

We curate threat intelligence to provide situational awareness and actionable insights
Threat Identifier Detections
Atomic detections that serve as the foundation of our detection framework.
Threat Scenario Detections
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
Reports Hot Off the Forge
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024




All Threat Reports
EC2 Grouper Targets AWS Environments with Undetermined Attack Objective
The EC2 Grouper threat group targets AWS environments, exploiting exposed keys in public repositories and executing automated API calls for reconnaissance and configuration changes. Fortinet highlights vulnerabilities in cloud security practices and urges stricter monitoring to prevent exploitation by this attacker. The group's ultimate objectives remain unknown.
Salt Typhoon Breach Expands With Ninth Telecom Firm Compromised
Salt Typhoon, a Chinese state-sponsored hacking group, compromised its ninth telecom firm in a massive espionage campaign targeting U.S. critical infrastructure. Broad network access exposed millions to geolocation tracking and call interception. Experts urge tighter collaboration and compliance to mitigate risks in what is described as the largest U.S. telecom hack to date.
APT29 Executes Large-Scale RDP Attack Campaign Focused on Espionage and Data Theft
APT29 (Earth Koshchei) launched a massive RDP campaign targeting defense, government, and technology sectors. Spear-phishing emails delivered rogue RDP files, connecting victims to attacker-controlled servers. The group used MITM tools like PyRDP to intercept sessions, exfiltrate sensitive data, and evade detection, marking a sophisticated espionage effort.
Surge in Black Basta Ransomware And DarkGate Activity with Strategic Social Engineering Approach
Black Basta ransomware and DarkGate malware campaigns are rising, leveraging phishing and impersonation to deploy RMM tools for credential harvesting. Reports from Rapid7 and Trend Micro reveal evolving tactics, including custom packers, defense evasion, and persistence through registry modifications, culminating in ransomware deployment to encrypt data and disrupt operations.
U.S. Investigates TP-Link Routers Over National Security and Cyberattack Concerns
The U.S. investigates TP-Link routers over national security and cyberattack concerns linked to Chinese threat actors. Federal scrutiny includes potential vulnerabilities exploited in botnet operations and antitrust violations for low-cost pricing strategies. A ban on TP-Link devices is possible, impacting its dominant presence in the SOHO router market.
CISA Advises Switching to Signal for Secure Mobile Communication
CISA advises using Signal for secure communication amid cyber espionage by Salt Typhoon, linked to Chinese operations. Highly targeted individuals, including senior officials, should adopt encrypted messaging, enable phishing-resistant MFA, and update devices to modernize security. Measures include Lockdown Mode on iPhones and Private DNS for Android users.

About the Forge & Threat Reports
Our mission is to assess the operational behaviors of all threats to provide the community, and our customers, with actionable information and enterprise-ready detections in order to defend themselves in an ever- changing threat landscape.

Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
Whitepapers

The World's Best SOC Teams Use Anvilogic
Build Detections You Want, Where You Want






.png)