

We curate threat intelligence to provide situational awareness and actionable insights
Threat Identifier Detections
Atomic detections that serve as the foundation of our detection framework.
Threat Scenario Detections
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
Reports Hot Off the Forge
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024




All Threat Reports
Phishing Campaign Delivers FOG Ransomware via Fake “Pay Adjustment” Notices
Trend Micro tracked an ongoing phishing campaign where fake "Pay Adjustment" emails deliver FOG ransomware. Victims span sectors like tech, healthcare, and education. The attack uses disguised .lnk files, PowerShell loaders, privilege escalation exploits, and hidden ransomware payloads, encrypting data with a .flocked extension and dropping DOGE-themed ransom notes.
An Initial Access Broker Facilitates a Cactus Ransomware Intrusion in Multi-Phase Breach
Cisco Talos reported a multi-phase breach in which IAB Toymaker used a custom backdoor, LAGTOY, to gain initial access to a critical infrastructure network. After three weeks of dormancy, access was handed to a Cactus ransomware affiliate, who executed reconnaissance, exfiltration, and ransomware deployment over a twelve-day window.
Concern Mounts Over China’s Strategic Cyber Positioning
Chinese APTs, including Volt Typhoon, are targeting critical U.S. infrastructure by exploiting edge device blind spots and rotating infrastructure to avoid detection. Experts warn China is positioning itself for potential disruption scenarios. Defenders are urged to go beyond EDR and integrate AI, identity protection, and network analytics to respond.
Silent Ransomware Attack Exploits AWS Native Features to Encrypt Cloud Storage
A stealth ransomware campaign exploits stolen AWS credentials to encrypt S3 bucket contents using native server-side encryption (SSE-C). No files are deleted or exfiltrated, making detection difficult. Victims receive ransom notes requesting BTC payments for decryption. Security experts urge IAM audits, key rotation, and SSE-C permission restrictions.
Russian-Aligned Shuckworm Infiltrates Ukrainian Military Systems Via Removable Media
Symantec attributes a February 2025 campaign against Ukraine’s military to Russian APT Shuckworm. Using a malicious USB drive and LOLBins like PowerShell, the group deployed GammaSteel malware to exfiltrate sensitive documents. Despite limited sophistication, Shuckworm’s evolving tactics and persistence pose a significant threat to defense-focused targets in the region.
Experimentation with the ClickFix Campaign by State-Sponsored Actors
Proofpoint observed state-linked actors from North Korea, Iran, and Russia each experimenting with ClickFix—an execution technique involving fake CAPTCHAs and PowerShell. Though limited in duration, the use of ClickFix across diverse APT groups suggests growing interest in refining social engineering tactics for espionage, persistence, and initial access operations.

About the Forge & Threat Reports
Our mission is to assess the operational behaviors of all threats to provide the community, and our customers, with actionable information and enterprise-ready detections in order to defend themselves in an ever- changing threat landscape.

Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
Whitepapers

The World's Best SOC Teams Use Anvilogic
Build Detections You Want, Where You Want






.png)