Anvilogic Forge Threat Research Reports
Here you can find an accumulation of trending threats published weekly by the Anvilogic team.
We curate threat intelligence to provide situational awareness and actionable insights
Atomic detections that serve as the foundation of our detection framework.
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024



Featured Threat Reports


All Threat Reports
Russian-Aligned Shuckworm Infiltrates Ukrainian Military Systems Via Removable Media
Symantec attributes a February 2025 campaign against Ukraine’s military to Russian APT Shuckworm. Using a malicious USB drive and LOLBins like PowerShell, the group deployed GammaSteel malware to exfiltrate sensitive documents. Despite limited sophistication, Shuckworm’s evolving tactics and persistence pose a significant threat to defense-focused targets in the region.
Experimentation with the ClickFix Campaign by State-Sponsored Actors
Proofpoint observed state-linked actors from North Korea, Iran, and Russia each experimenting with ClickFix—an execution technique involving fake CAPTCHAs and PowerShell. Though limited in duration, the use of ClickFix across diverse APT groups suggests growing interest in refining social engineering tactics for espionage, persistence, and initial access operations.
Unit 42 Urges Understanding of Prompt Attacks Amid Rapid GenAI Expansion
Unit 42’s latest report urges stronger defenses against prompt attacks targeting GenAI systems. Threats like goal hijacking, data leakage, and infrastructure misuse are growing across sectors like healthcare and finance. The report introduces a risk-impact framework, AI agent attack examples, and mitigation tactics for securing GenAI deployments.
Law Enforcement Cracks Down on Smokeloader Malware-as-a-Service Network
Following Operation Endgame, Europol and international partners have arrested and investigated users of the Smokeloader botnet. These actors purchased pay-per-install access to infected systems for cybercrime operations including ransomware, spyware, and cryptomining. Seized databases helped trace user identities, reinforcing law enforcement’s crackdown on malware-as-a-service infrastructure.
Fake CAPTCHA Campaign Delivers LegionLoader via Malicious PDFs
Netskope uncovered a fake CAPTCHA campaign that lures users with PDF search bait, delivering LegionLoader via MSI downloads and DLL sideloading. The malware deploys a fake browser extension to exfiltrate cookies, history, and crypto data. Targeted sectors include finance and technology across North America, Asia, and Europe.
Microsoft Patches Privilege Escalation Bug Used by RansomEXX in Targeted Attacks
Microsoft patched CVE-2025-29824, a CLFS driver zero-day exploited by RansomEXX (Storm-2460) to escalate privileges and launch targeted ransomware attacks across finance, retail, real estate, and tech sectors. The exploit chain involved certutil, PipeMagic malware, and LSASS dumping via dllhost.exe. Systems running Windows 11 24H2 are unaffected.
Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
.png)
Whitepapers
The World's Best SOC Teams Use Anvilogic

.png)


