Anvilogic Forge Threat Research Reports

Here you can find an accumulation of trending threats published weekly by the Anvilogic team.

We curate threat intelligence to provide situational awareness and actionable insights

Threat Identifier Detections

Atomic detections that serve as the foundation of our detection framework.

Threat Scenario Detections

Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.

Reports Hot Off the Forge

Threat News Reports
Trending Threat Reports
ResearchArticles

Forge Threat Report

Forge Report: First Half Threat Trends of 2024

Anvilogic Forge's latest report offers essential insights into key threat trends and adversarial tactics observed in the first half of 2024. From the pervasive use of PowerShell and remote access tools to sophisticated social engineering and attacks on the healthcare sector, this comprehensive analysis provides actionable intelligence and detection rules to bolster your defenses. Explore our key findings and access ready-to-deploy detection content to enhance your security posture.

All Threat Reports

Levels

All
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
This is some text inside of a div block.
03
-
29
-
2022
Level:
Tactical
|
Source:

Energy Sector Targeted by Russian Cyber Actors

CISA, FBI, and DOE reveal Russian-state sponsored hackers targeted the energy sector from 2011 to 2018. Indicted by the DOJ, the FSB group used malware like Havex and shifted tactics from spear-phishing to third-party compromises. Attackers exfiltrated ICS and OT information, including vendor details and system diagrams.

Energy
This is some text inside of a div block.
03
-
29
-
2022
Level:
Strategic
|
Source:

FBI's Internet Crime Report for 2021

The FBI’s Internet Crime Complaint Center (IC3) 2021 report tracks various internet crimes, with ransomware being a significant concern. IC3 received 3,729 ransomware complaints, affecting 14 out of 16 critical infrastructure sectors. Top victims include Healthcare (148 complaints) and Financial Services (89). Major ransomware variants were Conti, LockBit, and REvil/Sodinokibi.

Critical Infrastructure
This is some text inside of a div block.
03
-
29
-
2022
Level:
Strategic
|
Source:

Google TAG Identifies Threats from North Korea

Google's Threat Analysis Group (TAG) has been tracking two North Korean threat campaigns, "Operation Dream Job" and "Operation AppleJeus," since February 10th. "Operation Dream Job" targets media and technology sectors, while "Operation AppleJeus" focuses on financial services, especially cryptocurrency and fintech. Both campaigns use a Google Chrome RCE vulnerability (CVE-2022-0609) to exploit victims, employing careful measures to evade detection, including system checks, specific time-based iframe serving, and a one-time-click policy.

Financial
Information & Technology
This is some text inside of a div block.
03
-
29
-
2022
Level:
Tactical
|
Source:

Mustang Panda’s New Korplug Variant

ESET identifies Mustang Panda using a new Korplug variant in a campaign dating back to August 2021, targeting East and Southeast Asia with phishing lures related to COVID-19 and geopolitical issues. The malware employs obfuscation and anti-analysis techniques, establishing persistence and communicating with C2 servers for additional commands.

Korplug Variant
Mustang Panda
Welivesecurity
This is some text inside of a div block.
03
-
29
-
2022
Level:
Tactical
|
Source:

Serpent Backdoor Malware

ProofPoint identifies a phishing campaign targeting French construction, government, and real estate sectors with Serpent backdoor malware. The campaign uses a Microsoft Word document with embedded macros and ASCII art, executing a PowerShell script that installs Chocolatey and Python to run a final malicious script from a .bat file.

Cybersecurity
This is some text inside of a div block.
03
-
29
-
2022
Level:
Tactical
|
Source:

Arrests of Seven Lapsus$ Hackers

London Police arrested seven teenagers connected to the Lapsus$ data extortion group. The 16-year-old alleged leader, who has reportedly accumulated $14 million, was not arrested. The teenager’s identity was exposed by rival hackers after a fallout, surprising his parents who believed his computer activities were related to online gaming.

Cybersecurity
Law Enforcement
Media
Education

Intelligence Levels for Threat Reports

Tactical

Detectable threat behaviors for response with threat scenarios or threat identifiers.

Strategic

General information security news, for awareness.

Whitepapers

No items found.

The World's Best SOC Teams Use Anvilogic

Paypal Logo
Rubrik Logo
Deloitte Logo
Ebay Logo
Regeneron Logo
SurveyMonkey Logo
TradeWeb Logo
Alteryx Logo
First Citizens Bank Logo
Crypto.com Logo
Rakuten Mobile Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
Paypal Logo
Sprinklr Logo
SAP Logo
Ebay Logo
Regeneron Logo
SurveyMonkey Logo
TradeWeb Logo
Alteryx Logo
First Citizens Bank Logo
Crypto.com Logo
Rakuten Mobile Logo
St. George's University Logo
Navan Logo
ADP Logo
Labcorp Logo
Dyson Logo
siemens Logo

Build Detections You Want,
Where You Want

Build Detections You Want,
Where You Want