware. Masquerading as popular software utilities, these malicious ads lead to the download of malware like BatLoader, Cobalt Strike, and information stealers. Despite takedown efforts, attackers outpace Google’s removal rate.

About the Forge & Threat Reports
Our mission is to assess the operational behaviors of all threats to provide the community, and our customers, with actionable information and enterprise-ready detections in order to defend themselves in an ever- changing threat landscape.

Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
Whitepapers

The World's Best SOC Teams Use Anvilogic
Build Detections You Want, Where You Want






.png)