

We curate threat intelligence to provide situational awareness and actionable insights
Threat Identifier Detections
Atomic detections that serve as the foundation of our detection framework.
Threat Scenario Detections
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
Reports Hot Off the Forge
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024




All Threat Reports
REvil Return?
REvil ransomware reappears after months of inactivity, launching a new leak site and targeting new victims, including Oil India. Identified by researchers on RuTOR, the site offers an 80/20 split to affiliates. The renewed activity of REvil raises questions and requires further investigation.
Rise in LinkedIn Phishing Lures
CheckPoint's research indicates a significant rise in LinkedIn phishing lures, accounting for 52% of phishing emails in Q1 2022. This marks a dramatic increase from 8% in the previous quarter. Attackers leverage LinkedIn to obtain user credentials, with LinkedIn now surpassing shipping, retail, and technology as the top phishing target.
Impact of Conti Ransomware on the Healthcare Industry
Conti and Ryuk ransomware have severely impacted the healthcare industry, causing dangerous disruptions to IT systems and patient care services. The financial burden of such attacks is substantial, with Ireland’s Health Service Executive incurring over $600 million in recovery costs after a May 2021 incident. Since 2020, these ransomware groups have compromised more than 400 healthcare facilities. The true extent of ransomware attacks in healthcare is likely underreported due to confidentiality concerns.
Kaspersky Releases Decryptor for Yanluowang Ransomware
Kaspersky has released a free decryptor for Yanluowang ransomware after identifying a vulnerability in the malware. Yanluowang, first observed in August 2021, targets victims in the US, Brazil, Turkey, and other countries. The ransomware is used in targeted attacks and requires specific parameters to execute, indicating manual deployment or use of scripts in compromised systems.
Docker Targeted by LemonDuck
CrowdStrike intelligence reveals that the LemonDuck botnet is targeting Docker APIs to mine cryptocurrency. The attackers use proxy pools to hide wallet addresses and deploy XMRig through custom Docker ENTRYPOINT and disguised bash scripts. LemonDuck also terminates rival cryptominers and disables Alibaba's cloud monitoring service.
Lapsus$ Breached T-Mobile
Independent researcher Brian Krebs reveals that the data extortion group Lapsus$ breached T-Mobile in March 2022, stealing source code for various company projects. T-Mobile confirms the breach but states that no customer or government data was compromised. Lapsus$ used compromised systems and credentials from the Russian Market and insider access to conduct the attack. Although the hackers faced some resistance from T-Mobile employees, they managed to access the customer management tool Atlas but were thwarted in their attempts to access FBI and Department of Defense accounts.

About the Forge & Threat Reports
Our mission is to assess the operational behaviors of all threats to provide the community, and our customers, with actionable information and enterprise-ready detections in order to defend themselves in an ever- changing threat landscape.

Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
Whitepapers

The World's Best SOC Teams Use Anvilogic
Build Detections You Want, Where You Want






.png)