

We curate threat intelligence to provide situational awareness and actionable insights
Threat Identifier Detections
Atomic detections that serve as the foundation of our detection framework.
Threat Scenario Detections
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
Reports Hot Off the Forge
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024




All Threat Reports
Vulnerable Containers Targeted in New, Kiss-a-Dog Cryptojacking Campaign
CrowdStrike reveals the Kiss-a-Dog cryptojacking campaign exploiting vulnerable Docker and Kubernetes infrastructure. The campaign uses rootkits and backdoors to gain persistence and mine cryptocurrency, with attackers employing techniques like 'host mount' to escape containers and evade detection.
OldGremlin Ransomware Attack Russian Networks
Group-IB researchers report OldGremlin ransomware targeting Russian organizations with new Linux variants. Known for high ransom demands, OldGremlin uses phishing and tools like PowerSploit and Cobalt Strike. The group's attacks have increased, with targets in various sectors including insurance, logistics, and software development.
Tracking Cyber Espionage Campaigns Against Telecom Companies
Cybereason reveals Chinese-aligned cyber espionage against telecom companies, including Operation DeadRinger and Operation SoftCell. These campaigns compromised sensitive data, impacting business and government figures, and siphoning trade secrets. The stolen data affects R&D investments and gives competitors an edge.
Concerns of Russian Cyberattacks to Norway's Oil & Gas Industry
Amid the Russia-Ukraine war, Norway, supplying 10% of Europe's gas, faces rising threats from Russian cyberattacks. Prime Minister Støre acknowledges the serious threat, prompting increased security measures. Past critiques highlight the need for improved cybersecurity in Norway's petroleum sector.
Iranian Threat Group Dodges Attributions Through False-Flag Personas
The FBI reports Iranian cyber group Emennet Pasargad uses false-flag personas to deflect attribution, targeting Israel and the US in hack-and-leak campaigns. The group exploits vulnerabilities like Log4Shell, broadcasting attacks on social media to undermine confidence and cause reputational damage.
Exploit of VMware Vulnerability for DDoS, Ransomware or Cryptomining
Fortinet researchers report threat actors exploiting VMware vulnerability CVE-2022-22954 to deploy DDoS attacks, ransomware, and cryptominers. Using bash and PowerShell scripts, attackers target Linux and Windows systems, downloading malicious payloads from Cloudflare IPFS gateways. Ransomware uses WinRAR to lock files, demanding payment of 2XMR tokens.

About the Forge & Threat Reports
Our mission is to assess the operational behaviors of all threats to provide the community, and our customers, with actionable information and enterprise-ready detections in order to defend themselves in an ever- changing threat landscape.

Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
Whitepapers

The World's Best SOC Teams Use Anvilogic
Build Detections You Want, Where You Want






.png)