

We curate threat intelligence to provide situational awareness and actionable insights
Threat Identifier Detections
Atomic detections that serve as the foundation of our detection framework.
Threat Scenario Detections
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
Reports Hot Off the Forge
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024




All Threat Reports
Attacker Had Access to LastPass for Four Days During August Breach
LastPass reports that a threat actor accessed the development environment for four days in August 2022 by compromising a developer's account. Despite this breach, customer data and encrypted vaults were not affected. The company assures strengthened security controls and separation of production and development environments.
Hacker Steals and Sells Customer Data for Singapore Starbucks
On September 10th, 2022, a hacker sold a database containing data of 219,675 Singapore Starbucks customers on BreachForums. The breach exposed personal details but not financial information. Starbucks has notified affected customers and advised them to reset their credentials.
TeamTNT Attacks Honeypots Exposing their Own Credentials
Trend Micro's honeypots revealed TeamTNT's attempts to exploit misconfigured Docker servers, accidentally leaking their own DockerHub credentials. The attackers, identified through accounts "alpineos" and "sandeep078," aimed to perform cryptojacking. Analysis showed three scenarios explaining how the credentials were exposed, including direct login and failure to log out.
Malware Spreading on YouTube Videos Featuring Videogame Tutorials
Kaspersky researchers find RedLine malware in YouTube videogame tutorials. The malware is hidden in downloads masquerading as game cheats and cracks. It steals sensitive user data and uses infected YouTube accounts to propagate further, targeting popular game titles.
Gamaredon APT Targets Ukraine with Infostealer Campaign
Cisco Talos identifies an espionage campaign by Russian threat group Gamaredon targeting Ukrainian entities with a new infostealer malware. The attack begins with phishing emails containing weaponized documents that deploy macros to download and execute malicious scripts, establish persistence, and deploy the custom infostealer.
Asian Government Entities Targeted with Espionage Activity
Symantec reveals espionage campaigns targeting Asian government and state-owned entities, including aerospace, defense, and telecommunications sectors. The attackers, linked to ShadowPad RAT, used DLL side-loading and legitimate software packages to deploy malware and steal information. The campaigns involve long-term infiltration and are attributed to APT41 and Mustang Panda.

About the Forge & Threat Reports
Our mission is to assess the operational behaviors of all threats to provide the community, and our customers, with actionable information and enterprise-ready detections in order to defend themselves in an ever- changing threat landscape.

Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
Whitepapers

The World's Best SOC Teams Use Anvilogic
Build Detections You Want, Where You Want






.png)