

We curate threat intelligence to provide situational awareness and actionable insights
Threat Identifier Detections
Atomic detections that serve as the foundation of our detection framework.
Threat Scenario Detections
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
Reports Hot Off the Forge
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024




All Threat Reports
Revising Kaseya's Attack by Red Canary
Red Canary revisits the Kaseya supply chain attack from July 2021, where the Kaseya VSA agent executed suspicious actions such as modifying Windows Defender and registry keys. REvil's involvement was noted with specific registry paths used. The analysis provides critical insights into the incident response and attack techniques.
Okta Potential Data Breach
Okta is investigating claims of a data breach by Lapsus$, which alleges having "Superuser/Admin" access to Okta's systems for two months. The potential breach, reportedly tied to a compromised third-party support engineer's account, raises concerns over digital supply chain impacts. Okta continues to investigate the matter.
Rostec Hit with Cyberattack
On March 11th, 2022, Rostec, a Russian aerospace and defense conglomerate, was hit by a cyberattack that briefly took its website offline. The attack, reportedly by the IT Army of Ukraine, followed consistent attack activity since February. Rostec has since repelled the attack and restored its website.
Telecommunications Outages in Ukraine
On March 11th, 2022, cyberattacks caused outages for Ukraine’s telecoms operator Ukrtelecom and ISP Triolan. Ukrtelecom experienced a 40-minute disruption, while Triolan faced over 12 hours of downtime, impacting key network nodes. Triolan’s partial service restoration covered major cities, following an initial attack on March 9th, 2022.
Anonymous Group Hacks Federal Russian Agency
Anonymous hackers have breached Roskomnadzor, the Russian media censoring agency, in support of Ukraine. The attack, revealing 820GB of data, highlights the agency's censorship role in the conflict.
Utilizing Cloud Technology in Russia and Ukraine
On March 16th, 2022, AquaSec's Team Nautilus analyzed cloud technology use in the Russia-Ukraine conflict, focusing on public repositories like DockerHub and GitHub. They found significant DoS activity and resources aiding digital conflict, with DockerHub containing the most related resources.

About the Forge & Threat Reports
Our mission is to assess the operational behaviors of all threats to provide the community, and our customers, with actionable information and enterprise-ready detections in order to defend themselves in an ever- changing threat landscape.

Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
Whitepapers

The World's Best SOC Teams Use Anvilogic
Build Detections You Want, Where You Want






.png)