Anvilogic Forge Threat Research Reports

Here you can find an accumulation of trending threats published weekly by the Anvilogic team.

We curate threat intelligence to provide situational awareness and actionable insights

Forge Threat Report

Forge Report: First Half Threat Trends of 2024

Anvilogic Forge's latest report offers essential insights into key threat trends and adversarial tactics observed in the first half of 2024. From the pervasive use of PowerShell and remote access tools to sophisticated social engineering and attacks on the healthcare sector, this comprehensive analysis provides actionable intelligence and detection rules to bolster your defenses. Explore our key findings and access ready-to-deploy detection content to enhance your security posture.

All Threat Reports

Levels

All
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
This is some text inside of a div block.
03
-
29
-
2022

FBI's Internet Crime Report for 2021

The FBI’s Internet Crime Complaint Center (IC3) 2021 report tracks various internet crimes, with ransomware being a significant concern. IC3 received 3,729 ransomware complaints, affecting 14 out of 16 critical infrastructure sectors. Top victims include Healthcare (148 complaints) and Financial Services (89). Major ransomware variants were Conti, LockBit, and REvil/Sodinokibi.

Critical Infrastructure
Level:
Strategic
|
Source:
This is some text inside of a div block.
03
-
29
-
2022

Google TAG Identifies Threats from North Korea

Google's Threat Analysis Group (TAG) has been tracking two North Korean threat campaigns, "Operation Dream Job" and "Operation AppleJeus," since February 10th. "Operation Dream Job" targets media and technology sectors, while "Operation AppleJeus" focuses on financial services, especially cryptocurrency and fintech. Both campaigns use a Google Chrome RCE vulnerability (CVE-2022-0609) to exploit victims, employing careful measures to evade detection, including system checks, specific time-based iframe serving, and a one-time-click policy.

Financial
Information & Technology
Level:
Strategic
|
Source:
This is some text inside of a div block.
03
-
29
-
2022

Mustang Panda’s New Korplug Variant

ESET identifies Mustang Panda using a new Korplug variant in a campaign dating back to August 2021, targeting East and Southeast Asia with phishing lures related to COVID-19 and geopolitical issues. The malware employs obfuscation and anti-analysis techniques, establishing persistence and communicating with C2 servers for additional commands.

Korplug Variant
Mustang Panda
Welivesecurity
Level:
Tactical
|
Source:
This is some text inside of a div block.
03
-
29
-
2022

Serpent Backdoor Malware

ProofPoint identifies a phishing campaign targeting French construction, government, and real estate sectors with Serpent backdoor malware. The campaign uses a Microsoft Word document with embedded macros and ASCII art, executing a PowerShell script that installs Chocolatey and Python to run a final malicious script from a .bat file.

Cybersecurity
Level:
Tactical
|
Source:
This is some text inside of a div block.
03
-
29
-
2022

Arrests of Seven Lapsus$ Hackers

London Police arrested seven teenagers connected to the Lapsus$ data extortion group. The 16-year-old alleged leader, who has reportedly accumulated $14 million, was not arrested. The teenager’s identity was exposed by rival hackers after a fallout, surprising his parents who believed his computer activities were related to online gaming.

Cybersecurity
Law Enforcement
Media
Education
Level:
Tactical
|
Source:
This is some text inside of a div block.
03
-
25
-
2022

White House Statement to Harden Cybersecurity

On March 22, 2022, President Biden emphasized vigilance against potential Russian cyber threats in a White House statement. The administration urges enhanced cybersecurity measures for the Federal Government and critical infrastructure sectors, advising adherence to CISA alerts and guidance for better preparedness.

Critical Infrastructure
Level:
Strategic
|
Source:

About the Forge & Threat Reports

Deploy and maintain detections and threat hunt across all of your logging platforms and security tools without centralizing your data or deploying new agents.

Our mission is to assess the operational behaviors of all threats to provide the community, and our customers, with actionable information and enterprise-ready detections in order to defend themselves in an ever- changing threat landscape.
Sign Up For Weekly Threat Reports

Intelligence Levels for Threat Reports

Tactical

Detectable threat behaviors for response with threat scenarios or threat identifiers.

Strategic

General information security news, for awareness.

Whitepapers

No items found.

The World's Best SOC Teams Use Anvilogic

Paypal Logo
Sprinklr Logo
SAP Logo
SAP Logo
Regeneron Logo
Regeneron Logo
SurveyMonkey Logo
TradeWeb Logo
Alteryx Logo
First Citizens Bank Logo
Crypto.com Logo
Rakuten Mobile Logo
St. George's University Logo
Navan Logo
ADP Logo
ADP Logo
Labcorp Logo
Dyson Logo
siemens Logo
Research to keep you up-to-date on threats
Learn More
Interested in joining the Anvilogic team?
See Careers

Build Detections You Want, Where You Want