

We curate threat intelligence to provide situational awareness and actionable insights
Threat Identifier Detections
Atomic detections that serve as the foundation of our detection framework.
Threat Scenario Detections
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
Reports Hot Off the Forge
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024




All Threat Reports
Lazarus Group Hacks Cryptocurrency Firm
Lazarus Group hacked an unnamed cryptocurrency firm, stealing hundreds of thousands in clients' crypto funds. Using phishing emails and custom tools, they breached the network, harvested credentials, and moved laterally. Despite initial removal efforts, they returned via an unprotected host to complete multiple crypto transfers.
Lazarus Lures Victims with Coinbase Job Themes
Lazarus Group's new phishing campaign targets job seekers with fake Coinbase job offers. Victims receive an executable file disguised as a PDF when downloading job descriptions. The campaign uses GitHub for command and control and has similarities with past Lazarus operations targeting major companies.
Gwisin Ransomware Targeting Korean Entities
ASEC has identified Gwisin ransomware targeting Korean organizations. The malware uses MSI Installers and requires a specific value to execute. It evades detection by injecting its DLL into Windows processes. Gwisin's unique characteristics include tailored ransom notes per organization and the ability to encrypt files in safe mode.
Russian Organizations Targeted by Woody RAT
Malwarebytes identified Woody RAT targeting Russian organizations, including a major aerospace and defense entity. Distributed through phishing emails and exploiting the Follina vulnerability, this remote access trojan captures host data, executes commands, and uploads files. While attribution remains uncertain, speculation points to threat actors from China and North Korea.
Popular Crypto Wallet Used to Spread Mars Stealer Malware
A fake Atomic Wallet website is spreading Mars Stealer malware. Discovered by researcher Dee (@ViriBack), the site uses Atomic Wallet branding to deceive users. Victims are targeted through malvertising, spam, and SEO poisoning. The malware hides within a zip file and modifies Windows Defender to exfiltrate host information.
Initial Access Broker Using Bumblebee Malware
Palo Alto Unit42 reports Exotic Lily using Bumblebee malware for initial access. Active since February 2022, Bumblebee has replaced Bazarloader and is deployed via spear phishing to deliver Cobalt Strike beacons. The malware is linked to ransomware groups Conti and Quantum.

About the Forge & Threat Reports
Our mission is to assess the operational behaviors of all threats to provide the community, and our customers, with actionable information and enterprise-ready detections in order to defend themselves in an ever- changing threat landscape.

Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
Whitepapers

The World's Best SOC Teams Use Anvilogic
Build Detections You Want, Where You Want






.png)