

We curate threat intelligence to provide situational awareness and actionable insights
Threat Identifier Detections
Atomic detections that serve as the foundation of our detection framework.
Threat Scenario Detections
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
Reports Hot Off the Forge
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024




All Threat Reports
Phishing with Citibank Lures
Phishing campaigns targeting Citibank customers are capturing login credentials and personal information. Emails warn of account suspension and link to fake login pages. Another campaign offers monetary prizes to gather personal details. Predominantly targeting Americans (81%), these campaigns also affect UK (7%) and South Korean (4%) users.
IsaacWiper and HermeticWizard
ESET researchers have identified IsaacWiper, deployed against Ukraine on February 24, 2022, and HermeticWizard, which aids in spreading HermeticWiper via WMI and SMB. IsaacWiper and HermeticWiper show no coding similarities but both use the same code-signing certificate from Hermetica Digital Ltd, issued on April 13, 2021.
Dragos 2021 Industrial Control System (ICS)/Operational Technology (OT)
Dragos' 2021 report on ICS/OT cybersecurity reveals that the manufacturing sector was the most targeted, with 211 ransomware incidents. LockBit 2.0 and Conti were responsible for 51% of all attacks, especially affecting metal products, automotive, and plastics. Poor security practices and weak network controls were significant factors in these breaches.
Anonymous Hacking Group Takes Aim at Russia
Anonymous has declared cyber war on Russia, as announced on their Twitter account @YourAnonOne. The hacking group quickly took down Russian news websites, including RT News, in response to Russian aggression.
Belarusian Hackers, UNC1151 Target Ukraine
Reported by TechCrunch and CERT-UA, Belarusian state-sponsored group UNC1151 is targeting private email accounts of Ukrainian military personnel and related individuals with a phishing campaign. Attackers use IMAP to access compromised accounts and send phishing emails to contacts from the victim's address book. UNC1151 has a history of targeting the Ukrainian military and is also believed to be involved in recent DDoS attacks against Ukrainian websites.
APT29/Nobelium Targets Embassies
FortiGuard reports APT29/Nobelium targeting embassies using emails impersonating the Turkish Embassy. The malicious HTML attachments create ISO files that execute Cobalt Strike via DLL shortcuts, likely for monitoring embassy activities.

About the Forge & Threat Reports
Our mission is to assess the operational behaviors of all threats to provide the community, and our customers, with actionable information and enterprise-ready detections in order to defend themselves in an ever- changing threat landscape.

Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
Whitepapers

The World's Best SOC Teams Use Anvilogic
Build Detections You Want, Where You Want






.png)