Summary: 2025/04/28 01:41
Inquiry period : 2025/04/27 01:41 ~ 2025/04/28 01:41 (1 days), 94 search results
지난 7일 기간대비 상승한 Top5 연관 키워드는 breach Password Rhysida Storm Next 입니다.
공격기술 MalSpam 도 새롭게 확인됩니다.
기타 MDB Bankas late Somebody malspamming 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/28 Huawei Set to Test Powerful AI Chip to Rival Nvidia’s, WSJ Says
ㆍ 2025/04/28 Cluely: Wie eine Schummel-KI zwei Studenten erst aus der Uni warf – und dann reich machte
ㆍ 2025/04/28 Überwachung per KI-Persona: US-Polizei jagt Kriminelle mit virtuellen Lockvögeln
Trend graph by period
Total number of trend targets
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Alert | 15 | ▼ -2 (-13%) |
2 | Ransomware | 9 | ▼ -14 (-156%) |
3 | target | 8 | ▼ -13 (-163%) |
4 | Victim | 8 | ▼ -8 (-100%) |
5 | Report | 7 | ▼ -21 (-300%) |
6 | Software | 7 | ▼ -10 (-143%) |
7 | breach | 5 | ▲ 1 (20%) |
8 | Alleged | 5 | ▼ -3 (-60%) |
9 | Password | 4 | ▲ 1 (25%) |
10 | data | 4 | ▼ -1 (-25%) |
11 | hacking | 4 | ▼ -7 (-175%) |
12 | Exploit | 4 | ▼ -11 (-275%) |
13 | Microsoft | 4 | ▼ -9 (-225%) |
14 | Education | 4 | ▼ -6 (-150%) |
15 | DDoS | 4 | ▼ -4 (-100%) |
16 | intelligence | 4 | ▼ -8 (-200%) |
17 | ChatGPT | 3 | - 0 (0%) |
18 | securityaffairs | 3 | ▼ -2 (-67%) |
19 | Rhysida | 3 | ▲ 2 (67%) |
20 | MDB | 3 | ▲ new |
21 | Operation | 3 | ▼ -6 (-200%) |
22 | c&c | 3 | ▼ -2 (-67%) |
23 | United States | 3 | ▼ -16 (-533%) |
24 | Storm | 3 | ▲ 1 (33%) |
25 | 3 | ▼ -5 (-167%) | |
26 | Campaign | 3 | ▼ -13 (-433%) |
27 | Government | 3 | ▼ -3 (-100%) |
28 | threat | 3 | ▼ -4 (-133%) |
29 | attack | 3 | ▼ -25 (-833%) |
30 | Next | 3 | ▲ 2 (67%) |
31 | Vulnerability | 3 | ▼ -10 (-333%) |
32 | Cryptocurrency Miner | 3 | ▲ 2 (67%) |
33 | Malware | 3 | ▼ -46 (-1533%) |
34 | MTN | 2 | ▲ 2 (100%) |
35 | Lazarus | 2 | ▼ -1 (-50%) |
36 | MalSpam | 2 | ▲ new |
37 | NetWireRC | 2 | ▼ -3 (-150%) |
38 | last | 2 | ▼ -2 (-100%) |
39 | name | 2 | ▲ 2 (100%) |
40 | Bankas | 2 | ▲ new |
41 | late | 2 | ▲ new |
42 | Somebody | 2 | ▲ new |
43 | malspamming | 2 | ▲ new |
44 | Version | 2 | ▲ 1 (50%) |
45 | website | 2 | - 0 (0%) |
46 | Beogradska | 2 | ▲ new |
47 | India | 2 | ▼ -2 (-100%) |
48 | Windows | 2 | ▼ -5 (-250%) |
49 | Italy | 2 | ▲ 1 (50%) |
50 | taegliche | 2 | ▼ -2 (-100%) |
51 | Sicherheitsnews | 2 | ▼ -2 (-100%) |
52 | Actor | 2 | ▲ 1 (50%) |
53 | Leak | 2 | ▲ 1 (50%) |
54 | ZeroDay | 2 | ▼ -2 (-100%) |
55 | RCE | 2 | ▼ -10 (-500%) |
56 | group | 2 | ▼ -2 (-100%) |
57 | Zusammenfassung | 2 | ▼ -2 (-100%) |
58 | NEWSLETTER | 2 | ▲ 2 (100%) |
59 | ROUND | 2 | ▲ 2 (100%) |
60 | Project | 2 | ▲ 2 (100%) |
61 | CVE | 2 | ▼ -1 (-50%) |
62 | Sale | 2 | ▼ -2 (-100%) |
63 | image | 2 | ▲ 1 (50%) |
64 | SAP | 2 | - 0 (0%) |
65 | Überwachung | 2 | ▲ new |
66 | OSINT | 2 | ▲ 2 (100%) |
67 | AI | 2 | ▼ -8 (-400%) |
68 | Srl | 2 | ▲ 2 (100%) |
69 | MTrends | 2 | ▲ 1 (50%) |
70 | Germany | 2 | ▼ -2 (-100%) |
71 | multiple | 2 | - 0 (0%) |
72 | VBScript | 2 | ▲ new |
73 | access | 2 | ▼ -3 (-150%) |
74 | keymous | 2 | ▲ 2 (100%) |
75 | Phishing | 2 | ▼ -8 (-400%) |
