Anvilogic Forge Threat Research Reports

Here you can find an accumulation of trending threats published weekly by the Anvilogic team.

We curate threat intelligence to provide situational awareness and actionable insights

Threat Identifier Detections

Atomic detections that serve as the foundation of our detection framework.

Threat Scenario Detections

Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.

Reports Hot Off the Forge

Threat News Reports
Trending Threat Reports
ResearchArticles

Forge Threat Report

Forge Report: First Half Threat Trends of 2024

Anvilogic Forge's latest report offers essential insights into key threat trends and adversarial tactics observed in the first half of 2024. From the pervasive use of PowerShell and remote access tools to sophisticated social engineering and attacks on the healthcare sector, this comprehensive analysis provides actionable intelligence and detection rules to bolster your defenses. Explore our key findings and access ready-to-deploy detection content to enhance your security posture.

All Threat Reports

Levels

All
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
This is some text inside of a div block.
02
-
15
-
2024
Level:
Tactical
|
Source:

Excel Document Used as Entry Point for Info-Stealer

In January 2024, Fortinet's Pei Han Liao reported a sophisticated malware campaign by a Vietnamese threat actor using an Excel document as the entry point. The attack chain begins with a VBA script in the Excel file, triggering a PowerShell command to download additional malicious scripts, culminating in a Python-based info-stealer. This malware harvests cookies and login data from browsers, packaging them for exfiltration to the attacker's telegram bot. The use of GitLab repositories for hosting malware complicates detection, revealing the actor's evolving capabilities and broader involvement in the cyber threat landscape since August 2023.

Global
This is some text inside of a div block.
02
-
15
-
2024
Level:
Tactical
|
Source:

A Two-Decade Threat Evolution of Russian APT Group, APT28

Trend Micro's analysis reveals the two-decade evolution of APT28, a Russian APT group known for its cyber espionage across various sectors worldwide. Initially employing brute-force tactics, APT28 has sophisticatedly adapted, leveraging critical vulnerabilities and covert methodologies for espionage. Recent campaigns show advanced phishing and malware distribution tactics, targeting government, defense, and private sectors. Despite a reputation for aggressive campaigns, APT28's subtle initial intrusions and complex post-exploitation strategies underline their adaptability and continued threat to global cybersecurity.

Aerospace
Defense
Energy
Financial
Government
This is some text inside of a div block.
02
-
15
-
2024
Level:
Tactical
|
Source:

Security Agencies Heighten Concerns Over Volt Typhoon's Cyber Operations

The joint advisory by CISA, NSA, FBI, and partners raises alarms over Volt Typhoon's cyber-espionage, linked to Chinese interests. Targeting critical infrastructure, they utilize sophisticated techniques for long-term access, pre-positioning for potential disruptive actions. Recommendations focus on detecting living-off-the-land techniques and enhancing defenses against these state-sponsored cyber threats.

Communications
Critical Infrastructure
Energy
Water
This is some text inside of a div block.
02
-
08
-
2024
Level:
Strategic
|
Source:

Vital Warning Issued by the FBI and CISA to Secure Against China's Escalating Cyber Threats

The FBI and CISA have released an urgent warning regarding the growing cyber threats from Chinese government-sponsored activities, targeting critical U.S. infrastructure sectors like energy, water, and transportation. FBI Director Christopher A. Wray emphasizes the need for heightened vigilance against these threats, highlighting recent efforts to disrupt the Volt Typhoon hacking group's malware attacks on Wi-Fi routers.

Critical Infrastructure
Energy
Oil and Gas
Transportation
Water
This is some text inside of a div block.
02
-
08
-
2024
Level:
Tactical
|
Source:

TA576's Tax-Season Assault with New SyncAppvPublishingServer Attack Strategy

TA576's recent campaign exploits the tax season to target North American financial organizations with sophisticated phishing lures. Proofpoint researchers Tommy Madjar and Selena Larson highlight the use of compromised accounts and cleverly disguised emails to deploy malware via a Google Firebase URL. This year's innovation lies in bypassing PowerShell detection through SyncAppvPublishingServer.vbs, leading to the deployment of the Parallax RAT.

Financial
This is some text inside of a div block.
02
-
08
-
2024
Level:
Tactical
|
Source:

USB-Driven Threats Orchestrated by UNC4990's Financially-Motivated Campaign

UNC4990, identified as a financially motivated threat group, employs sophisticated tactics involving USB devices to initiate malware infections. Through Mandiant's analysis, the campaign's reliance on legitimate websites like Ars Technica, GitHub, GitLab, and Vimeo for payload hosting emerges as a key evasion strategy. Utilizing encoded LNK files and the EMPTYSPACE downloader, the group targets Italy-based users, complicating detection efforts. The operation's complexity is further demonstrated by the use of QUIETBOARD, a modular backdoor, highlighting the importance of robust removable device policies for organizational defense.

Global

Intelligence Levels for Threat Reports

Tactical

Detectable threat behaviors for response with threat scenarios or threat identifiers.

Strategic

General information security news, for awareness.

Whitepapers

No items found.

Trusted by leading teams at

Paypal Logo
Rubrik Logo
Deloitte Logo
Ebay Logo
Regeneron Logo
SurveyMonkey Logo
TradeWeb Logo
Alteryx Logo
First Citizens Bank Logo
Crypto.com Logo
Rakuten Mobile Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
Paypal Logo
Sprinklr Logo
SAP Logo
Ebay Logo
Regeneron Logo
SurveyMonkey Logo
TradeWeb Logo
Alteryx Logo
First Citizens Bank Logo
Crypto.com Logo
Rakuten Mobile Logo
St. George's University Logo
Navan Logo
ADP Logo
Labcorp Logo
Dyson Logo
siemens Logo

Build Detections You Want,
Where You Want

Build Detections You Want,
Where You Want