

We curate threat intelligence to provide situational awareness and actionable insights
Threat Identifier Detections
Atomic detections that serve as the foundation of our detection framework.
Threat Scenario Detections
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
Reports Hot Off the Forge
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024




All Threat Reports
Okta Shares Investigation Update - 2022-03-24
Okta's investigation into the Lapsus$ breach reveals it originated from a Sitel support engineer's workstation accessed via RDP. The engineer's "SuperUser" privileges were limited to basic support duties. The breach, detected on January 20, 2022, was contained within an hour. Okta has provided a detailed incident timeline.
Okta Updates ~2.5% Customers Impacted From Breach
Okta's Chief Security Officer, David Bradbury, reports that 366 customers, roughly 2.5% of all Okta customers, were impacted by the January 2022 breach. The exposed data may have been viewed or acted upon. Customers were notified about potential security threats, including API token creation and suspicious sign-ins.
Wizard Spider's Naver Phishing Campaign
Prevailion's PACT uncovers a phishing campaign by Wizard Spider targeting Naver credentials. The campaign, active since August 2021, uses over 540 domains tied to TrickBot infrastructure and leverages CVE-2021-40444 to deploy Conti ransomware.
Sandworm APT Hunts for Asus Routers
The Cyclops Blink botnet, linked to Sandworm APT, is now targeting Asus routers after initially focusing on WatchGuard Firebox. Active since 2019, this botnet aims for widescale infection, enhancing data collection and potential attack vectors. The exact purpose remains unclear, but compromised routers increase its power and reach.
Russian State-Sponsored Cyber Actors Exploit "PrintNightmare"
The FBI and CISA report that Russian state-sponsored actors exploited the PrintNightmare vulnerability (CVE-2021-34527) and flaws in Duo MFA to compromise an NGO in May 2021. They used internal Windows tools for reconnaissance, registry modifications, file collection, and credential theft, leveraging default MFA configurations and re-enrollment flaws.
Intel471 Ransomware Review in 2021 Q4
Intel471's ransomware review for Q4 2021 identified 722 attacks by 34 ransomware variants, with the highest activity in November. The most active variants were LockBit 2.0 (29.7%), Conti (19%), PYSA (10.5%), and Hive (10.1%). Key sectors impacted included manufacturing, healthcare, and technology. The review noted a 110-attack increase from Q3 2021. Less active groups included FiveHands, Haron, Payload[.]bin, and Thanos.

About the Forge & Threat Reports
Our mission is to assess the operational behaviors of all threats to provide the community, and our customers, with actionable information and enterprise-ready detections in order to defend themselves in an ever- changing threat landscape.

Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
Whitepapers

The World's Best SOC Teams Use Anvilogic
Build Detections You Want, Where You Want






.png)