Anvilogic Forge Threat Research Reports

Here you can find an accumulation of trending threats published weekly by the Anvilogic team.

We curate threat intelligence to provide situational awareness and actionable insights

Forge Threat Report

Forge Report: First Half Threat Trends of 2024

Anvilogic Forge's latest report offers essential insights into key threat trends and adversarial tactics observed in the first half of 2024. From the pervasive use of PowerShell and remote access tools to sophisticated social engineering and attacks on the healthcare sector, this comprehensive analysis provides actionable intelligence and detection rules to bolster your defenses. Explore our key findings and access ready-to-deploy detection content to enhance your security posture.

All Threat Reports

Levels

All
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
This is some text inside of a div block.
11
-
07
-
2024

Microsoft Adds Intelligence on Midnight Blizzard’s RDP-Based Attacks Amid Ongoing Phishing Wave

Microsoft reports that Russian threat group Midnight Blizzard has launched an RDP-based phishing campaign aimed at defense, government, and tech sectors worldwide. By using signed RDP files in highly targeted emails, the group establishes remote sessions to gather sensitive data, leveraging local resources and deploying malware for persistent access. CERT-UA and Amazon provided additional mitigation advice and disrupted malicious infrastructure tied to the campaign.

Defense
Government
Education
Non-government organizations (NGOs)
Technology
Level:
Tactical
|
Source:
This is some text inside of a div block.
11
-
07
-
2024

UNC5812 Pushes Malware Through Telegram to Disrupt Ukraine’s Mobilization Efforts

The Russian-affiliated group UNC5812, using the alias "Civil Defense," has launched a campaign targeting Ukrainian military mobilization by distributing malware through Telegram. Utilizing decoy applications and various backdoors, including PURESTEALER and CRAXSRAT, the group gathers sensitive data and sows anti-mobilization sentiments. The campaign reflects Russia's disinformation strategy and influence tactics, as reported by Google Threat Intelligence.

Defense
Level:
Tactical
|
Source:
This is some text inside of a div block.
11
-
07
-
2024

North Korean Andariel Group Linked to Play Ransomware in New Cyber Campaign

North Korea’s Andariel Group, a state-sponsored cyber actor, is linked to Play ransomware in recent attacks, according to Unit 42. Traditionally focused on espionage and financial cybercrime, Andariel now acts as an initial access broker, leveraging tools like Sliver and DTrack. The investigation reveals strategic shifts, including RDP session control, credential theft, and evasion of EDR detection, culminating in Play ransomware deployment.

Global
Level:
Tactical
|
Source:
This is some text inside of a div block.
10
-
31
-
2024

Foreign Powers Escalate Influence Operations Ahead of U.S. Election

Microsoft’s Threat Analysis Center reports that Russia, Iran, and China are increasing influence operations ahead of U.S. Election 2024. Efforts include AI-generated disinformation, targeting candidates, and spreading divisive content on social issues, all aimed at undermining trust in the election. Coordinated countermeasures are essential to safeguard democratic integrity.

Global
Level:
Strategic
|
Source:
This is some text inside of a div block.
10
-
31
-
2024

Multi-Turn Prompts Exploit AI Flaws in 'Deceptive Delight'

Unit 42 introduces "Deceptive Delight," a multi-turn technique that bypasses AI model safety by embedding unsafe topics in benign prompts. Tested on eight AI models, it achieved 65% success in just three interactions. Mitigation requires layered defenses, including prompt engineering and content filtering, to enhance AI resilience against such exploits.

Global
Level:
Strategic
|
Source:
This is some text inside of a div block.
10
-
31
-
2024

Bumblebee Malware Campaigns Resurface with Phishing and MSI Techniques Deliver Silent Payloads

Netskope reports Bumblebee malware’s return following May 2024's Operation Endgame. Using phishing, MSI files, and silent execution tactics, Bumblebee delivers payloads such as ransomware and Cobalt Strike without creating forensic artifacts. This resurgence highlights the ongoing risk of ransomware and other advanced malware threats globally.

Global
Level:
Tactical
|
Source:

About the Forge & Threat Reports

Deploy and maintain detections and threat hunt across all of your logging platforms and security tools without centralizing your data or deploying new agents.

Our mission is to assess the operational behaviors of all threats to provide the community, and our customers, with actionable information and enterprise-ready detections in order to defend themselves in an ever- changing threat landscape.
Sign Up For Weekly Threat Reports

Intelligence Levels for Threat Reports

Tactical

Detectable threat behaviors for response with threat scenarios or threat identifiers.

Strategic

General information security news, for awareness.

Whitepapers

No items found.

The World's Best SOC Teams Use Anvilogic

Paypal Logo
Sprinklr Logo
SAP Logo
SAP Logo
Regeneron Logo
Regeneron Logo
SurveyMonkey Logo
TradeWeb Logo
Alteryx Logo
First Citizens Bank Logo
Crypto.com Logo
Rakuten Mobile Logo
St. George's University Logo
Navan Logo
ADP Logo
ADP Logo
Labcorp Logo
Dyson Logo
siemens Logo
Research to keep you up-to-date on threats
Learn More
Interested in joining the Anvilogic team?
See Careers

Build Detections You Want, Where You Want