Anvilogic Forge Threat Research Reports
Here you can find an accumulation of trending threats published weekly by the Anvilogic team.
We curate threat intelligence to provide situational awareness and actionable insights
Atomic detections that serve as the foundation of our detection framework.
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024



Featured Threat Reports


All Threat Reports
A Destructive Pairing with MuddyWater and DEV-1084
A collaboration between Iranian threat actor, MERCURY (aka MuddyWater) and threat actor Microsoft tracks as DEV-1084 has been observed. According to a report from the Microsoft Threat Intelligence team the two groups worked in tandem to compromise an on-premises and cloud environment.
Cl0p Ransomware: Active Threat Plaguing Businesses Worldwide
Cl0p ransomware, active since 2019, is a significant global threat, targeting IT, financial services, healthcare, and professional services. Exploiting vulnerabilities like CVE-2023-0669, Cl0p has compromised over 130 companies. With links to Russian affiliates and the addition of a Linux encryptor, Cl0p's threat continues to grow.
KillNet's Unrelenting DDoS Against Healthcare Providers
The pro-Russia hacktivist group KillNet has been relentlessly targeting US healthcare providers with DDoS attacks since December 2022. Over 90 attacks on healthcare systems, hospitals, and medical centers have been reported, causing network disruptions. KillNet's activities are ongoing, targeting critical healthcare sub-sectors and vocalizing their efforts on Telegram channels.
'Joker DPR' Revealed to Aid Russian Objectives
Joker DPR, a pro-Russian threat group, targets Ukrainian government and military websites, spreading anti-Ukrainian propaganda and releasing sensitive information. Active since October 2019, Joker DPR amplifies Russian information operations amid the ongoing invasion of Ukraine. The group has gained significant followers on social media, influencing public opinion.
Methodical and Persistent Techniques from the 'Mantis' Threat Group
A Palestinian-based cyberespionage group tracked as “Mantis” (aka Arid Viper, Desert Falcon, APT-C-23) was observed to be targeting local individuals and organizations with new tools and persistence techniques.
Threat Actors Drops Malware Backdoor from 3CX Attack
Kaspersky researchers identified the Gopuram backdoor malware in the compromised 3CXDesktopApp. Linked to the Lazarus group, the malware targets cryptocurrency organizations. The Gopuram backdoor allows attackers to manipulate Windows systems, avoid detection, and has been used with precision, indicating targeted attacks.
Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
.png)
Whitepapers
The World's Best SOC Teams Use Anvilogic

.png)


