Anvilogic Forge Threat Research Reports
Here you can find an accumulation of trending threats published weekly by the Anvilogic team.
We curate threat intelligence to provide situational awareness and actionable insights
Atomic detections that serve as the foundation of our detection framework.
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024



Featured Threat Reports


All Threat Reports
Use of windows Shortcut/LNK Files has Risen Significantly with Threat Actors
SentinelOne research reveals a significant rise in malicious LNK file usage following Microsoft's macro disablement. Analyzing 27,510 LNK files, they found Windows Explorer and PowerShell as primary executables. Tools like mLNK and QuantumBuilder aid in crafting these files, used by malware families like Qakbot and Emotet in phishing campaigns.
Chinese Espionage Campaign Targets Eastern European and Afghanistan
Kaspersky reported a Chinese espionage campaign targeting Eastern European and Afghan research, government, and military organizations. Using spearphishing and exploiting CVE-2017-11882, attackers deployed malware such as PortDoor and nccTrojan. The campaign is attributed to Chinese APT group TA428 based on tool usage and C2 infrastructure.
Cisco Shares Data Breach From May 2022
Cisco's corporate network was breached in May 2022 through phishing and MFA bypass. Attackers used sophisticated techniques, gaining access to VPN and deploying tools like Cobalt Strike and Mimikatz. They obtained sensitive data, including NDAs and engineering schematics. Despite claims, Cisco found no ransomware deployment evidence.
Vulnerabilities Found in Federal Emergency Alert Systems
FEMA has alerted participants to vulnerabilities in emergency alert systems (EAS) that could enable hackers to broadcast fake alerts on TV, radio, and cable networks. Discovered by researcher Kyle Pyle, these issues stem from outdated software and lack of centralized management. Mobile emergency alerts remain unaffected.
Lazarus Group Hacks Cryptocurrency Firm
Lazarus Group hacked an unnamed cryptocurrency firm, stealing hundreds of thousands in clients' crypto funds. Using phishing emails and custom tools, they breached the network, harvested credentials, and moved laterally. Despite initial removal efforts, they returned via an unprotected host to complete multiple crypto transfers.
Lazarus Lures Victims with Coinbase Job Themes
Lazarus Group's new phishing campaign targets job seekers with fake Coinbase job offers. Victims receive an executable file disguised as a PDF when downloading job descriptions. The campaign uses GitHub for command and control and has similarities with past Lazarus operations targeting major companies.
Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
.png)
Whitepapers
The World's Best SOC Teams Use Anvilogic

.png)




.png)