Anvilogic Forge Threat Research Reports
Here you can find an accumulation of trending threats published weekly by the Anvilogic team.
We curate threat intelligence to provide situational awareness and actionable insights
Atomic detections that serve as the foundation of our detection framework.
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024



Featured Threat Reports


All Threat Reports
Anonymous Hacker Group Potentially Hacks Nestlé
On March 22nd, 2022, Anonymous claimed to have hacked 10GB of data from Nestlé due to their continued operations in Russia. Nestlé denies the hack, stating the data was accidentally released in February. The company has since limited its offerings in Russia.
Okta Shares Investigation Update - 2022-03-24
Okta's investigation into the Lapsus$ breach reveals it originated from a Sitel support engineer's workstation accessed via RDP. The engineer's "SuperUser" privileges were limited to basic support duties. The breach, detected on January 20, 2022, was contained within an hour. Okta has provided a detailed incident timeline.
Okta Updates ~2.5% Customers Impacted From Breach
Okta's Chief Security Officer, David Bradbury, reports that 366 customers, roughly 2.5% of all Okta customers, were impacted by the January 2022 breach. The exposed data may have been viewed or acted upon. Customers were notified about potential security threats, including API token creation and suspicious sign-ins.
Wizard Spider's Naver Phishing Campaign
Prevailion's PACT uncovers a phishing campaign by Wizard Spider targeting Naver credentials. The campaign, active since August 2021, uses over 540 domains tied to TrickBot infrastructure and leverages CVE-2021-40444 to deploy Conti ransomware.
Sandworm APT Hunts for Asus Routers
The Cyclops Blink botnet, linked to Sandworm APT, is now targeting Asus routers after initially focusing on WatchGuard Firebox. Active since 2019, this botnet aims for widescale infection, enhancing data collection and potential attack vectors. The exact purpose remains unclear, but compromised routers increase its power and reach.
Russian State-Sponsored Cyber Actors Exploit "PrintNightmare"
The FBI and CISA report that Russian state-sponsored actors exploited the PrintNightmare vulnerability (CVE-2021-34527) and flaws in Duo MFA to compromise an NGO in May 2021. They used internal Windows tools for reconnaissance, registry modifications, file collection, and credential theft, leveraging default MFA configurations and re-enrollment flaws.
Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
.png)
Whitepapers
The World's Best SOC Teams Use Anvilogic

.png)




.png)