Anvilogic Forge Threat Research Reports

Here you can find an accumulation of trending threats published weekly by the Anvilogic team.

We curate threat intelligence to provide situational awareness and actionable insights

Threat Identifier Detections

Atomic detections that serve as the foundation of our detection framework.

Threat Scenario Detections

Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.

Reports Hot Off the Forge

Threat News Reports
Trending Threat Reports
ResearchArticles

Forge Threat Report

Forge Report: First Half Threat Trends of 2024

Anvilogic Forge's latest report offers essential insights into key threat trends and adversarial tactics observed in the first half of 2024. From the pervasive use of PowerShell and remote access tools to sophisticated social engineering and attacks on the healthcare sector, this comprehensive analysis provides actionable intelligence and detection rules to bolster your defenses. Explore our key findings and access ready-to-deploy detection content to enhance your security posture.

All Threat Reports

Levels

All
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
This is some text inside of a div block.
02
-
22
-
2024
Level:
Tactical
|
Source:

Proofpoint Unveils Return of Bumblebee Malware

Proofpoint detected the return of Bumblebee malware on February 8, 2024, after a four-month hiatus. The latest campaign, targeting US organizations with deceptive emails, marks a significant shift in distribution tactics, notably utilizing VBA macro-enabled documents, a method rarely seen since Microsoft's macro-blocking measures in 2022. This resurgence emphasizes the adaptive nature of cyber threats and the continuous need for vigilant cybersecurity defenses against sophisticated malware and potential ransomware attacks.

Global
This is some text inside of a div block.
02
-
22
-
2024
Level:
Tactical
|
Source:

Commando Cat's Evasive Maneuvers

Cado Security identified 'Commando Cat', a cryptojacking campaign exploiting Docker environments. This multi-stage attack leverages sophisticated evasion techniques, exploiting exposed Docker API endpoints to deploy payloads, including cryptocurrency miners. It underscores the critical need for enhanced security measures in cloud environments to thwart such advanced threats.

Global
This is some text inside of a div block.
02
-
15
-
2024
Level:
Strategic
|
Source:

An Emphasis on the Value of Your Credentials

Cisco Talos's 2023 report, presented by Hazel Burton, highlights a significant shift towards the exploitation of valid accounts by cybercriminals, making it the second-most common attack technique. With 26% of incident response engagements involving the use of valid accounts, the dark web has become a marketplace for these stolen credentials, especially those granting access to critical resources. This shift is attributed to the changing nature of work practices, with a focus on remote access and cloud solutions. Talos stresses the importance of multi-factor authentication (MFA) and robust authentication measures as essential defenses against these types of attacks. The report calls for a comprehensive security strategy, including access restriction, MFA, routine auditing, and a zero-trust architecture to mitigate the risks associated with compromised credentials.

Global
This is some text inside of a div block.
02
-
15
-
2024
Level:
Tactical
|
Source:

Excel Document Used as Entry Point for Info-Stealer

In January 2024, Fortinet's Pei Han Liao reported a sophisticated malware campaign by a Vietnamese threat actor using an Excel document as the entry point. The attack chain begins with a VBA script in the Excel file, triggering a PowerShell command to download additional malicious scripts, culminating in a Python-based info-stealer. This malware harvests cookies and login data from browsers, packaging them for exfiltration to the attacker's telegram bot. The use of GitLab repositories for hosting malware complicates detection, revealing the actor's evolving capabilities and broader involvement in the cyber threat landscape since August 2023.

Global
This is some text inside of a div block.
02
-
15
-
2024
Level:
Tactical
|
Source:

A Two-Decade Threat Evolution of Russian APT Group, APT28

Trend Micro's analysis reveals the two-decade evolution of APT28, a Russian APT group known for its cyber espionage across various sectors worldwide. Initially employing brute-force tactics, APT28 has sophisticatedly adapted, leveraging critical vulnerabilities and covert methodologies for espionage. Recent campaigns show advanced phishing and malware distribution tactics, targeting government, defense, and private sectors. Despite a reputation for aggressive campaigns, APT28's subtle initial intrusions and complex post-exploitation strategies underline their adaptability and continued threat to global cybersecurity.

Aerospace
Defense
Energy
Financial
Government
This is some text inside of a div block.
02
-
15
-
2024
Level:
Tactical
|
Source:

Security Agencies Heighten Concerns Over Volt Typhoon's Cyber Operations

The joint advisory by CISA, NSA, FBI, and partners raises alarms over Volt Typhoon's cyber-espionage, linked to Chinese interests. Targeting critical infrastructure, they utilize sophisticated techniques for long-term access, pre-positioning for potential disruptive actions. Recommendations focus on detecting living-off-the-land techniques and enhancing defenses against these state-sponsored cyber threats.

Communications
Critical Infrastructure
Energy
Water

Intelligence Levels for Threat Reports

Tactical

Detectable threat behaviors for response with threat scenarios or threat identifiers.

Strategic

General information security news, for awareness.

The World's Best SOC Teams Use Anvilogic

Paypal Logo
Rubrik Logo
Deloitte Logo
Ebay Logo
Regeneron Logo
SurveyMonkey Logo
TradeWeb Logo
Alteryx Logo
First Citizens Bank Logo
Crypto.com Logo
Rakuten Mobile Logo
St. George's University Logo
Paypal Logo
Rubrik Logo
Deloitte Logo
Ebay Logo
Regeneron Logo
SurveyMonkey Logo
TradeWeb Logo
Alteryx Logo
First Citizens Bank Logo
TJX Logo
Crypto.com Logo
Rakuten Mobile Logo
St. George's University Logo

Break Free from SIEM Lock-in

Break Free from SIEM Lock-in