

We curate threat intelligence to provide situational awareness and actionable insights
Threat Identifier Detections
Atomic detections that serve as the foundation of our detection framework.
Threat Scenario Detections
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
Reports Hot Off the Forge
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024




All Threat Reports
Ukraine Attacked by Trickbot Group
IBM Security X-Force reports that the Trickbot group, aligning with Russian state interests, has targeted Ukraine since the invasion. From mid-April to mid-June, Trickbot executed six phishing campaigns against Ukrainian authorities, individuals, and organizations. Malicious payloads, including IcedID and Cobalt Strike, were delivered via Excel and ISO attachments.
Qakbot Attacks Increasing with the Use of New Techniques
Zscaler reports an increase in Qakbot malware distribution, noting new evasion techniques. Threat actors use ZIP extensions, enticing file names, and Excel (XLM) 4.0 macros. Qakbot typically spreads via phishing emails with malicious attachments, using PowerShell or Curl for download, and native binaries for execution and persistence.
Korean-based H0lyGh0st Ransomware Group
The Microsoft Threat Intelligence Center (MSTIC) reports on the H0lyGh0st ransomware group, active since June 2021, targeting small businesses across various countries. H0lyGh0st uses the .h0lyenc extension for encrypted files and employs a double extortion model. MSTIC identifies connections between H0lyGh0st and another North Korean group, PLUTONIUM, but notes differences in targeting and tactics. H0lyGh0st primarily targets small-to-midsized businesses, including manufacturing, banking, and education sectors. Despite their efforts, as of July 2022, no successful ransom payments have been identified.
APT Targeting of Journalists and Media
Proofpoint's research highlights state-sponsored APT groups targeting journalists to access sensitive information and spread disinformation. Groups from China, North Korea, Iran, and Turkey use tactics like web beacons, credential harvesting, and malware to manipulate public perception and influence geopolitical events.
Vice Society Ransomware Group
SEKOIA tracks the Vice Society ransomware group, which has compromised 88 victims from its inception to mid-June 2022. The group primarily targets academic institutions and healthcare sectors, using common pentester skills and public vulnerabilities like PrintNightmare. Vice Society employs HelloKitty ransomware for Linux and Zeppelin ransomware for Windows targets.
Bandai Namco Confirms A Cyberattack
Bandai Namco has confirmed a cyberattack that occurred on July 3, 2022, currently under investigation. The attack may have compromised customer information related to the Toys and Hobby Business in Asia (excluding Japan). While the company investigates the scope and cause of the damage, reports from vx-underground suggest ALPHV/BlackCat as the ransomware gang behind the attack.

About the Forge & Threat Reports
Our mission is to assess the operational behaviors of all threats to provide the community, and our customers, with actionable information and enterprise-ready detections in order to defend themselves in an ever- changing threat landscape.

Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
Whitepapers

The World's Best SOC Teams Use Anvilogic
Build Detections You Want, Where You Want






.png)