Anvilogic Forge Threat Research Reports
Here you can find an accumulation of trending threats published weekly by the Anvilogic team.
We curate threat intelligence to provide situational awareness and actionable insights
Atomic detections that serve as the foundation of our detection framework.
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024



Featured Threat Reports


All Threat Reports
The US Government Reveals Top Vulnerabilities Exploited by Chinese-state Actors
The NSA, CISA, and FBI identify top vulnerabilities exploited by Chinese-state actors, including Log4Shell and ProxyLogon. The advisory highlights threats to critical infrastructure, IT, and DIB sectors, urging prompt patching, MFA implementation, and robust logging for detection.
APT Group Targets Industrial Base with Impacket
CISA alerts on an APT attack against the defense industrial base, using Impacket tools and compromised credentials. The attackers targeted Exchange servers and deployed CovalentStealer for data exfiltration. The incident spanned from November 2021 to January 2022, with system reconnaissance and unauthorized access via OWA and EWS.
Leveraging Exchange Telemetry in O365 Mailbox Attack
Red Canary reports a payroll diversion fraud campaign targeting O365 mailboxes. Attackers compromise accounts, create forwarding rules, and send fictitious direct deposit requests. The attack sequence occurs within 12 minutes, highlighting the importance of leveraging detection analytics focused on O365 logins and mailbox tampering.
The Newly Rebranded Emperor Dragonfly Strikes
Sygnia researchers discover Emperor Dragonfly, a new threat group formed from Cheerscrypt and Night Sky. The group exploits Log4Shell (CVE-2021-4428), uses Cobalt Strike and Go-based tools, and deploys ransomware. Evidence suggests potential Chinese allegiances, though the group’s full affiliations remain unclear.
Meta Removes Influence Networks Operated by China & Russia
Meta has removed influence operations from China and Russia on Facebook and Instagram for violating policies on Coordinated Inauthentic Behavior (CIB). These networks targeted political themes and international policies, impersonating news outlets and playing various sides of political groups. The operations antagonized Ukraine and targeted multiple countries.
Lazarus Masquerades as Crypto[.]com in Updated Job Offer Campaign
SentinelOne reports that Lazarus Group, a North Korean threat actor, targets cryptocurrency users with fake job offers from Crypto[.]com. The campaign, part of "Operation In(ter)ception," employs macOS and Windows malware to steal digital assets. Users are advised to be wary of unsolicited job offers.
Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
.png)
Whitepapers
The World's Best SOC Teams Use Anvilogic

.png)




.png)