Anvilogic Forge Threat Research Reports
Here you can find an accumulation of trending threats published weekly by the Anvilogic team.
We curate threat intelligence to provide situational awareness and actionable insights
Atomic detections that serve as the foundation of our detection framework.
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024



Featured Threat Reports


All Threat Reports
Experimentation with the ClickFix Campaign by State-Sponsored Actors
Proofpoint observed state-linked actors from North Korea, Iran, and Russia each experimenting with ClickFix—an execution technique involving fake CAPTCHAs and PowerShell. Though limited in duration, the use of ClickFix across diverse APT groups suggests growing interest in refining social engineering tactics for espionage, persistence, and initial access operations.
Unit 42 Urges Understanding of Prompt Attacks Amid Rapid GenAI Expansion
Unit 42’s latest report urges stronger defenses against prompt attacks targeting GenAI systems. Threats like goal hijacking, data leakage, and infrastructure misuse are growing across sectors like healthcare and finance. The report introduces a risk-impact framework, AI agent attack examples, and mitigation tactics for securing GenAI deployments.
Law Enforcement Cracks Down on Smokeloader Malware-as-a-Service Network
Following Operation Endgame, Europol and international partners have arrested and investigated users of the Smokeloader botnet. These actors purchased pay-per-install access to infected systems for cybercrime operations including ransomware, spyware, and cryptomining. Seized databases helped trace user identities, reinforcing law enforcement’s crackdown on malware-as-a-service infrastructure.
Fake CAPTCHA Campaign Delivers LegionLoader via Malicious PDFs
Netskope uncovered a fake CAPTCHA campaign that lures users with PDF search bait, delivering LegionLoader via MSI downloads and DLL sideloading. The malware deploys a fake browser extension to exfiltrate cookies, history, and crypto data. Targeted sectors include finance and technology across North America, Asia, and Europe.
Microsoft Patches Privilege Escalation Bug Used by RansomEXX in Targeted Attacks
Microsoft patched CVE-2025-29824, a CLFS driver zero-day exploited by RansomEXX (Storm-2460) to escalate privileges and launch targeted ransomware attacks across finance, retail, real estate, and tech sectors. The exploit chain involved certutil, PipeMagic malware, and LSASS dumping via dllhost.exe. Systems running Windows 11 24H2 are unaffected.
Joint Advisory Flags Fast Flux Infrastructure, Enables Resilient C2 Operations
A joint advisory from CISA and international partners highlights fast flux infrastructure enabling stealthy, persistent C2 operations. Used by ransomware groups like Hive and Gamaredon, this technique rotates DNS records rapidly to evade blocking. Recommendations include DNS logging, PDNS, anomaly detection, and close coordination with ISPs and security vendors.
Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
.png)
Whitepapers
The World's Best SOC Teams Use Anvilogic




