

We curate threat intelligence to provide situational awareness and actionable insights
Threat Identifier Detections
Atomic detections that serve as the foundation of our detection framework.
Threat Scenario Detections
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
Reports Hot Off the Forge
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024




All Threat Reports
Microsoft Attributes Prestige Ransomware to a Russian Threat Actor
Microsoft attributes the Prestige ransomware attacks on Ukraine and Poland to Russian threat actor IRIDIUM, linked to the GRU's Sandworm. Targeting humanitarian and military programs, IRIDIUM uses tools like RemoteExec and Impacket WMIexec in post-exploitation. The campaign highlights unique enterprise-wide ransomware deployment in Ukraine.
SocGholish Drops JavaScript File from Compromised News Sites
Proofpoint and BleepingComputer report SocGholish distributing malware through compromised news sites, injecting malicious JavaScript into assets accessed by over 250 regional and national outlets. The attack, tracked to TA569, uses fake browser updates to deliver its payload, impacting major markets like New York, Chicago, and Miami.
Unraveling the Yanluowang Ransomware Group from Chat Leaks
Leaked chat logs analyzed by KELA reveal the inner workings of the Yanluowang ransomware group, suggesting ties to former REvil members. Discussions show active development of an ESXi version of their malware. This marks the second significant ransomware group data leak of 2022, following the Conti leak.
The Severity of Cyberattacks Elevated for Latvia
Latvia experiences a 30% rise in cyberattacks linked to its support for Ukraine during the Russia-Ukraine war. Key targets include government, critical infrastructure, and private businesses, with hacktivist group Killnet leading the assaults, primarily through DDoS attacks, though often missing intended targets.
APT36 Impersonates MFA Software to Infect the Indian Government
Zscaler reports APT36's (Transparent Tribe) campaign against the Indian government, using malvertising to distribute backdoored MFA software. The group registers fake domains mimicking official download portals to deploy a python downloader, backdoors, and data exfiltration tools, targeting users running in India's time zone for espionage purposes.
The Threat of IcedID Still Looming
Elastic researchers report that the IcedID banking trojan's infrastructure is still active. Initially targeting financial institutions, IcedID now delivers complex payloads like Cobalt Strike. Using obfuscation techniques with zip files and ISO images, IcedID establishes persistence and enables credential stealing, command execution, and data collection.

About the Forge & Threat Reports
Our mission is to assess the operational behaviors of all threats to provide the community, and our customers, with actionable information and enterprise-ready detections in order to defend themselves in an ever- changing threat landscape.

Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
Whitepapers

The World's Best SOC Teams Use Anvilogic
Build Detections You Want, Where You Want






.png)