Summary: 2025/04/29 21:16
First reported date: 2012/10/18
Inquiry period : 2025/03/30 21:16 ~ 2025/04/29 21:16 (1 months), 138 search results
전 기간대비 38% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 Access Alleged sale United States Malware 입니다.
악성코드 유형 CACTUS 도 새롭게 확인됩니다.
공격기술 RCE Social Engineering 도 새롭게 확인됩니다.
기관 및 기업 Spain Africa France Ucraina South Korea Banking UK 도 새롭게 확인됩니다.
기타 Domain FortiGate Shop ToyMaker identity 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/28 Zero Trust Best Practices for Enterprises and Small Businesses
ㆍ 2025/04/26 ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion
ㆍ 2025/04/25 Zoom attack tricks victims into allowing remote access to install malware and steal money
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Access | 138 | ▲ 52 (38%) |
2 | Alleged | 61 | ▲ 45 (74%) |
3 | sale | 42 | ▲ 30 (71%) |
4 | United States | 26 | ▲ 18 (69%) |
5 | Malware | 20 | ▲ 3 (15%) |
6 | RCE | 19 | ▲ new |
7 | attack | 18 | ▲ 5 (28%) |
8 | Exploit | 17 | ▲ 7 (41%) |
9 | unidentified | 14 | ▲ 2 (14%) |
10 | unauthorized | 14 | ▲ 10 (71%) |
11 | Update | 13 | ▲ 6 (46%) |
12 | Initial | 11 | ▲ 10 (91%) |
13 | VPN | 10 | ▲ 6 (60%) |
14 | Report | 10 | ▼ -1 (-10%) |
15 | admin | 9 | ▲ 2 (22%) |
16 | RDP | 9 | ▲ 8 (89%) |
17 | target | 9 | ▲ 3 (33%) |
18 | Fortinet | 9 | ▲ 8 (89%) |
19 | Vulnerability | 9 | ▲ 3 (33%) |
20 | payment | 8 | ▲ 7 (88%) |
21 | Software | 8 | ▼ -2 (-25%) |
22 | WordPress | 7 | ▲ 4 (57%) |
23 | Spain | 7 | ▲ new |
24 | Government | 7 | ▼ -2 (-29%) |
25 | Microsoft | 7 | ▲ 2 (29%) |
26 | threat | 7 | ▼ -2 (-29%) |
27 | Domain | 7 | ▲ new |
28 | Campaign | 6 | ▲ 1 (17%) |
29 | Password | 6 | ▲ 2 (33%) |
30 | Ransomware | 6 | ▲ 1 (17%) |
31 | Phishing | 6 | - 0 (0%) |
32 | CVE | 5 | ▲ 1 (20%) |
33 | Remote Code Execution | 5 | ▼ -3 (-60%) |
34 | Windows | 5 | - 0 (0%) |
35 | FortiGate | 5 | ▲ new |
36 | USA | 5 | ▲ 3 (60%) |
37 | Shop | 5 | ▲ new |
38 | Operation | 5 | ▲ 2 (40%) |
39 | MFA | 4 | ▲ 1 (25%) |
40 | Canada | 4 | ▲ 3 (75%) |
41 | ToyMaker | 4 | ▲ new |
42 | intelligence | 4 | ▼ -2 (-50%) |
43 | Zero Trust | 4 | ▲ 2 (50%) |
44 | identity | 4 | ▲ new |
45 | Advertising | 4 | ▲ 2 (50%) |
46 | Criminal | 4 | ▼ -1 (-25%) |
47 | CACTUS | 4 | ▲ new |
48 | eCommerce | 4 | ▲ new |
49 | Victim | 4 | ▼ -1 (-25%) |
50 | plugin | 4 | ▲ 3 (75%) |
51 | corporate | 4 | ▲ new |
52 | Social Engineering | 3 | ▲ new |
53 | Africa | 3 | ▲ new |
54 | Australia | 3 | ▲ 1 (33%) |
55 | IABs | 3 | ▲ new |
56 | Brazil | 3 | ▲ 1 (33%) |
57 | Revenue | 3 | ▲ new |
58 | AV | 3 | ▲ new |
59 | Multiple | 3 | - 0 (0%) |
60 | Browser | 3 | ▲ 1 (33%) |
