

We curate threat intelligence to provide situational awareness and actionable insights
Threat Identifier Detections
Atomic detections that serve as the foundation of our detection framework.
Threat Scenario Detections
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
Reports Hot Off the Forge
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024




All Threat Reports
German Government Warns Usage of Kaspersky AV
The German Federal Office for Information Security (BSI) advises against using Kaspersky antivirus software, urging users to consider alternative products. This caution stems from concerns over Kaspersky's potential ties to the Russian government amid the Russia-Ukraine conflict. BSI highlights the risks posed by the software's extensive system authorizations and encrypted, non-verifiable connections to the manufacturer's servers.
Cisco Talso Analyzes BlackCat RaaS
Cisco Talos reports on the notorious BlackCat (aka ALPHV) Ransomware-as-a-Service (RaaS) group, which has been active in the cyber threat landscape since November 2021. With over 30% of its victims based in the US, BlackCat has compromised numerous companies globally. Initially thought to be a rebrand of BlackMatter and DarkSide, it was later found to be a separate entity with affiliates from both groups. Cisco Talos analyzed BlackCat's campaigns in September and December, noting similarities in tactics, techniques, and procedures (TTPs) with other human-operated ransomware attacks. The attack flow typically involves initial compromise, exploration and data exfiltration, attack preparation, and execution.
Conti Source Code Leak
Conti leaks continue from a Ukrainian security researcher under the Twitter handle @ContiLeaks. The latest leak, provided on March 20th, 2022, via VirusTotal, includes the source code for 'conti v3'. BleepingComputer conducted a review of the uploaded files, identifying the code as authentic and dated January 25th, 2021, making it newer than previously leaked code. BleepingComputer was able to compile the code without any issues, confirming its authenticity.
A Review of Lapsus$
Lapsus$ group, analyzed by Wired, specializes in data theft and extortion, targeting high-profile companies without political motives. Known for their social media presence and unorganized structure, their exact location remains speculative.
EXOTIC LILY - Initial Access Brokers
Google's Threat Analysis Group (TAG) identifies EXOTIC LILY as initial access brokers linked to Wizard Spider/FIN12 and ransomware groups like Conti and Diavol. Active since November 2021, they target healthcare, IT, and more with phishing campaigns, using legitimate file-sharing services for payload delivery, including ISO files with hidden BazarLoader DLLs.
Initial Story: Okta Potential Data Breach
Okta, an authentication provider, is investigating claims by the data extortion group Lapsus$ of a data breach. The group alleges having "Superuser/Admin" access to Okta's systems for two months, targeting Okta customers. An Okta spokesperson suggested the incident might be linked to a third-party customer support engineer's compromised account in January 2022. The investigation is ongoing.

About the Forge & Threat Reports
Our mission is to assess the operational behaviors of all threats to provide the community, and our customers, with actionable information and enterprise-ready detections in order to defend themselves in an ever- changing threat landscape.

Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
Whitepapers

The World's Best SOC Teams Use Anvilogic
Build Detections You Want, Where You Want






.png)