

We curate threat intelligence to provide situational awareness and actionable insights
Threat Identifier Detections
Atomic detections that serve as the foundation of our detection framework.
Threat Scenario Detections
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
Reports Hot Off the Forge
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024




All Threat Reports
Amadey Bot Teams Up With SmokeLoader
ASEC reveals Amadey Bot is distributed by SmokeLoader, masquerading as cracked software. SmokeLoader injects into explorer to download Amadey, which then creates persistence, collects system info, and downloads modules for data theft, tampering with Windows Defender.
Server Attack Leads to LockBit
Symantec reports on LockBit ransomware targeting servers with group policies for distribution. The attack includes anti-forensics checks, privilege escalation, file encryption, and displaying the ransom note via mshta. LockBit accounted for 40% of ransomware attacks in May 2022.
Reviewing The Costa Rica Ransomware Attack
AdvIntel reviews the Conti ransomware attack on Costa Rica's government, revealing it as a smokescreen for shutting down operations. Initial access was obtained via compromised VPN credentials, followed by data exfiltration and ransomware deployment using tools like Cobalt Strike and ZeroLogon, prompting a state of emergency.
Ukraine Attacked by Trickbot Group
IBM Security X-Force reports that the Trickbot group, aligning with Russian state interests, has targeted Ukraine since the invasion. From mid-April to mid-June, Trickbot executed six phishing campaigns against Ukrainian authorities, individuals, and organizations. Malicious payloads, including IcedID and Cobalt Strike, were delivered via Excel and ISO attachments.
Qakbot Attacks Increasing with the Use of New Techniques
Zscaler reports an increase in Qakbot malware distribution, noting new evasion techniques. Threat actors use ZIP extensions, enticing file names, and Excel (XLM) 4.0 macros. Qakbot typically spreads via phishing emails with malicious attachments, using PowerShell or Curl for download, and native binaries for execution and persistence.
Korean-based H0lyGh0st Ransomware Group
The Microsoft Threat Intelligence Center (MSTIC) reports on the H0lyGh0st ransomware group, active since June 2021, targeting small businesses across various countries. H0lyGh0st uses the .h0lyenc extension for encrypted files and employs a double extortion model. MSTIC identifies connections between H0lyGh0st and another North Korean group, PLUTONIUM, but notes differences in targeting and tactics. H0lyGh0st primarily targets small-to-midsized businesses, including manufacturing, banking, and education sectors. Despite their efforts, as of July 2022, no successful ransom payments have been identified.

About the Forge & Threat Reports
Our mission is to assess the operational behaviors of all threats to provide the community, and our customers, with actionable information and enterprise-ready detections in order to defend themselves in an ever- changing threat landscape.

Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
Whitepapers

The World's Best SOC Teams Use Anvilogic
Build Detections You Want, Where You Want






.png)