

We curate threat intelligence to provide situational awareness and actionable insights
Threat Identifier Detections
Atomic detections that serve as the foundation of our detection framework.
Threat Scenario Detections
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
Reports Hot Off the Forge
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024




All Threat Reports
Vigilance for Critical Infrastructure Defense
A joint advisory from CISA and allied nations urges critical infrastructure operators to remain vigilant against potential Russian cyber threats. Recommendations include hardening cyber defenses and identifying indicators of malicious activity to mitigate risks from destructive malware, ransomware, DDoS attacks, and cyber espionage.
TeamTNT Scripts
Cisco Talos analyzed TeamTNT scripts targeting AWS and Alibaba, revealing capabilities in cryptocurrency mining, credential gathering, and disabling cloud security. Their "GRABBER_aws_cloud.sh" script steals AWS credentials, while other scripts download payloads based on system architecture. Notably, they do not disable several US cloud security tools.
Trend Micro Analyzes BlackCat Ransomware
Trend Micro analyzes a BlackCat ransomware attack starting with exploited ProxyLogon and ProxyShell vulnerabilities on Exchange Servers. PowerShell downloads a Cobalt Strike Beacon and DLL, followed by process injection into WerFault.exe for discovery and credential access. The attackers used CrackMapExec for lateral movement before executing the ransomware.
REvil Return?
REvil ransomware reappears after months of inactivity, launching a new leak site and targeting new victims, including Oil India. Identified by researchers on RuTOR, the site offers an 80/20 split to affiliates. The renewed activity of REvil raises questions and requires further investigation.
Rise in LinkedIn Phishing Lures
CheckPoint's research indicates a significant rise in LinkedIn phishing lures, accounting for 52% of phishing emails in Q1 2022. This marks a dramatic increase from 8% in the previous quarter. Attackers leverage LinkedIn to obtain user credentials, with LinkedIn now surpassing shipping, retail, and technology as the top phishing target.
Impact of Conti Ransomware on the Healthcare Industry
Conti and Ryuk ransomware have severely impacted the healthcare industry, causing dangerous disruptions to IT systems and patient care services. The financial burden of such attacks is substantial, with Ireland’s Health Service Executive incurring over $600 million in recovery costs after a May 2021 incident. Since 2020, these ransomware groups have compromised more than 400 healthcare facilities. The true extent of ransomware attacks in healthcare is likely underreported due to confidentiality concerns.

About the Forge & Threat Reports
Our mission is to assess the operational behaviors of all threats to provide the community, and our customers, with actionable information and enterprise-ready detections in order to defend themselves in an ever- changing threat landscape.

Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
Whitepapers

The World's Best SOC Teams Use Anvilogic
Build Detections You Want, Where You Want






.png)