

We curate threat intelligence to provide situational awareness and actionable insights
Threat Identifier Detections
Atomic detections that serve as the foundation of our detection framework.
Threat Scenario Detections
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
Reports Hot Off the Forge
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024




All Threat Reports
New Cryptocurrency Schemes Warned by FBI
The FBI alerts the public to the "Pig Butchering" cryptocurrency scam, where scammers impersonate reputable traders to lure victims into investing in fake trading platforms. Victims are misled with false investment growth metrics and are unable to withdraw their funds, losing contact with the fraudsters.
Vice Society Leaks Data from LAUSD
On October 2nd, 2022, Vice Society leaked data from Los Angeles Unified School District (LAUSD) following unmet ransom demands. The breach includes sensitive student information and legal documents. LAUSD advises vigilance against social engineering attacks using the compromised data. Investigations are ongoing with law enforcement and cybersecurity experts.
The US Government Reveals Top Vulnerabilities Exploited by Chinese-state Actors
The NSA, CISA, and FBI identify top vulnerabilities exploited by Chinese-state actors, including Log4Shell and ProxyLogon. The advisory highlights threats to critical infrastructure, IT, and DIB sectors, urging prompt patching, MFA implementation, and robust logging for detection.
APT Group Targets Industrial Base with Impacket
CISA alerts on an APT attack against the defense industrial base, using Impacket tools and compromised credentials. The attackers targeted Exchange servers and deployed CovalentStealer for data exfiltration. The incident spanned from November 2021 to January 2022, with system reconnaissance and unauthorized access via OWA and EWS.
Leveraging Exchange Telemetry in O365 Mailbox Attack
Red Canary reports a payroll diversion fraud campaign targeting O365 mailboxes. Attackers compromise accounts, create forwarding rules, and send fictitious direct deposit requests. The attack sequence occurs within 12 minutes, highlighting the importance of leveraging detection analytics focused on O365 logins and mailbox tampering.
The Newly Rebranded Emperor Dragonfly Strikes
Sygnia researchers discover Emperor Dragonfly, a new threat group formed from Cheerscrypt and Night Sky. The group exploits Log4Shell (CVE-2021-4428), uses Cobalt Strike and Go-based tools, and deploys ransomware. Evidence suggests potential Chinese allegiances, though the group’s full affiliations remain unclear.

About the Forge & Threat Reports
Our mission is to assess the operational behaviors of all threats to provide the community, and our customers, with actionable information and enterprise-ready detections in order to defend themselves in an ever- changing threat landscape.

Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
Whitepapers

The World's Best SOC Teams Use Anvilogic
Build Detections You Want, Where You Want






.png)