

We curate threat intelligence to provide situational awareness and actionable insights
Threat Identifier Detections
Atomic detections that serve as the foundation of our detection framework.
Threat Scenario Detections
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
Reports Hot Off the Forge
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024




All Threat Reports
APT Targeting of Journalists and Media
Proofpoint's research highlights state-sponsored APT groups targeting journalists to access sensitive information and spread disinformation. Groups from China, North Korea, Iran, and Turkey use tactics like web beacons, credential harvesting, and malware to manipulate public perception and influence geopolitical events.
Vice Society Ransomware Group
SEKOIA tracks the Vice Society ransomware group, which has compromised 88 victims from its inception to mid-June 2022. The group primarily targets academic institutions and healthcare sectors, using common pentester skills and public vulnerabilities like PrintNightmare. Vice Society employs HelloKitty ransomware for Linux and Zeppelin ransomware for Windows targets.
Bandai Namco Confirms A Cyberattack
Bandai Namco has confirmed a cyberattack that occurred on July 3, 2022, currently under investigation. The attack may have compromised customer information related to the Toys and Hobby Business in Asia (excluding Japan). While the company investigates the scope and cause of the damage, reports from vx-underground suggest ALPHV/BlackCat as the ransomware gang behind the attack.
Bumblebee Loader Incorporated into New Ransomware Operations
Symantec's Threat Hunter team has identified the integration of the Bumblebee loader into various ransomware operations, including Conti and Quantum. This transition may have been pre-planned as a replacement for Trickbot and BazarLoaders. The Bumblebee loader is delivered via phishing emails containing a malicious DLL and LNK file within an ISO file. The LNK file uses rundll32.exe to execute the Bumblebee DLL, which then contacts the attacker's C2 server. Persistence is established through a scheduled task running a VBS file. Hours later, Cobalt Strike is deployed, system reconnaissance is performed using 'systeminfo' and AdFind, and ransomware encryption follows.
Undoing Microsoft Macros Block By Default
Microsoft has rolled back its decision to block macros by default in Office products due to customer feedback, surprising many admins. This reversal could lead to increased security risks as threat actors might reuse old macro-based malware tactics.
Report of Infection Chain XLoader Abuses PDF, MS and Equation Editor Released
Cyble's report uncovers XLoader's infection chain, exploiting PDF and Microsoft vulnerabilities. The malware uses a spam email with a PDF and XLSX file, leveraging the equation editor vulnerability (CVE-2017-11882) for execution. XLoader employs steganography for stealth and exfiltrates credentials and data to the attacker's server.

About the Forge & Threat Reports
Our mission is to assess the operational behaviors of all threats to provide the community, and our customers, with actionable information and enterprise-ready detections in order to defend themselves in an ever- changing threat landscape.

Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
Whitepapers

The World's Best SOC Teams Use Anvilogic
Build Detections You Want, Where You Want






.png)