Anvilogic Forge Threat Research Reports

Here you can find an accumulation of trending threats published weekly by the Anvilogic team.

We curate threat intelligence to provide situational awareness and actionable insights

Forge Threat Report

Forge Report: First Half Threat Trends of 2024

Anvilogic Forge's latest report offers essential insights into key threat trends and adversarial tactics observed in the first half of 2024. From the pervasive use of PowerShell and remote access tools to sophisticated social engineering and attacks on the healthcare sector, this comprehensive analysis provides actionable intelligence and detection rules to bolster your defenses. Explore our key findings and access ready-to-deploy detection content to enhance your security posture.

All Threat Reports

Levels

All
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
This is some text inside of a div block.
04
-
13
-
2022

Nordex Group's Cyber Attack

Nordex Group, a wind turbine manufacturer, experienced a cyberattack on March 31, 2022, leading to a precautionary shutdown of IT systems globally. The company's incident response team, comprising internal and external experts, was activated immediately to contain the issue and assess potential exposure. No further updates have been provided.

Manufacturing
Level:
Strategic
|
Source:
This is some text inside of a div block.
04
-
13
-
2022

ALPHV Ransomware Hits North Carolina A&T University

North Carolina A&T University was targeted by ALPHV ransomware between March 7-11, disrupting vital network services and compromising personal data. Recovery is ongoing, with significant student impact.

Education
Cybersecurity
Information & Technology
Level:
Strategic
|
Source:
This is some text inside of a div block.
04
-
13
-
2022

APT10/Cicada Espionage Attacks

Symantec reports an expanded espionage campaign by APT10 (Cicada) targeting government and NGO entities across Europe, Asia, and North America. Techniques include exploiting Microsoft Exchange Servers and using tools like Sodamaster and Mimikatz.

Government
Legal
Cybersecurity
Non-government organizations (NGOs)
Level:
Tactical
|
Source:
This is some text inside of a div block.
04
-
13
-
2022

Mandiant's Research of FIN7

Mandiant's updated research tracks the evolution of threat group FIN7 from late 2021 to early 2022, revealing its associations with ransomware operations like Maze, Darkside, Blackmatter, and ALPHV/Blackcat. FIN7 targets multiple industries, including financial services, food, medical, technology, transportation, and utilities. Mandiant tracks multiple uncategorized threat groups (UNCs) affiliated with FIN7. The group has refined its tools, with newer intrusions frequently using their PowerShell backdoor, PowerPlant, over older malware like LOADOUT and GRIFFON.

Financial
Transportation
Level:
Tactical
|
Source:
This is some text inside of a div block.
04
-
13
-
2022

Lambda Malware, Denonia

Cado Security has identified Denonia, a new malware targeting AWS Lambda environments to deploy cryptominers. Written in Go, Denonia uses GitHub libraries and contains XMRig cryptominer software. The malware utilizes DNS over HTTPS (DoH) for encrypted DNS queries. It can also run on select Linux systems. The exact deployment method is unknown, but it may involve compromising AWS Access and Secret Keys to manually deploy into Lambda environments.

Cybersecurity
Level:
Strategic
|
Source:
This is some text inside of a div block.
04
-
13
-
2022

Colibri Loader

Malwarebytes has provided an analysis of Colibri Loader, a malware that appeared in underground forums in August 2021. Marketed to those with high traffic and limited time, Colibri Loader was recently observed delivering the Vidar information stealer. The attack chain begins with a malicious document triggering PowerShell to download Colibri Loader via BitsTransfer. Depending on the Windows version (7 or 10), the malware's directory location and scheduled task vary. The Windows 10 version achieves persistence by running PowerShell with a hidden window and exploiting the Get-Variable cmdlet by using a malicious executable named Get-Variable.exe. This technique leverages the default WindowsApps path to execute the malicious binary instead of the legitimate PowerShell cmdlet, demonstrating how adversaries can achieve persistence.

Cybersecurity
Information & Technology
Software
Level:
Tactical
|
Source:

About the Forge & Threat Reports

Deploy and maintain detections and threat hunt across all of your logging platforms and security tools without centralizing your data or deploying new agents.

Our mission is to assess the operational behaviors of all threats to provide the community, and our customers, with actionable information and enterprise-ready detections in order to defend themselves in an ever- changing threat landscape.
Sign Up For Weekly Threat Reports

Intelligence Levels for Threat Reports

Tactical

Detectable threat behaviors for response with threat scenarios or threat identifiers.

Strategic

General information security news, for awareness.

Whitepapers

No items found.

The World's Best SOC Teams Use Anvilogic

Paypal Logo
Sprinklr Logo
SAP Logo
SAP Logo
Regeneron Logo
Regeneron Logo
SurveyMonkey Logo
TradeWeb Logo
Alteryx Logo
First Citizens Bank Logo
Crypto.com Logo
Rakuten Mobile Logo
St. George's University Logo
Navan Logo
ADP Logo
ADP Logo
Labcorp Logo
Dyson Logo
siemens Logo
Research to keep you up-to-date on threats
Learn More
Interested in joining the Anvilogic team?
See Careers

Build Detections You Want, Where You Want