Anvilogic Forge Threat Research Reports
Here you can find an accumulation of trending threats published weekly by the Anvilogic team.
We curate threat intelligence to provide situational awareness and actionable insights
Atomic detections that serve as the foundation of our detection framework.
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024
Featured Threat Reports
All Threat Reports
Four-Month Espionage Campaign Hits U.S. Organization, Compromising Five Workstations
Symantec uncovered a four-month espionage campaign targeting a U.S. organization, attributed to China-based actors. The attackers compromised five workstations, employing WMI, DLL sideloading, and credential dumping. Advanced techniques enabled lateral movement, email theft, and evasion, underscoring the persistence and sophistication of the threat.
Secret Blizzard Leverages Rival Infrastructure to Target Ukrainian Military in Espionage Campaign
Microsoft identifies Russian group Secret Blizzard exploiting rival malware infrastructure to target Ukrainian military systems, focusing on devices using Starlink internet. The group deploys KazuarV2 backdoors, uses DLL sideloading for stealth, and conducts extensive system reconnaissance, highlighting their advanced capabilities and prioritization of Ukrainian military intelligence.
U.S. Treasury Sanctions Sichuan Silence for Firewall Exploits and Ransomware Attacks
The U.S. Treasury sanctioned Sichuan Silence and Guan Tianfeng for exploiting a Sophos firewall zero-day vulnerability to deploy the Asnarök Trojan and attempt Ragnarok ransomware attacks. The campaign compromised over 81,000 firewalls globally, including critical U.S. infrastructure, prompting asset freezes and an indictment for Guan's cybersecurity activities.
Akira Ransomware Gains Momentum, Favoring U.S. Targets Across Critical Sectors
The Akira ransomware gang is escalating attacks on U.S. critical sectors using advanced, cross-platform tactics. Leveraging a double-extortion RaaS model, Akira exploits compromised credentials, vulnerable systems, and advanced evasion techniques. Its connections to Conti, LockBit, and new Rust-based Akira_v2 variants signal a growing cyber threat demanding urgent attention from organizations.
Credential Dumping Campaign with Atera Agent Linked to MuddyWater
MuddyWater, an Iranian cyber espionage group, is linked to a credential theft campaign targeting global organizations. Using phishing emails, malicious Onehub links, and Atera RMM tools, the group executes PowerShell scripts for registry backups and network domain enumeration. Sophos reports similar attacks in Israel and the U.S., signaling a broader threat.
White House Warns of Salt Typhoon Hacker Threat Greater Than Anticipated
Salt Typhoon, a Chinese state-sponsored hacking group, has infiltrated eight U.S. telecom companies in a global espionage campaign. Exploiting network vulnerabilities, the group targets sensitive communications. Federal agencies urge stronger cybersecurity measures as the White House stresses the urgency of combating this persistent and severe threat.
Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.