76 | Rhysida Ransomware | 2 | ▲ 2 (100%) |
77 | stage | 2 | ▲ 1 (50%) |
78 | Kriminelle | 1 | ▲ new |
79 | Alliance | 1 | ▼ -1 (-100%) |
80 | Investigations | 1 | ▲ new |
81 | httpstcoR | 1 | ▲ 1 (100%) |
82 | AzureChecker | 1 | ▲ new |
83 | VBS | 1 | ▲ new |
84 | Intercorp | 1 | ▲ new |
85 | jagt | 1 | ▲ new |
86 | Grupo | 1 | ▲ new |
87 | Hacktivist | 1 | ▼ -1 (-100%) |
88 | Hits | 1 | ▲ new |
89 | low | 1 | - 0 (0%) |
90 | Inteid | 1 | ▲ new |
91 | httpstcoNnTgzge | 1 | ▲ new |
92 | httpstcoue | 1 | ▲ new |
93 | 行业凋零 | 1 | ▲ new |
94 | full | 1 | - 0 (0%) |
95 | von | 1 | ▼ -3 (-300%) |
96 | Gefahrstofflager | 1 | ▲ new |
97 | Digitale | 1 | ▲ 1 (100%) |
98 | Kali | 1 | ▲ 1 (100%) |
99 | GhostRAT | 1 | ▲ new |
100 | KIPersona | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Ransomware |
|
9 (39.1%) |
Rhysida |
|
3 (13%) |
Cryptocurrency Miner |
|
3 (13%) |
NetWireRC |
|
2 (8.7%) |
Rhysida Ransomware |
|
2 (8.7%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|---|---|
Lazarus |
|
2 (100%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
Microsoft |
|
4 (14.3%) |
United States |
|
3 (10.7%) |
Government |
|
3 (10.7%) |
India |
|
2 (7.1%) |
Italy |
|
2 (7.1%) |
Malware Type
Top 5
Detailed trend analysis by malware type.
Threat info
Last 5SNS
(Total : 68)Ransomware Victim target Report Exploit DDoS hacking c&c Rhysida Password Email MalSpam Operation Germany OSINT attack Vulnerability CVE Education Cryptocurrency Miner Microsoft NetWireRC Government Italy Software Campaign Rhysida Ransomware Phishing Cobalt Strike MUSTANG PANDA TONESHELL Malware hijack njRAT C2 ...United States CISA Lazarus Advertising Spear Phishing RCE CVSS ZeroDay APT France lummastealer Lumma Stealer Africa opendir United Kingdom DarkWeb ThreatMon intelligence VBScript Open Directory Twitter Windows India
News
(Total : 26)Software ChatGPT intelligence Microsoft Education Malware United States iPhone Apple India Linux Saudi Arabia VBS 윈도우 Report China VBScript Windows Government Kali 업무 협약 취약점 RCE ZeroDay Update Vulnerability ...Password attack Cryptocurrency Miner hacking Lazarus Kaspersky Campaign North Korea South Korea Operation 한국
1 | Huawei Set to Test Powerful AI Chip to Rival Nvidia’s, WSJ Says - Bloomberg Technology | 2025.04.28 |
2 | Überwachung per KI-Persona: US-Polizei jagt Kriminelle mit virtuellen Lockvögeln - IT Sicherheitsnews | 2025.04.28 |
3 | Cluely: Wie eine Schummel-KI zwei Studenten erst aus der Uni warf – und dann reich machte - IT Sicherheitsnews | 2025.04.28 |
4 | 윈도우 11 보안 기능 VBS Enclaves가 일부 시스템에서 더 이상 사용되지 않음 - Malware.News | 2025.04.28 |
5 | VESC Mods Made Via Vibe Coding - Hackaday | 2025.04.27 |
Additional information
No | Title | Date |
---|---|---|
1 | Huawei Set to Test Powerful AI Chip to Rival Nvidia’s, WSJ Says - Bloomberg Technology | 2025.04.28 |
2 | Gamers Beware! New Attack Targets Gamers to Deploy AgeoStealer Malware - Malware.News | 2025.04.26 |
3 | Threat Hunting: For what, when, and how? - Malware.News | 2025.04.26 |
4 | Detection Engineering Fundamentals: What makes a good alert? - Malware.News | 2025.04.26 |
