Anvilogic Forge Threat Research Reports

Here you can find an accumulation of trending threats published weekly by the Anvilogic team.

We curate threat intelligence to provide situational awareness and actionable insights

Threat Identifier Detections

Atomic detections that serve as the foundation of our detection framework.

Threat Scenario Detections

Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.

Reports Hot Off the Forge

Threat News Reports
Trending Threat Reports
ResearchArticles

Forge Threat Report

Forge Report: First Half Threat Trends of 2024

Anvilogic Forge's latest report offers essential insights into key threat trends and adversarial tactics observed in the first half of 2024. From the pervasive use of PowerShell and remote access tools to sophisticated social engineering and attacks on the healthcare sector, this comprehensive analysis provides actionable intelligence and detection rules to bolster your defenses. Explore our key findings and access ready-to-deploy detection content to enhance your security posture.

All Threat Reports

Levels

All
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
This is some text inside of a div block.
12
-
21
-
2022
Level:
Tactical
|
Source:

Malicious Scheduled Tasks Reveal A Russian Campaign Against the Ukrainian Government

Mandiant identifies a Russian campaign against the Ukrainian government using trojanized ISO files masquerading as Windows 10 installers. The attack involves malicious scheduled tasks communicating with a TOR site, aiming to exfiltrate data. Linked to UNC4166 and GRU operations, the campaign reflects sophisticated espionage tactics.

Government
This is some text inside of a div block.
12
-
14
-
2022
Level:
Strategic
|
Source:

Russian Threat Group, Initiate Credential Harvesting Campaign Across Many Verticals

Recorded Future's Insikt Group reports Russian threat group TAG-53 targeting aerospace, defense, government, and other sectors in a credential harvesting campaign. The group, linked to Callisto Group, COLDRIVER, and SEABORGIUM, uses spoofed Microsoft login pages and recurring infrastructure traits like specific domain names and TLS certificates.

Government
Defense
Aerospace
Logistics
Non-Governmental Organization
This is some text inside of a div block.
12
-
14
-
2022
Level:
Strategic
|
Source:

Russia's Cyber Aggression Against Ukraine May Escalate During Winter

Microsoft warns of escalating Russian cyber aggression against Ukraine's critical infrastructure during winter. Predictions include increased attacks on energy, water systems, and supply routes. The warning extends beyond Ukraine, with potential cyberattacks on countries aiding Ukraine, influenced by economic and social factors.

Global
This is some text inside of a div block.
12
-
14
-
2022
Level:
Tactical
|
Source:

Vice Society A Threat Group of Opportunity

Palo Alto Unit42 profiles Vice Society, a ransomware group targeting various industries, notably education and healthcare, since 2021. Known for exploiting the PrintNightmare vulnerability and using HelloKitty and Zeppelin ransomware, Vice Society times attacks with the school year calendar. California, Texas, and Pennsylvania are among the most affected states.

Construction
Education
Energy
Finance
Health
This is some text inside of a div block.
12
-
14
-
2022
Level:
Tactical
|
Source:

Iranian Threat Actor Launches New 'Fantasy' Data Wiper

ESET reveals that Iranian threat group Agrius has deployed a new data wiper named 'Fantasy' in supply-chain attacks targeting organizations in Hong Kong, Israel, and South Africa. The 'Fantasy' wiper overwrites files and the master record, but recovery has been possible for some victims, with damages reversed within hours.

Consulting
Retail
Technology
This is some text inside of a div block.
12
-
14
-
2022
Level:
Tactical
|
Source:

Activities from a Truebot Infections

Cisco Talos reports a rise in Truebot malware infections since August 2022. Distributed via phishing, botnets, USB infections, and Raspberry Robin, Truebot acts as a downloader for data exfiltration tools like Teleport and deploys Clop ransomware. Truebot infections link to Silence Group and TA505, with post-compromise activities including data theft.

Global

Intelligence Levels for Threat Reports

Tactical

Detectable threat behaviors for response with threat scenarios or threat identifiers.

Strategic

General information security news, for awareness.

Whitepapers

No items found.

The World's Best SOC Teams Use Anvilogic

Paypal Logo
Rubrik Logo
Deloitte Logo
Ebay Logo
Regeneron Logo
SurveyMonkey Logo
TradeWeb Logo
Alteryx Logo
First Citizens Bank Logo
Crypto.com Logo
Rakuten Mobile Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
St. George's University Logo
Paypal Logo
Sprinklr Logo
SAP Logo
Ebay Logo
Regeneron Logo
SurveyMonkey Logo
TradeWeb Logo
Alteryx Logo
First Citizens Bank Logo
Crypto.com Logo
Rakuten Mobile Logo
St. George's University Logo
Navan Logo
ADP Logo
Labcorp Logo
Dyson Logo
siemens Logo

Build Detections You Want,
Where You Want

Build Detections You Want,
Where You Want