Anvilogic Forge Threat Research Reports
Here you can find an accumulation of trending threats published weekly by the Anvilogic team.
We curate threat intelligence to provide situational awareness and actionable insights
Atomic detections that serve as the foundation of our detection framework.
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024
Featured Threat Reports
All Threat Reports
Months-Long Cyber Espionage Operation Hits Key Industries in Southeast Asia
A cyber espionage campaign has targeted critical industries in Southeast Asia, including aviation, government, media, and telecommunications, since October 2023. Leveraging LOLBins and remote access tools, attackers exfiltrated sensitive data and maintained stealth. Though tactics align with Chinese APT groups, specific attribution remains inconclusive.
Critical Apache Struts Vulnerability CVE-2024-53677 Exploited in Active Attacks
Apache Struts CVE-2024-53677, a critical RCE vulnerability in file upload handling, is exploited in active attacks. Affected Struts versions require upgrading to 6.4.0+ and implementing the new Action File Upload mechanism. Security agencies globally urge immediate action as attackers leverage PoC code for system enumeration and malicious uploads.
CISA Advises Switching to Signal for Secure Mobile Communication
CISA advises using Signal for secure communication amid cyber espionage by Salt Typhoon, linked to Chinese operations. Highly targeted individuals, including senior officials, should adopt encrypted messaging, enable phishing-resistant MFA, and update devices to modernize security. Measures include Lockdown Mode on iPhones and Private DNS for Android users.
U.S. Investigates TP-Link Routers Over National Security and Cyberattack Concerns
The U.S. investigates TP-Link routers over national security and cyberattack concerns linked to Chinese threat actors. Federal scrutiny includes potential vulnerabilities exploited in botnet operations and antitrust violations for low-cost pricing strategies. A ban on TP-Link devices is possible, impacting its dominant presence in the SOHO router market.
Four-Month Espionage Campaign Hits U.S. Organization, Compromising Five Workstations
Symantec uncovered a four-month espionage campaign targeting a U.S. organization, attributed to China-based actors. The attackers compromised five workstations, employing WMI, DLL sideloading, and credential dumping. Advanced techniques enabled lateral movement, email theft, and evasion, underscoring the persistence and sophistication of the threat.
Secret Blizzard Leverages Rival Infrastructure to Target Ukrainian Military in Espionage Campaign
Microsoft identifies Russian group Secret Blizzard exploiting rival malware infrastructure to target Ukrainian military systems, focusing on devices using Starlink internet. The group deploys KazuarV2 backdoors, uses DLL sideloading for stealth, and conducts extensive system reconnaissance, highlighting their advanced capabilities and prioritization of Ukrainian military intelligence.
Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.