Anvilogic Forge Threat Research Reports
Here you can find an accumulation of trending threats published weekly by the Anvilogic team.
We curate threat intelligence to provide situational awareness and actionable insights
Atomic detections that serve as the foundation of our detection framework.
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024



Featured Threat Reports


All Threat Reports
A Flaw in Azure's Shared Key Authorization Poses Risk to Cloud Security
Orca Security researchers discovered a 'by-design flaw' in Azure's Shared Key authorization, posing significant cloud security risks. The flaw enables attackers to manipulate storage accounts, steal access tokens, and execute remote code, compromising critical business assets. Despite acknowledging the issue, Microsoft has opted for updates instead of redesigning the system.
A Destructive Pairing with MuddyWater and DEV-1084
A collaboration between Iranian threat actor, MERCURY (aka MuddyWater) and threat actor Microsoft tracks as DEV-1084 has been observed. According to a report from the Microsoft Threat Intelligence team the two groups worked in tandem to compromise an on-premises and cloud environment.
Cl0p Ransomware: Active Threat Plaguing Businesses Worldwide
Cl0p ransomware, active since 2019, is a significant global threat, targeting IT, financial services, healthcare, and professional services. Exploiting vulnerabilities like CVE-2023-0669, Cl0p has compromised over 130 companies. With links to Russian affiliates and the addition of a Linux encryptor, Cl0p's threat continues to grow.
KillNet's Unrelenting DDoS Against Healthcare Providers
The pro-Russia hacktivist group KillNet has been relentlessly targeting US healthcare providers with DDoS attacks since December 2022. Over 90 attacks on healthcare systems, hospitals, and medical centers have been reported, causing network disruptions. KillNet's activities are ongoing, targeting critical healthcare sub-sectors and vocalizing their efforts on Telegram channels.
'Joker DPR' Revealed to Aid Russian Objectives
Joker DPR, a pro-Russian threat group, targets Ukrainian government and military websites, spreading anti-Ukrainian propaganda and releasing sensitive information. Active since October 2019, Joker DPR amplifies Russian information operations amid the ongoing invasion of Ukraine. The group has gained significant followers on social media, influencing public opinion.
Methodical and Persistent Techniques from the 'Mantis' Threat Group
A Palestinian-based cyberespionage group tracked as “Mantis” (aka Arid Viper, Desert Falcon, APT-C-23) was observed to be targeting local individuals and organizations with new tools and persistence techniques.
Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
.png)
Whitepapers
The World's Best SOC Teams Use Anvilogic

.png)




.png)