Anvilogic Forge Threat Research Reports

Here you can find an accumulation of trending threats published weekly by the Anvilogic team.

We curate threat intelligence to provide situational awareness and actionable insights

Threat Identifier Detections

Atomic detections that serve as the foundation of our detection framework.

Threat Scenario Detections

Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.

Reports Hot Off the Forge

Threat News Reports
Trending Threat Reports
ResearchArticles

Forge Threat Report

Forge Report: First Half Threat Trends of 2024

Anvilogic Forge's latest report offers essential insights into key threat trends and adversarial tactics observed in the first half of 2024. From the pervasive use of PowerShell and remote access tools to sophisticated social engineering and attacks on the healthcare sector, this comprehensive analysis provides actionable intelligence and detection rules to bolster your defenses. Explore our key findings and access ready-to-deploy detection content to enhance your security posture.

All Threat Reports

Levels

All
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
This is some text inside of a div block.
09
-
28
-
2023
Level:
Tactical
|
Source:

UNC3944's Shifting Tactics: From Phishing to Ransomware Rampage

Mandiant's latest report uncovers UNC3944's expanding threat landscape. Known aliases include "Scattered Spider" and "0ktapus." Initially recognized for their prowess in social engineering, the group is now launching sophisticated ransomware attacks across diverse sectors like telecommunications, retail, and finance. Their modus operandi often combines smishing with tactics to bypass multi-factor authentication, capitalizing on legitimate software and data theft for extortion purposes. Their evolving tactics indicate an intention to refine and diversify their strategies further.

Business Service
Entertainment
Financial
Hospitality
Media
This is some text inside of a div block.
09
-
28
-
2023
Level:
Tactical
|
Source:

A Deceptive Attack with a PoC Lure for CVE-2023-40477

Unit42's Robert Falcone has identified a cunning strategy by a threat actor leveraging the allure of a PoC code tied to the CVE-2023-40477 vulnerability in WinRAR. Using a fraudulent PoC script, the actor aims to spread the VenomRAT payload. This campaign seems less directed at researchers but appears opportunistic, targeting those keen on integrating new vulnerabilities into their malicious endeavors.

Global
This is some text inside of a div block.
09
-
28
-
2023
Level:
Tactical
|
Source:

CISA #StopRansomware Advisory: Snatch Ransomware

CISA and the FBI have spotlighted the escalating threat of Snatch Ransomware, active since 2018 and recently intensifying its attacks across various sectors, particularly in North America. The ransomware has been employing evolved tactics and double extortion, impacting a broad spectrum of institutions and revealing a concerning trend in its activity and concentration.

Automotive
Aviation
Defense
Education
Food
This is some text inside of a div block.
09
-
21
-
2023
Level:
Strategic
|
Source:

Storm-0324 An Enabler of Ransomware

Microsoft's latest research unveils the threat actor Storm-0324, active since 2016, now targeting via Microsoft Teams chats. Historically using email-based vectors with deceptive themes, their move signifies an evolution in attack strategy. They've distributed malware like IcedID and ransomware such as Sage. Notably, from 2019, Storm-0324 has primarily spread JSSLoader, which could escalate to a ransomware impact when handed to groups like Sangria Tempest.

Global
This is some text inside of a div block.
09
-
21
-
2023
Level:
Strategic
|
Source:

A String of CryptoWallet Thefts Point to Cracked LastPass Vaults

Following the 2022 LastPass data breach, investigative journalist Brian Krebs points to an alarming rise in CryptoWallet thefts. Key voices from the industry, such as MetaMask's Taylor Monahan and Unciphered's Nick Bax, echo these concerns. The ongoing situation underscores the vulnerabilities even in renowned security platforms and the increasing sophistication of cyber threats.

Technology
This is some text inside of a div block.
09
-
21
-
2023
Level:
Tactical
|
Source:

BumbleBee Swarms with QakBot's Takedown

Following the QakBot disruption by the FBI, there's been a surge in BumbleBee malware attacks. Kostas, a notable security researcher from the DFIR Report community, has outlined a BumbleBee tactic where the malware uses command line actions to map a network drive to a remote site, transfer user credentials, download a file, and search for 'notepad.exe' files. The method suggests potential file manipulation, highlighting the shifting tactics in the malware landscape post-QakBot's takedown.

Global

Intelligence Levels for Threat Reports

Tactical

Detectable threat behaviors for response with threat scenarios or threat identifiers.

Strategic

General information security news, for awareness.

Whitepapers

No items found.

Trusted by leading teams at

Paypal Logo
Rubrik Logo
Deloitte Logo
Ebay Logo
Regeneron Logo
SurveyMonkey Logo
TradeWeb Logo
Alteryx Logo
First Citizens Bank Logo
Crypto.com Logo
Rakuten Mobile Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
Paypal Logo
Sprinklr Logo
SAP Logo
Ebay Logo
Regeneron Logo
SurveyMonkey Logo
TradeWeb Logo
Alteryx Logo
First Citizens Bank Logo
Crypto.com Logo
Rakuten Mobile Logo
St. George's University Logo
Navan Logo
ADP Logo
Labcorp Logo
Dyson Logo
siemens Logo

Build Detections You Want,
Where You Want

Build Detections You Want,
Where You Want