

We curate threat intelligence to provide situational awareness and actionable insights
Threat Identifier Detections
Atomic detections that serve as the foundation of our detection framework.
Threat Scenario Detections
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
Reports Hot Off the Forge
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024




All Threat Reports
Red Canary: October 2022 Intelligence Insights
Red Canary's October 2022 intelligence update shows Qakbot malware at number one, with Mimikatz surging to third place. Top threats also include Impacket, Bloodhound, and Raspberry Robin. The report highlights Qakbot's fluctuating activity levels and the use of LOLBins, regsvr32, and rundll32 for network connections.
APT37 Drops New Dolphin Malware
ESET researchers identify Dolphin, a new malware backdoor used by North Korean APT37, targeting South Korean government, military, and media entities. Dolphin's capabilities include data collection, credential extraction, and screenshot capture. It uses Python for persistence and communicates through Google Drive, evolving with new features since April 2021.
US Agencies Release Updates for Cuba Ransomware
CISA and FBI issue updates on Cuba ransomware, a group that has compromised over 100 organizations globally, collecting $60 million in ransoms. Targeting sectors like critical infrastructure, financial, and healthcare, Cuba ransomware operators use Hancitor malware and vulnerabilities like ZeroLogon for attacks. The group isn't linked to the Republic of Cuba.
Data Extortion Group Levels Up with their Own Ransomware
Donut Leaks, a data extortion group active since August 2022, now uses its own ransomware for double-extortion campaigns. They have targeted global organizations, including DESFA and Sheppard Robson. Their ransom notes feature creative ASCII art and command prompt graphics, showcasing their flair for theatrics.
DDoS Strikes European Parliament Site
'Anonymous Russia,' a pro-Russian hacktivist group, initiated a DDoS attack on the European Parliament website, causing an outage and displaying a "Secure Connection Failed" error. This attack follows the EU's designation of Russia as a state sponsor of terrorism. Killnet, another pro-Kremlin group, is also active in DDoS and ransomware attacks.
Growing Cyber Threats in Ukraine with New Ransomware Strain, RansomBoggs
ESET researchers discover RansomBoggs, a new ransomware strain targeting Ukrainian organizations, attributed to the Russian Sandworm group. The malware, written in .NET, uses PowerShell scripts for deployment, resembling past Sandworm tactics. References to Monsters Inc and ties to Prestige ransomware highlight Sandworm's ongoing cyber activities.

About the Forge & Threat Reports
Our mission is to assess the operational behaviors of all threats to provide the community, and our customers, with actionable information and enterprise-ready detections in order to defend themselves in an ever- changing threat landscape.

Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
Whitepapers

The World's Best SOC Teams Use Anvilogic
Build Detections You Want, Where You Want






.png)