Anvilogic Forge Threat Research Reports
Here you can find an accumulation of trending threats published weekly by the Anvilogic team.
We curate threat intelligence to provide situational awareness and actionable insights
Atomic detections that serve as the foundation of our detection framework.
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024



Featured Threat Reports


All Threat Reports
Tracking Cyber Espionage Campaigns Against Telecom Companies
Cybereason reveals Chinese-aligned cyber espionage against telecom companies, including Operation DeadRinger and Operation SoftCell. These campaigns compromised sensitive data, impacting business and government figures, and siphoning trade secrets. The stolen data affects R&D investments and gives competitors an edge.
Concerns of Russian Cyberattacks to Norway's Oil & Gas Industry
Amid the Russia-Ukraine war, Norway, supplying 10% of Europe's gas, faces rising threats from Russian cyberattacks. Prime Minister Støre acknowledges the serious threat, prompting increased security measures. Past critiques highlight the need for improved cybersecurity in Norway's petroleum sector.
Iranian Threat Group Dodges Attributions Through False-Flag Personas
The FBI reports Iranian cyber group Emennet Pasargad uses false-flag personas to deflect attribution, targeting Israel and the US in hack-and-leak campaigns. The group exploits vulnerabilities like Log4Shell, broadcasting attacks on social media to undermine confidence and cause reputational damage.
Exploit of VMware Vulnerability for DDoS, Ransomware or Cryptomining
Fortinet researchers report threat actors exploiting VMware vulnerability CVE-2022-22954 to deploy DDoS attacks, ransomware, and cryptominers. Using bash and PowerShell scripts, attackers target Linux and Windows systems, downloading malicious payloads from Cloudflare IPFS gateways. Ransomware uses WinRAR to lock files, demanding payment of 2XMR tokens.
Connecting Ransom Cartel Ransomware with REvil
Unit42 researchers report potential connections between Ransom Cartel and REvil ransomware, noting similarities in TTPs and encryption code. Ransom Cartel, emerging in December 2021, uses advanced techniques like PrintNightmare for privilege escalation and DonPAPI for credential harvesting, suggesting a revival of REvil's capabilities.
TeamTNT Resurfaces?
Trend Micro researchers uncover potential new activity from TeamTNT, exploiting misconfigured Docker APIs to deploy coinminers. The activity involves using ZGrab network scanner, malicious shell scripts, and deploying XMRIG cryptocurrency miner. The recent actions suggest TeamTNT may still be active or imitated by a copycat group.
Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
.png)
Whitepapers
The World's Best SOC Teams Use Anvilogic

.png)




.png)