Anvilogic Forge Threat Research Reports
Here you can find an accumulation of trending threats published weekly by the Anvilogic team.
We curate threat intelligence to provide situational awareness and actionable insights
Atomic detections that serve as the foundation of our detection framework.
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024



Featured Threat Reports


All Threat Reports
Concern Mounts Over China’s Strategic Cyber Positioning
Chinese APTs, including Volt Typhoon, are targeting critical U.S. infrastructure by exploiting edge device blind spots and rotating infrastructure to avoid detection. Experts warn China is positioning itself for potential disruption scenarios. Defenders are urged to go beyond EDR and integrate AI, identity protection, and network analytics to respond.
Silent Ransomware Attack Exploits AWS Native Features to Encrypt Cloud Storage
A stealth ransomware campaign exploits stolen AWS credentials to encrypt S3 bucket contents using native server-side encryption (SSE-C). No files are deleted or exfiltrated, making detection difficult. Victims receive ransom notes requesting BTC payments for decryption. Security experts urge IAM audits, key rotation, and SSE-C permission restrictions.
Russian-Aligned Shuckworm Infiltrates Ukrainian Military Systems Via Removable Media
Symantec attributes a February 2025 campaign against Ukraine’s military to Russian APT Shuckworm. Using a malicious USB drive and LOLBins like PowerShell, the group deployed GammaSteel malware to exfiltrate sensitive documents. Despite limited sophistication, Shuckworm’s evolving tactics and persistence pose a significant threat to defense-focused targets in the region.
Experimentation with the ClickFix Campaign by State-Sponsored Actors
Proofpoint observed state-linked actors from North Korea, Iran, and Russia each experimenting with ClickFix—an execution technique involving fake CAPTCHAs and PowerShell. Though limited in duration, the use of ClickFix across diverse APT groups suggests growing interest in refining social engineering tactics for espionage, persistence, and initial access operations.
Unit 42 Urges Understanding of Prompt Attacks Amid Rapid GenAI Expansion
Unit 42’s latest report urges stronger defenses against prompt attacks targeting GenAI systems. Threats like goal hijacking, data leakage, and infrastructure misuse are growing across sectors like healthcare and finance. The report introduces a risk-impact framework, AI agent attack examples, and mitigation tactics for securing GenAI deployments.
Law Enforcement Cracks Down on Smokeloader Malware-as-a-Service Network
Following Operation Endgame, Europol and international partners have arrested and investigated users of the Smokeloader botnet. These actors purchased pay-per-install access to infected systems for cybercrime operations including ransomware, spyware, and cryptomining. Seized databases helped trace user identities, reinforcing law enforcement’s crackdown on malware-as-a-service infrastructure.
Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
.png)
Whitepapers
The World's Best SOC Teams Use Anvilogic




