

We curate threat intelligence to provide situational awareness and actionable insights
Threat Identifier Detections
Atomic detections that serve as the foundation of our detection framework.
Threat Scenario Detections
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
Reports Hot Off the Forge
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024




All Threat Reports
APT15 Resumes Operations with New Malware
After a period of inactivity, Chinese espionage group APT15 (aka Flea, Nickel) has resumed operations, launching a campaign against Western government entities using their new Graphican backdoor. APT15, known for their focus on governmental and diplomatic targets, demonstrates resilience and continuity in their threat activity, maintaining their victimology despite past setbacks.
Muddled Libra Showcases Proficiency with Multiple Toolkits
Meet Muddled Libra: a crafty threat group that's caught the eye of the pros over at Unit42. They've got a toolbox filled with cyber tricks and aren't afraid to use it. Big industries, from tech to finance, need to keep an eye out, as Muddled Libra doesn't shy away from shaking things up, especially when it comes to software supply chains.
A Sophisticated But Thwarted Intrusion from Volt Typhoon
CrowdStrike successfully prevents a sophisticated intrusion attempt by Chinese threat group Volt Typhoon. Their tactics, which involved exploiting ManageEngine vulnerabilities and employing custom web shells, highlight the group's commitment to covert operations and thorough reconnaissance.
Major Financial Systems Under Threat by Pro-Russian Hackers
Russian hacker groups Killnet, REvil, and Anonymous Sudan are threatening severe cyberattacks on major financial institutions in Europe and the US, including SWIFT and the US Federal Reserve System. These attacks, announced in a video, are politically motivated, retaliating against Western support for Ukraine. The hackers claim their actions will go beyond DDoS attacks to more destructive activities, aligning with Killnet's known tactics.
Over 100 Popular Brands Impersonated in Large-Scale Phishing Campaign
Bolster's threat research team uncovered a large-scale phishing campaign targeting over 100 popular brands, including Nike, Adidas, and Puma. The campaign, active since June 2022, uses over 3,000 live domains to impersonate brands and steal personal and financial information from victims. Spikes in activity were observed in November 2022 and February 2023. The phishing sites use SEO techniques to rank high in search results, and the domains often combine brand names with locations. Bolster warns customers to be vigilant to avoid falling into these traps.
RomCom Threat Actor Attacks Ukrainian Politicians & US Healthcare Allies
RomCom, a threat actor, has reemerged targeting Ukrainian politicians and a US-based healthcare organization aiding refugees. BlackBerry reports that RomCom uses fake Devolutions Remote Desktop Manager installations to drop malicious payloads, focusing on intelligence collection related to geopolitical events in Ukraine and Western aid efforts. The malware is executed via RunDLL32, aiming to expand RomCom's knowledge for future campaigns.

About the Forge & Threat Reports
Our mission is to assess the operational behaviors of all threats to provide the community, and our customers, with actionable information and enterprise-ready detections in order to defend themselves in an ever- changing threat landscape.

Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
Whitepapers

The World's Best SOC Teams Use Anvilogic
Build Detections You Want, Where You Want






.png)