5 | What is the xBOM? - Malware.News | 2025.04.26 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | 윈도우 11 보안 기능 VBS Enclaves가 일부 시스템에서 더 이상 사용되지 않음 - Malware.News | 2025.04.28 |
2 | Apple Begins Breaking Up Its AI Team With Robotics, Siri Changes - Bloomberg Technolo... | 2025.04.27 |
3 | Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers - The Hacker News | 2025.04.27 |
4 | 북한 라자루스, 한국 금융·IT·통신 분야 겨냥한 ‘오퍼레이션 싱크홀’ 공격 감행 - 데일리시큐 | 2025.04.27 |
5 | Pete Hegseth’s Signal Scandal Spirals Out of Control - Security Latest- W... | 2025.04.26 |
View only the last 5 |
No | Request | Hash(md5) | Report No | Date |
---|---|---|---|---|
1 | setup7372.msi Generic Malware Malicious Library CAB MSOffice File OS Processor Check | 051d32306691e0dd6eb50f16c6f1c382 | 59883 | 2025.04.24 |
2 | ![]() Downloader Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Sniff Audio HTTP DNS Code injection Internet API FTP KeyLogger P2P AntiDebug AntiVM | aafec75f6933aa0f9c26ac43155f6818 | 59855 | 2025.04.22 |
3 | setup0324_or.msi Generic Malware Malicious Library CAB MSOffice File OS Processor Check | b72ffde32f8ef6c9a58343d0cb4fae81 | 59747 | 2025.04.21 |
4 | ![]() task schedule PWS Code injection AntiDebug AntiVM PE File .NET EXE PE32 DLL .NET DLL | 52749d5846a4f486c6268f892cf30088 | 59020 | 2025.04.15 |
5 | ![]() Generic Malware Antivirus AntiDebug AntiVM PNG Format MSOffice File JPEG Format | 70e7a78686df6013aa8fabe63d2827b8 | 58922 | 2025.04.09 |
View only the last 5 |
Level | Description |
---|---|
watch | File has been identified by 11 AntiVirus engines on VirusTotal as malicious |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Checks for the Locally Unique Identifier on the system for a suspicious privilege |
notice | Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | Queries for the computername |
No | Category | URL | CC | ASN Co | Date |
---|---|---|---|---|---|
1 | malicious | https://u1.pridefulamaretto.digital/ | US ![]() | 2025.04.26 | |
2 | malicious | https://u1.putdownpopcorn.digital/ | US ![]() | CLOUDFLARENET | 2025.04.24 |
3 | c2 | https://yiug.outfit.dianamercer.com/orderReview | US ![]() | PONYNET | 2025.04.24 |
4 | malicious | https://s1.flammablegrunt.site/hpkekeyconfig.txt | US ![]() | 2025.04.24 | |
5 | malicious | https://roaminghere.fly.storage.tigris.dev/passinggateforward.html | CA ![]() | COGENT-174 | 2025.04.24 |
View only the last 5 |
No | URL | CC | ASN Co | Reporter | Date |
---|---|---|---|---|---|
1 | http://219.157.16.230:36250/bin.sh 32-bit elf mips Mozi | CN ![]() | CHINA UNICOM China169 Backbone | geenensp | 2025.04.28 |
2 | http://117.235.123.37:41007/bin.sh 32-bit elf mips Mozi | IN ![]() | National Internet Backbone | geenensp | 2025.04.28 |
3 | http://59.97.178.146:59753/i 32-bit elf mips Mozi | IN ![]() | National Internet Backbone | geenensp | 2025.04.28 |
4 | http://117.196.160.171:37542/bin.sh 32-bit elf mips Mozi | IN ![]() | National Internet Backbone | geenensp | 2025.04.28 |
5 | http://221.15.196.124:52993/bin.sh 32-bit elf mips Mozi | CN ![]() | CHINA UNICOM China169 Backbone | geenensp | 2025.04.28 |
View only the last 5 |