Anvilogic Forge Threat Research Reports

Here you can find an accumulation of trending threats published weekly by the Anvilogic team.

We curate threat intelligence to provide situational awareness and actionable insights

Threat Identifier Detections

Atomic detections that serve as the foundation of our detection framework.

Threat Scenario Detections

Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.

Reports Hot Off the Forge

Threat News Reports
Trending Threat Reports
ResearchArticles

Forge Threat Report

Forge Report: First Half Threat Trends of 2024

Anvilogic Forge's latest report offers essential insights into key threat trends and adversarial tactics observed in the first half of 2024. From the pervasive use of PowerShell and remote access tools to sophisticated social engineering and attacks on the healthcare sector, this comprehensive analysis provides actionable intelligence and detection rules to bolster your defenses. Explore our key findings and access ready-to-deploy detection content to enhance your security posture.

All Threat Reports

Levels

All
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
This is some text inside of a div block.
03
-
22
-
2022
Level:
Strategic
|
Source:

A Review of Lapsus$

Lapsus$ group, analyzed by Wired, specializes in data theft and extortion, targeting high-profile companies without political motives. Known for their social media presence and unorganized structure, their exact location remains speculative.

Cybersecurity
Media & Entertainment
Technology
This is some text inside of a div block.
03
-
22
-
2022
Level:
Tactical
|
Source:

EXOTIC LILY - Initial Access Brokers

Google's Threat Analysis Group (TAG) identifies EXOTIC LILY as initial access brokers linked to Wizard Spider/FIN12 and ransomware groups like Conti and Diavol. Active since November 2021, they target healthcare, IT, and more with phishing campaigns, using legitimate file-sharing services for payload delivery, including ISO files with hidden BazarLoader DLLs.

Cybersecurity
Healthcare
Information
Technology
This is some text inside of a div block.
03
-
22
-
2022
Level:
Tactical
|
Source:

Initial Story: Okta Potential Data Breach

Okta, an authentication provider, is investigating claims by the data extortion group Lapsus$ of a data breach. The group alleges having "Superuser/Admin" access to Okta's systems for two months, targeting Okta customers. An Okta spokesperson suggested the incident might be linked to a third-party customer support engineer's compromised account in January 2022. The investigation is ongoing.

Technology
This is some text inside of a div block.
03
-
22
-
2022
Level:
Tactical
|
Source:

Revising Kaseya's Attack by Red Canary

Red Canary revisits the Kaseya supply chain attack from July 2021, where the Kaseya VSA agent executed suspicious actions such as modifying Windows Defender and registry keys. REvil's involvement was noted with specific registry paths used. The analysis provides critical insights into the incident response and attack techniques.

Technology
This is some text inside of a div block.
03
-
22
-
2022
Level:
Tactical
|
Source:

Okta Potential Data Breach

Okta is investigating claims of a data breach by Lapsus$, which alleges having "Superuser/Admin" access to Okta's systems for two months. The potential breach, reportedly tied to a compromised third-party support engineer's account, raises concerns over digital supply chain impacts. Okta continues to investigate the matter.

Technology
This is some text inside of a div block.
03
-
21
-
2022
Level:
Strategic
|
Source:

Rostec Hit with Cyberattack

On March 11th, 2022, Rostec, a Russian aerospace and defense conglomerate, was hit by a cyberattack that briefly took its website offline. The attack, reportedly by the IT Army of Ukraine, followed consistent attack activity since February. Rostec has since repelled the attack and restored its website.

Aerospace
Defense

Intelligence Levels for Threat Reports

Tactical

Detectable threat behaviors for response with threat scenarios or threat identifiers.

Strategic

General information security news, for awareness.

Whitepapers

No items found.

The World's Best SOC Teams Use Anvilogic

Paypal Logo
Rubrik Logo
Deloitte Logo
Ebay Logo
Regeneron Logo
SurveyMonkey Logo
TradeWeb Logo
Alteryx Logo
First Citizens Bank Logo
Crypto.com Logo
Rakuten Mobile Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
Paypal Logo
Sprinklr Logo
SAP Logo
Ebay Logo
Regeneron Logo
SurveyMonkey Logo
TradeWeb Logo
Alteryx Logo
First Citizens Bank Logo
Crypto.com Logo
Rakuten Mobile Logo
St. George's University Logo
Navan Logo
ADP Logo
Labcorp Logo
Dyson Logo
siemens Logo

Build Detections You Want,
Where You Want

Build Detections You Want,
Where You Want