Anvilogic Forge Threat Research Reports

Here you can find an accumulation of trending threats published weekly by the Anvilogic team.

We curate threat intelligence to provide situational awareness and actionable insights

Forge Threat Report

Forge Report: First Half Threat Trends of 2024

Anvilogic Forge's latest report offers essential insights into key threat trends and adversarial tactics observed in the first half of 2024. From the pervasive use of PowerShell and remote access tools to sophisticated social engineering and attacks on the healthcare sector, this comprehensive analysis provides actionable intelligence and detection rules to bolster your defenses. Explore our key findings and access ready-to-deploy detection content to enhance your security posture.

All Threat Reports

Levels

All
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
This is some text inside of a div block.
02
-
15
-
2024

An Emphasis on the Value of Your Credentials

Cisco Talos's 2023 report, presented by Hazel Burton, highlights a significant shift towards the exploitation of valid accounts by cybercriminals, making it the second-most common attack technique. With 26% of incident response engagements involving the use of valid accounts, the dark web has become a marketplace for these stolen credentials, especially those granting access to critical resources. This shift is attributed to the changing nature of work practices, with a focus on remote access and cloud solutions. Talos stresses the importance of multi-factor authentication (MFA) and robust authentication measures as essential defenses against these types of attacks. The report calls for a comprehensive security strategy, including access restriction, MFA, routine auditing, and a zero-trust architecture to mitigate the risks associated with compromised credentials.

Global
Level:
Strategic
|
Source:
This is some text inside of a div block.
02
-
15
-
2024

Excel Document Used as Entry Point for Info-Stealer

In January 2024, Fortinet's Pei Han Liao reported a sophisticated malware campaign by a Vietnamese threat actor using an Excel document as the entry point. The attack chain begins with a VBA script in the Excel file, triggering a PowerShell command to download additional malicious scripts, culminating in a Python-based info-stealer. This malware harvests cookies and login data from browsers, packaging them for exfiltration to the attacker's telegram bot. The use of GitLab repositories for hosting malware complicates detection, revealing the actor's evolving capabilities and broader involvement in the cyber threat landscape since August 2023.

Global
Level:
Tactical
|
Source:
This is some text inside of a div block.
02
-
15
-
2024

A Two-Decade Threat Evolution of Russian APT Group, APT28

Trend Micro's analysis reveals the two-decade evolution of APT28, a Russian APT group known for its cyber espionage across various sectors worldwide. Initially employing brute-force tactics, APT28 has sophisticatedly adapted, leveraging critical vulnerabilities and covert methodologies for espionage. Recent campaigns show advanced phishing and malware distribution tactics, targeting government, defense, and private sectors. Despite a reputation for aggressive campaigns, APT28's subtle initial intrusions and complex post-exploitation strategies underline their adaptability and continued threat to global cybersecurity.

Aerospace
Defense
Energy
Financial
Government
Level:
Tactical
|
Source:
This is some text inside of a div block.
02
-
15
-
2024

Security Agencies Heighten Concerns Over Volt Typhoon's Cyber Operations

The joint advisory by CISA, NSA, FBI, and partners raises alarms over Volt Typhoon's cyber-espionage, linked to Chinese interests. Targeting critical infrastructure, they utilize sophisticated techniques for long-term access, pre-positioning for potential disruptive actions. Recommendations focus on detecting living-off-the-land techniques and enhancing defenses against these state-sponsored cyber threats.

Communications
Critical Infrastructure
Energy
Water
Level:
Tactical
|
Source:
This is some text inside of a div block.
02
-
08
-
2024

Vital Warning Issued by the FBI and CISA to Secure Against China's Escalating Cyber Threats

The FBI and CISA have released an urgent warning regarding the growing cyber threats from Chinese government-sponsored activities, targeting critical U.S. infrastructure sectors like energy, water, and transportation. FBI Director Christopher A. Wray emphasizes the need for heightened vigilance against these threats, highlighting recent efforts to disrupt the Volt Typhoon hacking group's malware attacks on Wi-Fi routers.

Critical Infrastructure
Energy
Oil and Gas
Transportation
Water
Level:
Strategic
|
Source:
This is some text inside of a div block.
02
-
08
-
2024

TA576's Tax-Season Assault with New SyncAppvPublishingServer Attack Strategy

TA576's recent campaign exploits the tax season to target North American financial organizations with sophisticated phishing lures. Proofpoint researchers Tommy Madjar and Selena Larson highlight the use of compromised accounts and cleverly disguised emails to deploy malware via a Google Firebase URL. This year's innovation lies in bypassing PowerShell detection through SyncAppvPublishingServer.vbs, leading to the deployment of the Parallax RAT.

Financial
Level:
Tactical
|
Source:

About the Forge & Threat Reports

Deploy and maintain detections and threat hunt across all of your logging platforms and security tools without centralizing your data or deploying new agents.

Our mission is to assess the operational behaviors of all threats to provide the community, and our customers, with actionable information and enterprise-ready detections in order to defend themselves in an ever- changing threat landscape.
Sign Up For Weekly Threat Reports

Intelligence Levels for Threat Reports

Tactical

Detectable threat behaviors for response with threat scenarios or threat identifiers.

Strategic

General information security news, for awareness.

Whitepapers

No items found.

The World's Best SOC Teams Use Anvilogic

Paypal Logo
Sprinklr Logo
SAP Logo
SAP Logo
Regeneron Logo
Regeneron Logo
SurveyMonkey Logo
TradeWeb Logo
Alteryx Logo
First Citizens Bank Logo
Crypto.com Logo
Rakuten Mobile Logo
St. George's University Logo
Navan Logo
ADP Logo
ADP Logo
Labcorp Logo
Dyson Logo
siemens Logo
Research to keep you up-to-date on threats
Learn More
Interested in joining the Anvilogic team?
See Careers

Build Detections You Want, Where You Want