Anvilogic Forge Threat Research Reports

Here you can find an accumulation of trending threats published weekly by the Anvilogic team.

We curate threat intelligence to provide situational awareness and actionable insights

Threat Identifier Detections

Atomic detections that serve as the foundation of our detection framework.

Threat Scenario Detections

Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.

Reports Hot Off the Forge

Threat News Reports
Trending Threat Reports
ResearchArticles

Forge Threat Report

Forge Report: First Half Threat Trends of 2024

Anvilogic Forge's latest report offers essential insights into key threat trends and adversarial tactics observed in the first half of 2024. From the pervasive use of PowerShell and remote access tools to sophisticated social engineering and attacks on the healthcare sector, this comprehensive analysis provides actionable intelligence and detection rules to bolster your defenses. Explore our key findings and access ready-to-deploy detection content to enhance your security posture.

All Threat Reports

Levels

All
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
This is some text inside of a div block.
09
-
19
-
2024
Level:
Tactical
|
Source:

Intelligence Update to the Continuation of Operation Crimson Palace with New TTPs in Targeted Intrusions

Sophos' latest intelligence update on Operation Crimson Palace uncovers new tactics, techniques, and procedures (TTPs) used by threat clusters targeting Southeast Asian government entities. The report highlights DLL sideloading, C2 infrastructure revamping, and living-off-the-land techniques. It emphasizes the ongoing nature of these threats and the need for robust detection strategies.

Government
This is some text inside of a div block.
09
-
17
-
2024
Level:
Tactical
|
Source:

Rundll32 with Suspicious Command Line

The Anvilogic Forge has identified multiple occurrences of Andromeda-like malware (aka. b66 and Gamarue) across various customer environments. Andromeda malware is known for its modular nature, used as a downloader and facilitating further malicious activities such as keylogging, credential theft, and additional payload downloads. Andromeda often propagates using USB drives.

Technology
This is some text inside of a div block.
09
-
12
-
2024
Level:
Strategic
|
Source:

FBI Warns of North Korean Cyberattacks on Cryptocurrency Firms

The FBI warns of North Korean cyberattacks on cryptocurrency firms, using social engineering to implant malware and steal funds. These actors exploit professional networks, impersonate known contacts, and create fake scenarios. The FBI advises verifying identities and strengthening network security to counter these sophisticated threats.

Financial
This is some text inside of a div block.
09
-
12
-
2024
Level:
Strategic
|
Source:

FTC Alerts a Surge in Bitcoin ATM Scams Citing Record Highs in Loses

The FTC warns of a surge in Bitcoin ATM scams, with over $110 million lost in 2023. Scammers use fake security alerts and impersonation tactics to manipulate victims into depositing funds into their cryptocurrency wallets. The FTC advises caution, urging individuals to verify contacts and avoid hasty financial actions.

Global
This is some text inside of a div block.
09
-
12
-
2024
Level:
Tactical
|
Source:

APT33's Range of Attacks from Password Spraying to Proficiency in Azure

Iranian threat actor APT33, active from April to July 2024, targets aerospace, defense, and other sectors using password spraying, custom malware, and Azure misuse. The group aims for intelligence gathering through advanced tactics. Microsoft advises countermeasures like multifactor authentication to combat APT33's evolving cyber threats.

Aerospace
Defense
Education
Government
Oil and Gas
This is some text inside of a div block.
09
-
12
-
2024
Level:
Tactical
|
Source:

RansomHub's Extensive Reach in Threatening Critical Infrastructure with 210 Victims and Counting

Since February 2024, RansomHub has targeted 210 critical infrastructure organizations across various sectors. Utilizing affiliates from other ransomware groups, the gang employs phishing, vulnerability exploitation, and double extortion tactics. Affected sectors include healthcare, government, and transportation. Security agencies urge organizations to follow mitigation steps to defend against this expanding threat.

Communications
Emergency Response
Financial
Food
Agriculture

Intelligence Levels for Threat Reports

Tactical

Detectable threat behaviors for response with threat scenarios or threat identifiers.

Strategic

General information security news, for awareness.

The World's Best SOC Teams Use Anvilogic

Paypal Logo
Rubrik Logo
Deloitte Logo
Ebay Logo
Regeneron Logo
SurveyMonkey Logo
TradeWeb Logo
Alteryx Logo
First Citizens Bank Logo
Crypto.com Logo
Rakuten Mobile Logo
St. George's University Logo
Paypal Logo
Rubrik Logo
Deloitte Logo
Ebay Logo
Regeneron Logo
SurveyMonkey Logo
TradeWeb Logo
Alteryx Logo
First Citizens Bank Logo
TJX Logo
Crypto.com Logo
Rakuten Mobile Logo
St. George's University Logo

Break Free from SIEM Lock-in

Break Free from SIEM Lock-in