Anvilogic Forge Threat Research Reports

Here you can find an accumulation of trending threats published weekly by the Anvilogic team.

We curate threat intelligence to provide situational awareness and actionable insights

Threat Identifier Detections

Atomic detections that serve as the foundation of our detection framework.

Threat Scenario Detections

Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.

Reports Hot Off the Forge

Threat News Reports
Trending Threat Reports
ResearchArticles

Forge Threat Report

Forge Report: First Half Threat Trends of 2024

Anvilogic Forge's latest report offers essential insights into key threat trends and adversarial tactics observed in the first half of 2024. From the pervasive use of PowerShell and remote access tools to sophisticated social engineering and attacks on the healthcare sector, this comprehensive analysis provides actionable intelligence and detection rules to bolster your defenses. Explore our key findings and access ready-to-deploy detection content to enhance your security posture.

All Threat Reports

Levels

All
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
This is some text inside of a div block.
07
-
03
-
2025
Level:
Tactical
|
Source:

Aggressive Scattered Spider Attacks Continue to Pose Grave Risk to Organizations Globally

Scattered Spider remains one of the most dangerous threat groups in operation, targeting global organizations with aggressive, fast-moving attacks. Halcyon reports the group’s use of social engineering, credential theft, and ransomware variants like DragonForce and Play to cause widespread operational damage across on-prem, cloud, and virtual environments.

Global
This is some text inside of a div block.
06
-
26
-
2025
Level:
Tactical
|
Source:

Scattered Spider Shifts Focus to U.S. Insurance Sector, Google Warns

Scattered Spider has turned its attention to the U.S. insurance industry, according to Google. Recent incidents at major providers suggest the group is using social engineering to bypass defenses, particularly targeting help desks and call centers. Organizations are urged to enhance identity verification and access control procedures immediately.

Insurance
This is some text inside of a div block.
06
-
26
-
2025
Level:
Tactical
|
Source:

North Korean Group Deploys Python-Based PylangGhost RAT in Job Scam Campaigns

Cisco Talos identified North Korean group Famous Chollima using the Python-based PylangGhost RAT in fake job recruitment scams. Masquerading as firms like Coinbase, the actor targets marketing and tech professionals. Victims unknowingly install the RAT, which enables file theft, persistence, and remote control across compromised systems.

Marketing
Professional Services
Technology
This is some text inside of a div block.
06
-
26
-
2025
Level:
Tactical
|
Source:

Water Curse Targets Devs and Red Teamers via Weaponized GitHub Repos

Trend Micro uncovered Water Curse, a threat actor weaponizing GitHub repositories to target developers, gamers, and red teamers. The campaign deploys multi-stage malware hidden in project files, enabling privilege escalation, data exfiltration, and persistent access. It leverages GitHub’s reach and legitimate services like Telegram and Gofile for command and control.

Gaming
Technology
This is some text inside of a div block.
06
-
19
-
2025
Level:
Strategic
|
Source:

INTERPOL’s Operation Secure Leads to 32 Arrests, 41 Server Seizures in Cybercrime Crackdown

INTERPOL’s Operation Secure dismantled major infostealer operations across 26 countries, arresting 32 individuals and seizing 41 servers. With backing from Group-IB, Kaspersky, and Trend Micro, the effort disrupted Lumma, META, and RisePro networks and notified over 216,000 victims, marking a major win in global cybercrime enforcement.

Global
This is some text inside of a div block.
06
-
19
-
2025
Level:
Tactical
|
Source:

Stealth Falcon Exploits CVE-2025-33053 in Targeted Espionage Across Middle East

APT group Stealth Falcon exploited CVE-2025-33053 in a new espionage campaign targeting defense and government entities in the Middle East. Using WebDAV-hosted malware, Horus Loader, and a customized Mythic-based implant, the group maintained stealth with LOLBins, obfuscation, and advanced evasion tactics, continuing its long-standing regional targeting strategy.

Defense
Government

Intelligence Levels for Threat Reports

Tactical

Detectable threat behaviors for response with threat scenarios or threat identifiers.

Strategic

General information security news, for awareness.

Whitepapers

No items found.

The World's Best SOC Teams Use Anvilogic

Paypal Logo
Rubrik Logo
Deloitte Logo
Ebay Logo
Regeneron Logo
SurveyMonkey Logo
TradeWeb Logo
Alteryx Logo
First Citizens Bank Logo
Crypto.com Logo
Rakuten Mobile Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
Paypal Logo
Sprinklr Logo
SAP Logo
Ebay Logo
Regeneron Logo
SurveyMonkey Logo
TradeWeb Logo
Alteryx Logo
First Citizens Bank Logo
Crypto.com Logo
Rakuten Mobile Logo
St. George's University Logo
Navan Logo
ADP Logo
Labcorp Logo
Dyson Logo
siemens Logo

Build Detections You Want,
Where You Want

Build Detections You Want,
Where You Want