Anvilogic Forge Threat Research Reports
Here you can find an accumulation of trending threats published weekly by the Anvilogic team.
We curate threat intelligence to provide situational awareness and actionable insights
Atomic detections that serve as the foundation of our detection framework.
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024



Featured Threat Reports


All Threat Reports
FTC Alerts a Surge in Bitcoin ATM Scams Citing Record Highs in Loses
The FTC warns of a surge in Bitcoin ATM scams, with over $110 million lost in 2023. Scammers use fake security alerts and impersonation tactics to manipulate victims into depositing funds into their cryptocurrency wallets. The FTC advises caution, urging individuals to verify contacts and avoid hasty financial actions.
APT33's Range of Attacks from Password Spraying to Proficiency in Azure
Iranian threat actor APT33, active from April to July 2024, targets aerospace, defense, and other sectors using password spraying, custom malware, and Azure misuse. The group aims for intelligence gathering through advanced tactics. Microsoft advises countermeasures like multifactor authentication to combat APT33's evolving cyber threats.
RansomHub's Extensive Reach in Threatening Critical Infrastructure with 210 Victims and Counting
Since February 2024, RansomHub has targeted 210 critical infrastructure organizations across various sectors. Utilizing affiliates from other ransomware groups, the gang employs phishing, vulnerability exploitation, and double extortion tactics. Affected sectors include healthcare, government, and transportation. Security agencies urge organizations to follow mitigation steps to defend against this expanding threat.
Chinese Threat Group Volt Typhoon Identified in Versa Director Exploitation
Volt Typhoon, a Chinese threat group, is exploiting CVE-2024-39717, a zero-day vulnerability in Versa Director servers. The flaw allows attackers to upload malicious Java files and execute commands in memory, affecting ISPs and tech firms. U.S. agencies urge immediate patching and enhanced firewall protection to prevent further intrusions.
Bling Libra Strikes AWS for S3 Data Deletion and Extortion
Bling Libra, a threat group linked to ShinyHunters, has compromised AWS environments through exposed credentials, leading to S3 data deletion and extortion. Using tools like S3 Browser and WinSCP, the group exfiltrates data before deletion. Unit 42 recommends enabling comprehensive AWS logging and monitoring for mismanaged credentials.
U.S. Agencies Warn of Iranian Cyber Groups Partnering with Ransomware Affiliates
U.S. agencies, including the FBI and CISA, warn of Iranian cyber actors collaborating with ransomware groups to target critical sectors like defense, finance, healthcare, and education. These groups exploit vulnerabilities in networking devices, deploy webshells, and facilitate ransomware attacks with groups like ALPHV/BlackCat. Mitigation strategies focus on patching systems, hardening defenses, and monitoring for anomalies.
Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
.png)
Whitepapers
Trusted by leading teams at

.png)


