Anvilogic Forge Threat Research Reports
Here you can find an accumulation of trending threats published weekly by the Anvilogic team.
We curate threat intelligence to provide situational awareness and actionable insights
Atomic detections that serve as the foundation of our detection framework.
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024



Featured Threat Reports


All Threat Reports
Muddled Libra Showcases Proficiency with Multiple Toolkits
Meet Muddled Libra: a crafty threat group that's caught the eye of the pros over at Unit42. They've got a toolbox filled with cyber tricks and aren't afraid to use it. Big industries, from tech to finance, need to keep an eye out, as Muddled Libra doesn't shy away from shaking things up, especially when it comes to software supply chains.
A Sophisticated But Thwarted Intrusion from Volt Typhoon
CrowdStrike successfully prevents a sophisticated intrusion attempt by Chinese threat group Volt Typhoon. Their tactics, which involved exploiting ManageEngine vulnerabilities and employing custom web shells, highlight the group's commitment to covert operations and thorough reconnaissance.
Major Financial Systems Under Threat by Pro-Russian Hackers
Russian hacker groups Killnet, REvil, and Anonymous Sudan are threatening severe cyberattacks on major financial institutions in Europe and the US, including SWIFT and the US Federal Reserve System. These attacks, announced in a video, are politically motivated, retaliating against Western support for Ukraine. The hackers claim their actions will go beyond DDoS attacks to more destructive activities, aligning with Killnet's known tactics.
Over 100 Popular Brands Impersonated in Large-Scale Phishing Campaign
Bolster's threat research team uncovered a large-scale phishing campaign targeting over 100 popular brands, including Nike, Adidas, and Puma. The campaign, active since June 2022, uses over 3,000 live domains to impersonate brands and steal personal and financial information from victims. Spikes in activity were observed in November 2022 and February 2023. The phishing sites use SEO techniques to rank high in search results, and the domains often combine brand names with locations. Bolster warns customers to be vigilant to avoid falling into these traps.
RomCom Threat Actor Attacks Ukrainian Politicians & US Healthcare Allies
RomCom, a threat actor, has reemerged targeting Ukrainian politicians and a US-based healthcare organization aiding refugees. BlackBerry reports that RomCom uses fake Devolutions Remote Desktop Manager installations to drop malicious payloads, focusing on intelligence collection related to geopolitical events in Ukraine and Western aid efforts. The malware is executed via RunDLL32, aiming to expand RomCom's knowledge for future campaigns.
An Ongoing Campaign of BEC Attacks
Sygnia's incident response team has identified a large-scale BEC campaign leveraging phishing emails and Adversary in the Middle (AiTM) tactics. The campaign targets Office365 accounts globally, using compromised credentials to add their own MFA devices and expand their reach. Attackers send phishing emails appearing from legitimate sources, leading victims to fraudulent login pages to steal credentials. This campaign spreads in a worm-like fashion, impacting numerous organizations.
Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
.png)
Whitepapers
Trusted by leading teams at

.png)


