

We curate threat intelligence to provide situational awareness and actionable insights
Threat Identifier Detections
Atomic detections that serve as the foundation of our detection framework.
Threat Scenario Detections
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
Reports Hot Off the Forge
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024




All Threat Reports
Fraudulent Copyright Themed Emails From LockBit Ransomware Identified
ASEC analysis reveals that LockBit ransomware is being distributed through fraudulent emails warning of copyright infringement. The phishing emails contain a compressed file with an NSIS script file disguised as a PDF. Upon execution, the ransomware establishes persistence by modifying the run key, deleting shadow copies, and terminating services, then encrypts removable, fixed, and RAM disk drives.
Chinese-Speaking Threat Actors Target ICS
Kaspersky ICS CERT researchers have identified a threat campaign beginning as early as March 2021, targeting the logistics, transportation, telecommunication, and industrial sectors in Malaysia, Pakistan, and Afghanistan. Discovered in mid-October 2021, the campaign involved the ShadowPad backdoor affecting industrial control systems, specifically engineering computers in building automation systems of a telecom company in Pakistan. Attackers gained initial access by exploiting the Microsoft Exchange vulnerability CVE-2021-26855 (ProxyLogon). Their techniques included deploying Cobalt Strike, using certutil to download files, web shells, procdump, mimikatz, and BAT scripts for credential access and data collection. Persistence was achieved by scripting data collection and scheduling it to run daily. The activity is attributed to a Chinese-speaking group potentially linked to HAFNIUM.
Hacktivist Group Attack Three Iranian Steel Companies
On June 27, 2022, the hacktivist group "Gonjeshke Darande" attacked three Iranian steel companies, deploying wiper malware and causing significant damage. Operations at Khuzestan Steel, one of Iran’s largest steel companies, were suspended. The group, also known for a 2021 attack on Iran's railway system, has been tracked by SentinelOne under various aliases.
Black Basta Initiates Intrusion Featuring Qakbot to Exploit PrintNightmare Vulnerability
Since April 2022, Trend Micro has been tracking the Black Basta ransomware group, uncovering an intrusion involving Qakbot deployment via a malicious Excel document. The group exploited the PrintNightmare (CVE-2021-1675) vulnerability to gain initial access, using regsvr32.exe to execute Qakbot DLLs, performing process injection into explorer.exe, and creating persistence with a scheduled task. Additional payloads included fileless PowerShell scripts to execute Cobeacon, the Coroxy backdoor, and Netcat for lateral movement, all leading to the eventual ransomware deployment.
Tropic Trooper's "Unorthodox" Infection Chain
Check Point Research tracks Tropic Trooper's unorthodox infection chain targeting Chinese-speaking countries. The attack uses the Nimbda loader, SMS Bomber, and TROJ_YAHOYAH malware. The chain involves shellcode injection, GitHub/Gitee communication, and persistence via Windows run key. The goal remains unclear, but the attack uses a trojanized SMS Bomber for misdirection.
Threat Advisory Tracking Avoslocker Ransomware Group
Cisco Talos tracks AvosLocker ransomware group, active since June 2021 and recruiting in Russian forums. A February 2022 campaign exploited Log4Shell on an ESXi server, using LoLBins and various tools. The attack culminated with ransomware deployment via PDQ Deploy on March 8th, 2022.

About the Forge & Threat Reports
Our mission is to assess the operational behaviors of all threats to provide the community, and our customers, with actionable information and enterprise-ready detections in order to defend themselves in an ever- changing threat landscape.

Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
Whitepapers

The World's Best SOC Teams Use Anvilogic
Build Detections You Want, Where You Want






.png)