

We curate threat intelligence to provide situational awareness and actionable insights
Threat Identifier Detections
Atomic detections that serve as the foundation of our detection framework.
Threat Scenario Detections
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
Reports Hot Off the Forge
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024




All Threat Reports
Concerns of Russian Cyberattacks to Norway's Oil & Gas Industry
Amid the Russia-Ukraine war, Norway, supplying 10% of Europe's gas, faces rising threats from Russian cyberattacks. Prime Minister Støre acknowledges the serious threat, prompting increased security measures. Past critiques highlight the need for improved cybersecurity in Norway's petroleum sector.
Iranian Threat Group Dodges Attributions Through False-Flag Personas
The FBI reports Iranian cyber group Emennet Pasargad uses false-flag personas to deflect attribution, targeting Israel and the US in hack-and-leak campaigns. The group exploits vulnerabilities like Log4Shell, broadcasting attacks on social media to undermine confidence and cause reputational damage.
Exploit of VMware Vulnerability for DDoS, Ransomware or Cryptomining
Fortinet researchers report threat actors exploiting VMware vulnerability CVE-2022-22954 to deploy DDoS attacks, ransomware, and cryptominers. Using bash and PowerShell scripts, attackers target Linux and Windows systems, downloading malicious payloads from Cloudflare IPFS gateways. Ransomware uses WinRAR to lock files, demanding payment of 2XMR tokens.
Connecting Ransom Cartel Ransomware with REvil
Unit42 researchers report potential connections between Ransom Cartel and REvil ransomware, noting similarities in TTPs and encryption code. Ransom Cartel, emerging in December 2021, uses advanced techniques like PrintNightmare for privilege escalation and DonPAPI for credential harvesting, suggesting a revival of REvil's capabilities.
TeamTNT Resurfaces?
Trend Micro researchers uncover potential new activity from TeamTNT, exploiting misconfigured Docker APIs to deploy coinminers. The activity involves using ZGrab network scanner, malicious shell scripts, and deploying XMRIG cryptocurrency miner. The recent actions suggest TeamTNT may still be active or imitated by a copycat group.
Ukraine and Poland Targeted by New 'Prestige' Ransomware
Microsoft's Threat Intelligence Center reports 'Prestige' ransomware targeting organizations in Ukraine and Poland. The DEV-0960 group uses tools like RemoteExec and Impacket's WMIexec for deployment, with techniques including scheduled tasks, PowerShell commands, and group policy. The campaign is distinct from recent destructive attacks in Ukraine.

About the Forge & Threat Reports
Our mission is to assess the operational behaviors of all threats to provide the community, and our customers, with actionable information and enterprise-ready detections in order to defend themselves in an ever- changing threat landscape.

Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
Whitepapers

The World's Best SOC Teams Use Anvilogic
Build Detections You Want, Where You Want






.png)