Anvilogic Forge Threat Research Reports

Here you can find an accumulation of trending threats published weekly by the Anvilogic team.

We curate threat intelligence to provide situational awareness and actionable insights

Forge Threat Report

Forge Report: First Half Threat Trends of 2024

Anvilogic Forge's latest report offers essential insights into key threat trends and adversarial tactics observed in the first half of 2024. From the pervasive use of PowerShell and remote access tools to sophisticated social engineering and attacks on the healthcare sector, this comprehensive analysis provides actionable intelligence and detection rules to bolster your defenses. Explore our key findings and access ready-to-deploy detection content to enhance your security posture.

All Threat Reports

Levels

All
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
This is some text inside of a div block.
06
-
14
-
2023

CVE-2023-34362: Signs of Clop & MOVEit Dates Back to 2021

The MOVEit vulnerability, CVE-2023-34362, has been exploited by the Clop ransomware gang since 2021. Researchers from Kroll and Huntress revealed that Clop meticulously planned for mass exploitation, with significant activity noted in April 2022 and early as July 2021. Recent attacks starting May 27, 2023, targeted numerous organizations for data theft and extortion, leveraging the long US holiday weekend. Clop has notified victims, demanding communication by June 14, 2023.

Technology
Financial Services
Healthcare
Government
Critical Infrastructure
Level:
Tactical
|
Source:
This is some text inside of a div block.
06
-
08
-
2023

Bl00dy Ransomware Compromises Indian University

The Bl00dy ransomware gang is actively targeting educational institutions using the PaperCut NG vulnerability CVE-2023-27350. The FBI and CISA issued advisories about this threat on May 12, 2023. Cyble Research and Intelligence Labs (CRIL) reported that Bl00dy has targeted at least six colleges and schools since May 1st. Their latest attack compromised an Indian university, with the group providing screenshots of their administrative access via RDP.

Education
Technology
Government
Cybersecurity
Level:
Strategic
|
Source:
This is some text inside of a div block.
06
-
08
-
2023

North Korea Refines Social Media Tactics for Targeting of Specific Sectors

A joint advisory from US and South Korean intelligence agencies warns of North Korean threat group Kimsuky targeting education, media, and think tanks. Kimsuky uses refined social media tactics and spearphishing for information collection. By impersonating trusted sources, Kimsuky tricks victims into exposing sensitive information, aiding the regime's cyber espionage efforts.

Education
Media
Think Tanks
Government
Defense
Level:
Strategic
|
Source:
This is some text inside of a div block.
06
-
08
-
2023

UAC-0006 Distributes SmokeLoader Backdoor

On May 29, 2023, CERT-UA reported a campaign by UAC-0006 distributing SmokeLoader malware via phishing emails. The emails contain archive attachments (HTML, VHDX, VHD) leading to a JavaScript loader that downloads and installs SmokeLoader. An error led to a Cobalt Strike beacon in one case. The campaign uses Russian domains and repurposed tools, attributed to UAC-0006.

Global
Government
Technology
Financial Services
Healthcare
Level:
Tactical
|
Source:
This is some text inside of a div block.
06
-
08
-
2023

Void Rabisu Shifts Motives for Geopolitical Opportunities

Trend Micro has identified a shift in Void Rabisu's motives, now targeting Ukrainian government, military, energy, and utilities sectors, as well as European and US allies. Since October 2022, Void Rabisu has deployed the RomCom backdoor, refining it for command execution and detection evasion. The group uses Google Ads and phishing to distribute RomCom, posing as legitimate software like AstraChat. The malware's capabilities include data exfiltration, remote access, and cryptocurrency theft.

Defense
Government
Utilities
Water
Level:
Tactical
|
Source:
This is some text inside of a div block.
06
-
08
-
2023

G20 Nations Face Cyber Threats from Chinese APT Group

The Chinese APT group SharpPanda is targeting government entities in G20 nations, using spearphishing with outdated Microsoft Office vulnerabilities and backdoor malware for espionage. Researchers from Cyble report that the group's activities have increased since 2018. SharpPanda uses tools like RoyalRoad to exploit vulnerabilities and establish persistence, gathering sensitive data from targeted systems.

Government
Defense
Technology
Telecommunications
Level:
Tactical
|
Source:

About the Forge & Threat Reports

Deploy and maintain detections and threat hunt across all of your logging platforms and security tools without centralizing your data or deploying new agents.

Our mission is to assess the operational behaviors of all threats to provide the community, and our customers, with actionable information and enterprise-ready detections in order to defend themselves in an ever- changing threat landscape.
Sign Up For Weekly Threat Reports

Intelligence Levels for Threat Reports

Tactical

Detectable threat behaviors for response with threat scenarios or threat identifiers.

Strategic

General information security news, for awareness.

Whitepapers

No items found.

The World's Best SOC Teams Use Anvilogic

Paypal Logo
Sprinklr Logo
SAP Logo
SAP Logo
Regeneron Logo
Regeneron Logo
SurveyMonkey Logo
TradeWeb Logo
Alteryx Logo
First Citizens Bank Logo
Crypto.com Logo
Rakuten Mobile Logo
St. George's University Logo
Navan Logo
ADP Logo
ADP Logo
Labcorp Logo
Dyson Logo
siemens Logo
Research to keep you up-to-date on threats
Learn More
Interested in joining the Anvilogic team?
See Careers

Build Detections You Want, Where You Want