Anvilogic Forge Threat Research Reports

Here you can find an accumulation of trending threats published weekly by the Anvilogic team.

We curate threat intelligence to provide situational awareness and actionable insights

Threat Identifier Detections

Atomic detections that serve as the foundation of our detection framework.

Threat Scenario Detections

Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.

Reports Hot Off the Forge

Threat News Reports
Trending Threat Reports
ResearchArticles

Forge Threat Report

Forge Report: First Half Threat Trends of 2024

Anvilogic Forge's latest report offers essential insights into key threat trends and adversarial tactics observed in the first half of 2024. From the pervasive use of PowerShell and remote access tools to sophisticated social engineering and attacks on the healthcare sector, this comprehensive analysis provides actionable intelligence and detection rules to bolster your defenses. Explore our key findings and access ready-to-deploy detection content to enhance your security posture.

All Threat Reports

Levels

All
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
This is some text inside of a div block.
10
-
25
-
2022
Level:
Strategic
|
Source:

Tracking Cyber Espionage Campaigns Against Telecom Companies

Cybereason reveals Chinese-aligned cyber espionage against telecom companies, including Operation DeadRinger and Operation SoftCell. These campaigns compromised sensitive data, impacting business and government figures, and siphoning trade secrets. The stolen data affects R&D investments and gives competitors an edge.

Telecommunication
Government
Information & Technology
This is some text inside of a div block.
10
-
25
-
2022
Level:
Strategic
|
Source:

Concerns of Russian Cyberattacks to Norway's Oil & Gas Industry

Amid the Russia-Ukraine war, Norway, supplying 10% of Europe's gas, faces rising threats from Russian cyberattacks. Prime Minister Støre acknowledges the serious threat, prompting increased security measures. Past critiques highlight the need for improved cybersecurity in Norway's petroleum sector.

Oil and Gas
Energy
Critical Infrastructure
This is some text inside of a div block.
10
-
25
-
2022
Level:
Tactical
|
Source:

Iranian Threat Group Dodges Attributions Through False-Flag Personas

The FBI reports Iranian cyber group Emennet Pasargad uses false-flag personas to deflect attribution, targeting Israel and the US in hack-and-leak campaigns. The group exploits vulnerabilities like Log4Shell, broadcasting attacks on social media to undermine confidence and cause reputational damage.

Government
Media & Entertainment
Telecommunications
This is some text inside of a div block.
10
-
25
-
2022
Level:
Tactical
|
Source:

Exploit of VMware Vulnerability for DDoS, Ransomware or Cryptomining

Fortinet researchers report threat actors exploiting VMware vulnerability CVE-2022-22954 to deploy DDoS attacks, ransomware, and cryptominers. Using bash and PowerShell scripts, attackers target Linux and Windows systems, downloading malicious payloads from Cloudflare IPFS gateways. Ransomware uses WinRAR to lock files, demanding payment of 2XMR tokens.

Information & Technology
Finance
Healthcare
This is some text inside of a div block.
10
-
25
-
2022
Level:
Tactical
|
Source:

Connecting Ransom Cartel Ransomware with REvil

Unit42 researchers report potential connections between Ransom Cartel and REvil ransomware, noting similarities in TTPs and encryption code. Ransom Cartel, emerging in December 2021, uses advanced techniques like PrintNightmare for privilege escalation and DonPAPI for credential harvesting, suggesting a revival of REvil's capabilities.

Education
Energy
Manufacturing
Industrial
This is some text inside of a div block.
10
-
25
-
2022
Level:
Tactical
|
Source:

TeamTNT Resurfaces?

Trend Micro researchers uncover potential new activity from TeamTNT, exploiting misconfigured Docker APIs to deploy coinminers. The activity involves using ZGrab network scanner, malicious shell scripts, and deploying XMRIG cryptocurrency miner. The recent actions suggest TeamTNT may still be active or imitated by a copycat group.

Cybersecurity

Intelligence Levels for Threat Reports

Tactical

Detectable threat behaviors for response with threat scenarios or threat identifiers.

Strategic

General information security news, for awareness.

Whitepapers

No items found.

The World's Best SOC Teams Use Anvilogic

Paypal Logo
Rubrik Logo
Deloitte Logo
Ebay Logo
Regeneron Logo
SurveyMonkey Logo
TradeWeb Logo
Alteryx Logo
First Citizens Bank Logo
Crypto.com Logo
Rakuten Mobile Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
Paypal Logo
Sprinklr Logo
SAP Logo
Ebay Logo
Regeneron Logo
SurveyMonkey Logo
TradeWeb Logo
Alteryx Logo
First Citizens Bank Logo
Crypto.com Logo
Rakuten Mobile Logo
St. George's University Logo
Navan Logo
ADP Logo
Labcorp Logo
Dyson Logo
siemens Logo

Build Detections You Want,
Where You Want

Build Detections You Want,
Where You Want