

We curate threat intelligence to provide situational awareness and actionable insights
Threat Identifier Detections
Atomic detections that serve as the foundation of our detection framework.
Threat Scenario Detections
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
Reports Hot Off the Forge
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024




All Threat Reports
APT29 Tactics: Car Sale Lures Exploiting WinRAR Vulnerability
Slug (34 characters or less, including dashes): apt29-winrar-exploit-tactics (28 characters) Title Tag (10-60 characters, including spaces): APT29 Exploits WinRAR in Embassy Cyber Attacks (47 characters) Meta Description (100 to 160 characters, including spaces): APT29, a Russian threat group, targets European embassies exploiting WinRAR vulnerability CVE-2023-38831, using car sale lures for infiltration. (147 characters) Open Graph Title (Social Media, 60-90 Characters): Russian APT29's WinRAR Exploit Targets Embassies Across Europe (69 characters) Open Graph Description (Social Media, 120-200 Characters): Discover how APT29 leverages WinRAR vulnerability in targeted cyber attacks against European embassies, using sophisticated car sale email lures. (153 characters) Synopsis: APT29, a Russian cyber threat group, has been actively targeting European embassies using a car sale lure to exploit the WinRAR vulnerability CVE-2023-38831. Countries like Azerbaijan, Greece, Romania, and Italy have been affected, with specific focus on the Ministry of Foreign Affairs and telecommunications providers like Greece's Otenet.
Insights of a Dangerously Proficient Social Engineering Group, Scattered Spider
The FBI and CISA's latest advisory focuses on Scattered Spider, a threat group also known as Starfraud, UNC3944, Scatter Swine, and Muddled Libra, renowned for their advanced social engineering techniques. The group, displaying skill sets overlapping with Microsoft's Octo Tempest, engages in sophisticated phishing, push bombing, and SIM swap attacks to acquire credentials and bypass multi-factor authentication (MFA).
CISA Updates Advisory for Royal Ransomware Gang, Amassed $275 Million in Ransom
The Cybersecurity and Infrastructure Security Agency (CISA) has updated its advisory on the Royal ransomware group, revealing its significant global impact since September 2022. The group, suspected of rebranding to 'Blacksuit,' has targeted over 350 victims worldwide, particularly in critical sectors, accumulating ransoms exceeding $275 million. Utilizing phishing, RDP, and exploiting vulnerable applications, Royal gains initial access, later employing tools like Chisel, Cobalt Strike, and leveraging Qakbot C2 infrastructure.
A Russian Threat Actor a Mastermind of Ransomware Influences 5 Strains
Group-IB has infiltrated the Nokoyawa ransomware-as-a-service (RaaS), revealing a key Russian threat actor known as 'farnetwork.' Active since 2019, 'farnetwork' has been linked to the development of several ransomware strains, including JSWORM, Nefilim, Karma, and Nemty. This actor, operating under multiple aliases, engages affiliates by providing access to corporate networks, only requiring them to escalate privileges and execute attacks.
Unit 42 Reveals Intricate Chinese APT Attack on Cambodia's Government
Unit 42 has identified a complex cyber espionage campaign by Chinese Advanced Persistent Threat (APT) groups targeting as many as 24 Cambodian government entities. The campaign, marked by sophisticated techniques, enticed victims under the guise of cloud backup services, targeting crucial sectors such as defense, election oversight, and telecommunications. The APTs cleverly used a honeypot and IP filtering to reduce detection risks, with activities peaking during Cambodia's business hours.
SysAid Vulnerability Exploited in Lace Tempest's Latest Clop Ransomware Campaigns
Microsoft's Threat Intelligence team has identified attempts by Lace Tempest, also known as FIN11 and TA505, to exploit a critical zero-day vulnerability in SysAid On-Prem software, CVE-2023-47246. This path traversal flaw enables unauthorized actors to upload malicious payloads and initiate ransomware attacks. The targeted SysAid versions are those earlier than 23.3.36. Post-exploitation activities involve deploying the Gracewire malware loader, followed by human-operated actions like lateral movement, data theft, and eventual ransomware deployment.

About the Forge & Threat Reports
Our mission is to assess the operational behaviors of all threats to provide the community, and our customers, with actionable information and enterprise-ready detections in order to defend themselves in an ever- changing threat landscape.

Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
Whitepapers

The World's Best SOC Teams Use Anvilogic
Build Detections You Want, Where You Want






.png)