Anvilogic Forge Threat Research Reports

Here you can find an accumulation of trending threats published weekly by the Anvilogic team.

We curate threat intelligence to provide situational awareness and actionable insights

Threat Identifier Detections

Atomic detections that serve as the foundation of our detection framework.

Threat Scenario Detections

Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.

Reports Hot Off the Forge

Threat News Reports
Trending Threat Reports
ResearchArticles

Forge Threat Report

Forge Report: First Half Threat Trends of 2024

Anvilogic Forge's latest report offers essential insights into key threat trends and adversarial tactics observed in the first half of 2024. From the pervasive use of PowerShell and remote access tools to sophisticated social engineering and attacks on the healthcare sector, this comprehensive analysis provides actionable intelligence and detection rules to bolster your defenses. Explore our key findings and access ready-to-deploy detection content to enhance your security posture.

All Threat Reports

Levels

All
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
This is some text inside of a div block.
04
-
13
-
2022
Level:
Tactical
|
Source:

New AsyncRAT & 3LOSH Crypter Malware Campaigns

Cisco Talos research tracks the use of 3LOSH crypter in malware campaigns distributing AsyncRAT and LimeRAT. These campaigns begin with an ISO disk image and use PowerShell scripts to create persistence and evade detection in corporate environments, showing increased activity over recent months.

Technology
This is some text inside of a div block.
04
-
13
-
2022
Level:
Strategic
|
Source:

Nordex Group's Cyber Attack

Nordex Group, a wind turbine manufacturer, experienced a cyberattack on March 31, 2022, leading to a precautionary shutdown of IT systems globally. The company's incident response team, comprising internal and external experts, was activated immediately to contain the issue and assess potential exposure. No further updates have been provided.

Manufacturing
This is some text inside of a div block.
04
-
13
-
2022
Level:
Strategic
|
Source:

ALPHV Ransomware Hits North Carolina A&T University

North Carolina A&T University was targeted by ALPHV ransomware between March 7-11, disrupting vital network services and compromising personal data. Recovery is ongoing, with significant student impact.

Education
Cybersecurity
Information & Technology
This is some text inside of a div block.
04
-
13
-
2022
Level:
Tactical
|
Source:

APT10/Cicada Espionage Attacks

Symantec reports an expanded espionage campaign by APT10 (Cicada) targeting government and NGO entities across Europe, Asia, and North America. Techniques include exploiting Microsoft Exchange Servers and using tools like Sodamaster and Mimikatz.

Government
Legal
Cybersecurity
Non-government organizations (NGOs)
This is some text inside of a div block.
04
-
13
-
2022
Level:
Tactical
|
Source:

Mandiant's Research of FIN7

Mandiant's updated research tracks the evolution of threat group FIN7 from late 2021 to early 2022, revealing its associations with ransomware operations like Maze, Darkside, Blackmatter, and ALPHV/Blackcat. FIN7 targets multiple industries, including financial services, food, medical, technology, transportation, and utilities. Mandiant tracks multiple uncategorized threat groups (UNCs) affiliated with FIN7. The group has refined its tools, with newer intrusions frequently using their PowerShell backdoor, PowerPlant, over older malware like LOADOUT and GRIFFON.

Financial
Transportation
This is some text inside of a div block.
04
-
13
-
2022
Level:
Strategic
|
Source:

Lambda Malware, Denonia

Cado Security has identified Denonia, a new malware targeting AWS Lambda environments to deploy cryptominers. Written in Go, Denonia uses GitHub libraries and contains XMRig cryptominer software. The malware utilizes DNS over HTTPS (DoH) for encrypted DNS queries. It can also run on select Linux systems. The exact deployment method is unknown, but it may involve compromising AWS Access and Secret Keys to manually deploy into Lambda environments.

Cybersecurity

Intelligence Levels for Threat Reports

Tactical

Detectable threat behaviors for response with threat scenarios or threat identifiers.

Strategic

General information security news, for awareness.

Whitepapers

No items found.

The World's Best SOC Teams Use Anvilogic

Paypal Logo
Rubrik Logo
Deloitte Logo
Ebay Logo
Regeneron Logo
SurveyMonkey Logo
TradeWeb Logo
Alteryx Logo
First Citizens Bank Logo
Crypto.com Logo
Rakuten Mobile Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
Paypal Logo
Sprinklr Logo
SAP Logo
Ebay Logo
Regeneron Logo
SurveyMonkey Logo
TradeWeb Logo
Alteryx Logo
First Citizens Bank Logo
Crypto.com Logo
Rakuten Mobile Logo
St. George's University Logo
Navan Logo
ADP Logo
Labcorp Logo
Dyson Logo
siemens Logo

Build Detections You Want,
Where You Want

Build Detections You Want,
Where You Want