Anvilogic Forge Threat Research Reports
Here you can find an accumulation of trending threats published weekly by the Anvilogic team.
We curate threat intelligence to provide situational awareness and actionable insights
Atomic detections that serve as the foundation of our detection framework.
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024



Featured Threat Reports


All Threat Reports
New Device Registration Tactic
Microsoft reports attackers exploiting unregistered devices for MFA to register on Azure AD. Using phishing campaigns to steal credentials, they gain access and expand their foothold in targeted organizations, primarily in Australia, Singapore, Indonesia, and Thailand. Over 100 mailboxes with specific Outlook rule entries were identified.
Lazarus Uses Windows Update Client
The Malwarebytes Threat Intelligence team identified a new Lazarus campaign, active since January 18, 2022. Lazarus targets defense industry professionals with fake job offers from companies like Lockheed Martin and Boeing. The campaign uses process injections and GitHub as its C2. One notable technique involves leveraging the Windows Update client to run a malicious DLL from an LNK file, evading security detection. Another variant uses mshta to execute a remote HTML page upon macro execution.
Log4Shell and Coinminers
BlackBerry Research & Intelligence and Incident Response (IR) discovered Prophet Spider exploiting the Log4j vulnerability (Log4Shell) on the VMware Horizon platform. Attacks were detected by monitoring child processes of ws_TomcatService.exe, which led to the execution of PowerShell or cmd scripts. Post-exploitation, additional tools were downloaded using PowerShell commands or curl. Persistence was achieved through scheduled tasks and web shells, with cleanup efforts observed to remove indicators.
German Intelligence Services warn of APT27
The German Domestic Intelligence Service (BfV) has issued an advisory on APT27 targeting German commercial organizations. The group uses the HyperBro RAT for remote access and is known for exploiting vulnerabilities in Zoho AdSelf Service Plus and Zoho ManageEngine. APT27 aims to steal business secrets and intellectual property, with the potential for supply chain attacks.
Agent Tesla & Dridex
Palo Alto Unit42's research reveals an uptick in Agent Tesla and Dridex malware distributions via phishing, using Excel macros and XLL droppers, from July to December 2021.
APT36's Malware Arsenal
TrendMicro's tracking of APT36/Earth Karkaddan reveals their use of Crimson RAT, ObliqueRat, and CapaRAT in campaigns from January 2020 to September 2021. The group employs spear-phishing and USBs for initial access, using themes like government and coronavirus to lure victims. The RATs are capable of extensive system reconnaissance, data collection, and exfiltration.
Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
.png)
Whitepapers
The World's Best SOC Teams Use Anvilogic

.png)




.png)