Anvilogic Forge Threat Research Reports

Here you can find an accumulation of trending threats published weekly by the Anvilogic team.

We curate threat intelligence to provide situational awareness and actionable insights

Forge Threat Report

Forge Report: First Half Threat Trends of 2024

Anvilogic Forge's latest report offers essential insights into key threat trends and adversarial tactics observed in the first half of 2024. From the pervasive use of PowerShell and remote access tools to sophisticated social engineering and attacks on the healthcare sector, this comprehensive analysis provides actionable intelligence and detection rules to bolster your defenses. Explore our key findings and access ready-to-deploy detection content to enhance your security posture.

All Threat Reports

Levels

All
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
This is some text inside of a div block.
04
-
06
-
2022

IcedID Spreads with Compromised Microsoft Exchange Servers

Intezer has observed a new IcedID malware campaign utilizing compromised Microsoft Exchange servers to send hijacked email threads for increased legitimacy. Historically a banking trojan, IcedID has evolved into a malware loader. The latest infection chain uses a zip file containing a malicious ISO with a DLL and LNK file, which, when executed, uses regsvr32 to deploy the malware.

Cybersecurity
Level:
Tactical
|
Source:
This is some text inside of a div block.
04
-
06
-
2022

eSentire Conti Leaks Analysis

eSentire's Threat Response Unit (TRU) analyzed Conti ransomware group leaks from 2021 and 2022, revealing their organized structure, use of operational manuals, and reliance on tools like Cobalt Strike, Mimikatz, and various LOLBins. The data leaks show Conti's detailed and efficient intrusion procedures.

Technology
Level:
Tactical
|
Source:
This is some text inside of a div block.
04
-
06
-
2022

Connecticut Airport Hit with Cyberattack

A cyberattack on Bradley International Airport's website, disclosed by CyberKnow and the Connecticut Airport Authority, occurred on March 29, 2022. Attackers left messages indicating the attack was in response to the Russia-Ukraine conflict, including statements like 'when the supply of weapons to Ukraine stops, attacks on the information structure of your country will instantly stop' and 'America, no one is afraid of you.' The U.S. Cybersecurity & Infrastructure Security Agency (CISA) reports no evidence of a data breach. While CyberKnow attributed the attack to the Russian threat actor group Killnet, the exact perpetrators remain undetermined.

Aviation
Cybersecurity
Information & Technology
Transportation
Government
Level:
Strategic
|
Source:
This is some text inside of a div block.
04
-
06
-
2022

APT36's Transparent Tribe Campaign

Cisco Talos reports that Pakistan-based APT36 (Mythic Leopard) has been targeting Indian government and military entities since June 2021 with the Transparent Tribe campaign. Methods include fraudulent installers, malicious documents with Covid-19 themes, and archive files. Key payloads are CrimsonRAT, a python-based stager, and a .NET-based implant.

Government
Military
Healthcare
Cybersecurity
Information & Technology
Level:
Tactical
|
Source:
This is some text inside of a div block.
04
-
06
-
2022

Lapsus$ Hacks Globant

Information Technology and Software company Globant has been breached by the Lapsus$ group, resulting in the leak of 70GB of data, including source code and admin passwords. Clients like BNP Paribas, Facebook, Abbott, Stifel, and DHL are potentially affected. Researchers from VX-Underground and Comparitech suggest the breach was due to poor password hygiene. Despite recent arrests, Lapsus$ continues its operations, undeterred.

Information & Technology
Level:
Strategic
|
Source:
This is some text inside of a div block.
04
-
06
-
2022

MFA Prompt-Bombing

MFA prompt-bombing is a tactic used by threat groups like Lapsus$ and APT29 to bypass older MFA methods. Attackers bombard users with verification requests until they approve access, exploiting push-button verification. This technique was used in the SolarWinds compromise and recent breaches by Lapsus$, including the Microsoft breach. Mandiant explains that attackers issue multiple MFA requests to the end user’s device until they accept, allowing access. While FIDO2 implementation is a step forward, companies must strengthen their security frameworks to mitigate this threat.

Cybersecurity
Level:
|
Source:

About the Forge & Threat Reports

Deploy and maintain detections and threat hunt across all of your logging platforms and security tools without centralizing your data or deploying new agents.

Our mission is to assess the operational behaviors of all threats to provide the community, and our customers, with actionable information and enterprise-ready detections in order to defend themselves in an ever- changing threat landscape.
Sign Up For Weekly Threat Reports

Intelligence Levels for Threat Reports

Tactical

Detectable threat behaviors for response with threat scenarios or threat identifiers.

Strategic

General information security news, for awareness.

Whitepapers

No items found.

The World's Best SOC Teams Use Anvilogic

Paypal Logo
Sprinklr Logo
SAP Logo
SAP Logo
Regeneron Logo
Regeneron Logo
SurveyMonkey Logo
TradeWeb Logo
Alteryx Logo
First Citizens Bank Logo
Crypto.com Logo
Rakuten Mobile Logo
St. George's University Logo
Navan Logo
ADP Logo
ADP Logo
Labcorp Logo
Dyson Logo
siemens Logo
Research to keep you up-to-date on threats
Learn More
Interested in joining the Anvilogic team?
See Careers

Build Detections You Want, Where You Want