

We curate threat intelligence to provide situational awareness and actionable insights
Threat Identifier Detections
Atomic detections that serve as the foundation of our detection framework.
Threat Scenario Detections
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
Reports Hot Off the Forge
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024




All Threat Reports
Beware of RCE Vulnerability in MSMQ SERVICE
A critical RCE vulnerability (CVE-2023-21554), dubbed QueueJumper, in Microsoft MSMQ service has been patched. Check Point Research found it can be exploited with one packet to port 1801/tcp, affecting over 360,000 IPs. Administrators should verify if MSMQ is installed and apply the necessary patches immediately.
Lazarus Group Unleashed 'DeathNote' Campaign on Defense Industry and Cryptocurrency Targets
The Lazarus Group's DeathNote campaign targets defense and cryptocurrency sectors with sophisticated malware. Utilizing weaponized documents and Trojanized applications, the campaign executes malware downloaders, conducts reconnaissance, and exfiltrates valuable data. The campaign has been active since 2020, expanding its techniques and target profile over time.
A Flaw in Azure's Shared Key Authorization Poses Risk to Cloud Security
Orca Security researchers discovered a 'by-design flaw' in Azure's Shared Key authorization, posing significant cloud security risks. The flaw enables attackers to manipulate storage accounts, steal access tokens, and execute remote code, compromising critical business assets. Despite acknowledging the issue, Microsoft has opted for updates instead of redesigning the system.
A Destructive Pairing with MuddyWater and DEV-1084
A collaboration between Iranian threat actor, MERCURY (aka MuddyWater) and threat actor Microsoft tracks as DEV-1084 has been observed. According to a report from the Microsoft Threat Intelligence team the two groups worked in tandem to compromise an on-premises and cloud environment.
Cl0p Ransomware: Active Threat Plaguing Businesses Worldwide
Cl0p ransomware, active since 2019, is a significant global threat, targeting IT, financial services, healthcare, and professional services. Exploiting vulnerabilities like CVE-2023-0669, Cl0p has compromised over 130 companies. With links to Russian affiliates and the addition of a Linux encryptor, Cl0p's threat continues to grow.
KillNet's Unrelenting DDoS Against Healthcare Providers
The pro-Russia hacktivist group KillNet has been relentlessly targeting US healthcare providers with DDoS attacks since December 2022. Over 90 attacks on healthcare systems, hospitals, and medical centers have been reported, causing network disruptions. KillNet's activities are ongoing, targeting critical healthcare sub-sectors and vocalizing their efforts on Telegram channels.

About the Forge & Threat Reports
Our mission is to assess the operational behaviors of all threats to provide the community, and our customers, with actionable information and enterprise-ready detections in order to defend themselves in an ever- changing threat landscape.

Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
Whitepapers

The World's Best SOC Teams Use Anvilogic
Build Detections You Want, Where You Want






.png)