

We curate threat intelligence to provide situational awareness and actionable insights
Threat Identifier Detections
Atomic detections that serve as the foundation of our detection framework.
Threat Scenario Detections
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
Reports Hot Off the Forge
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024




All Threat Reports
CERT-UA Prevents Service Disruption to Ukraine News Agency from Russian Threat Actor
CERT-UA foiled a Russian cyberattack on the National News Agency of Ukraine (Ukrinform), preventing operational disruptions. The attack, suspected to involve CaddyWiper malware by the Sandworm group, aimed at undermining Ukrainian media.
PyPI Author 'Lolip0p' Distributes Info-stealing Malware
Fortinet discovers PyPI author 'Lolip0p' distributing info-stealing malware via Python packages 'colorslib,' 'httpslib,' and 'libhttps.' The packages use PowerShell commands to download and run malicious binaries from DropBox, affecting global users.
Malicious Payloads with Batloader Malware in 2022
Trend Micro reports Batloader malware's heightened activity in Q4 2022, distributing threats like Ursnif, Vidar, and Royal ransomware. Batloader uses SEO poisoning and obfuscated JavaScript to evade detection and deliver payloads, affecting global industries.
Sliver C2 Framework Growing Its Base
The Sliver C2 framework, created by Bishop Fox, is gaining traction among threat actors for remote control over compromised systems. With capabilities like UAC bypass, process injection, and credential access, it is used by groups like APT29 and TA551, enhancing their cyber-attack arsenals.
Dark Pink Deploys Custom Malware Against Government & Military Entities
Dark Pink (aka Saaiwc Group) targets government, military, religious, and non-profit organizations in the APAC region and Europe using custom malware. They initiate attacks via job-themed spear-phishing emails, collecting sensitive documents and capturing audio for cyberespionage. Data is exfiltrated to DropBox, Telegram, or email.
Tracking NoName057(16), Another Pro-Russian Group
NoName057(16), a pro-Russian hacktivist group, has actively launched DDoS and web attacks against nations supporting Ukraine. Targeting critical infrastructure, financial institutions, and government agencies, they organize through Telegram and incentivize followers with cryptocurrency. Recently, GitHub deactivated their accounts used for hosting DDoS tools.

About the Forge & Threat Reports
Our mission is to assess the operational behaviors of all threats to provide the community, and our customers, with actionable information and enterprise-ready detections in order to defend themselves in an ever- changing threat landscape.

Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
Whitepapers

The World's Best SOC Teams Use Anvilogic
Build Detections You Want, Where You Want






.png)