Anvilogic Forge Threat Research Reports

Here you can find an accumulation of trending threats published weekly by the Anvilogic team.

We curate threat intelligence to provide situational awareness and actionable insights

Threat Identifier Detections

Atomic detections that serve as the foundation of our detection framework.

Threat Scenario Detections

Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.

Reports Hot Off the Forge

Threat News Reports
Trending Threat Reports
ResearchArticles

Forge Threat Report

Forge Report: First Half Threat Trends of 2024

Anvilogic Forge's latest report offers essential insights into key threat trends and adversarial tactics observed in the first half of 2024. From the pervasive use of PowerShell and remote access tools to sophisticated social engineering and attacks on the healthcare sector, this comprehensive analysis provides actionable intelligence and detection rules to bolster your defenses. Explore our key findings and access ready-to-deploy detection content to enhance your security posture.

All Threat Reports

Levels

All
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
This is some text inside of a div block.
01
-
25
-
2023
Level:
Tactical
|
Source:

Sliver C2 Framework Growing Its Base

The Sliver C2 framework, created by Bishop Fox, is gaining traction among threat actors for remote control over compromised systems. With capabilities like UAC bypass, process injection, and credential access, it is used by groups like APT29 and TA551, enhancing their cyber-attack arsenals.

Global
This is some text inside of a div block.
01
-
18
-
2023
Level:
|
Source:

Dark Pink Deploys Custom Malware Against Government & Military Entities

Dark Pink (aka Saaiwc Group) targets government, military, religious, and non-profit organizations in the APAC region and Europe using custom malware. They initiate attacks via job-themed spear-phishing emails, collecting sensitive documents and capturing audio for cyberespionage. Data is exfiltrated to DropBox, Telegram, or email.

Government
Military
Nonprofit
Religion
This is some text inside of a div block.
01
-
18
-
2023
Level:
Strategic
|
Source:

Tracking NoName057(16), Another Pro-Russian Group

NoName057(16), a pro-Russian hacktivist group, has actively launched DDoS and web attacks against nations supporting Ukraine. Targeting critical infrastructure, financial institutions, and government agencies, they organize through Telegram and incentivize followers with cryptocurrency. Recently, GitHub deactivated their accounts used for hosting DDoS tools.

Critical Infrastructure
Finance
Government
This is some text inside of a div block.
01
-
18
-
2023
Level:
Tactical
|
Source:

Cuba Ransomware Discovered to Abuse OWASSRF Flaw

Microsoft alerts that the Cuba ransomware gang is exploiting the OWASSRF flaw using CVE-2022-41080. This exploit elevates privileges on Microsoft Exchange servers, bypassing ProxyNotShell mitigations. Similar tactics were used in the recent Rackspace breach by the Play ransomware group.

Global
This is some text inside of a div block.
01
-
18
-
2023
Level:
Tactical
|
Source:

Gootkit Malware Campaign Expands SEO Poisoning To Target Australian Healthcare Sector

Trend Micro reveals Gootkit malware targeting Australian healthcare via SEO poisoning. Using keywords related to healthcare and cities, users are tricked into downloading malicious ZIP files. The infection chain involves PowerShell scripts and DLL sideloading to deploy Cobalt Strike.

Healthcare
Legal
This is some text inside of a div block.
01
-
18
-
2023
Level:
Tactical
|
Source:

PyPI Malware Campaign Adds a Cloudflare Tunnel to Bypass Firewall Restrictions

Phylum reports a PyPI malware campaign using a Cloudflare tunnel to bypass firewalls, distributing info-stealing and RAT malware. The attack involves encoded PowerShell scripts, data exfiltration, and remote access via WScript.exe and Cloudflare. Malicious packages have been removed from PyPI.

Global

Intelligence Levels for Threat Reports

Tactical

Detectable threat behaviors for response with threat scenarios or threat identifiers.

Strategic

General information security news, for awareness.

Whitepapers

No items found.

The World's Best SOC Teams Use Anvilogic

Paypal Logo
Rubrik Logo
Deloitte Logo
Ebay Logo
Regeneron Logo
SurveyMonkey Logo
TradeWeb Logo
Alteryx Logo
First Citizens Bank Logo
Crypto.com Logo
Rakuten Mobile Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
Paypal Logo
Sprinklr Logo
SAP Logo
Ebay Logo
Regeneron Logo
SurveyMonkey Logo
TradeWeb Logo
Alteryx Logo
First Citizens Bank Logo
Crypto.com Logo
Rakuten Mobile Logo
St. George's University Logo
Navan Logo
ADP Logo
Labcorp Logo
Dyson Logo
siemens Logo

Build Detections You Want,
Where You Want

Build Detections You Want,
Where You Want