61 | US | 3 | ▲ 2 (67%) |
62 | United Kingdom | 3 | ▲ 1 (33%) |
63 | FTP | 3 | ▲ new |
64 | France | 3 | ▲ new |
65 | remote | 3 | ▲ 1 (33%) |
66 | 3 | ▼ -3 (-100%) | |
67 | hacking | 3 | ▲ 1 (33%) |
68 | actor | 3 | ▼ -7 (-233%) |
69 | Supply chain | 3 | ▼ -1 (-33%) |
70 | Broker | 3 | ▲ new |
71 | Backdoor | 3 | - 0 (0%) |
72 | Education | 2 | - 0 (0%) |
73 | Firewall | 2 | ▲ 1 (50%) |
74 | iam | 2 | ▲ new |
75 | collaboration | 2 | ▲ new |
76 | device | 2 | ▲ 1 (50%) |
77 | RDWeb | 2 | ▼ -1 (-50%) |
78 | network | 2 | - 0 (0%) |
79 | Ucraina | 2 | ▲ new |
80 | Zoom | 2 | ▲ new |
81 | QRadar Security Suite | 2 | ▲ 1 (50%) |
82 | DOGE | 2 | ▲ new |
83 | NetWireRC | 2 | ▲ 1 (50%) |
84 | South Korea | 2 | ▲ new |
85 | account | 2 | ▲ 1 (50%) |
86 | Canadian | 2 | ▲ new |
87 | Russia | 2 | ▲ 1 (50%) |
88 | Zero | 2 | ▲ new |
89 | Banking | 2 | ▲ new |
90 | Control | 2 | ▲ new |
91 | AnyDesk | 2 | ▲ new |
92 | French | 2 | ▲ new |
93 | Magento | 2 | ▼ -1 (-50%) |
94 | Kaspersky | 2 | ▲ 1 (50%) |
95 | WooCommerce | 2 | ▲ new |
96 | UK | 2 | ▲ new |
97 | Server | 2 | ▲ new |
98 | MWNEWS | 2 | ▲ new |
99 | c&c | 2 | ▲ 1 (50%) |
100 | Europe | 2 | ▲ 1 (50%) |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Ransomware |
|
6 (30%) |
CACTUS |
|
4 (20%) |
NetWireRC |
|
2 (10%) |
RAT |
|
2 (10%) |
Trojan |
|
2 (10%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|---|---|
Kimsuky |
|
1 (100%) |

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
RCE |
|
19 (29.7%) |
Exploit |
|
17 (26.6%) |
Campaign |
|
6 (9.4%) |
Phishing |
|
6 (9.4%) |
Remote Code Execution |
|
5 (7.8%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
United States |
|
26 (24.3%) |
Fortinet |
|
9 (8.4%) |
Spain |
|
7 (6.5%) |
Government |
|
7 (6.5%) |
Microsoft |
|
7 (6.5%) |
Threat info
Last 5SNS
(Total : 112)United States RCE Exploit VPN Fortinet Update payment WordPress attack Spain Report USA Vulnerability Malware plugin Microsoft Canada Attacker CVE Australia hacking France Africa Ransomware Backdoor CACTUS Phishing US target Brazil United Kingdom Government Windows UK Cisco Advertising Criminal Software Magento AnyDesk Trend Micro Password Remote Code Execution Campaign Europe ...
News
(Total : 26)Malware attack Attacker Software Update Exploit target RCE Operation Vulnerability Government Victim Password MFA Report Campaign Zero Trust Browser Microsoft United States Phishing Ransomware intelligence Email Windows Remote Code Execution Advertising Russia Social Engineering Kaspersky Supply chain Criminal North Korea Cryptocurrency WhatsApp payment Trojan RAT Education NetWireRC Europe CVSS njRAT conference CACTUS RATel GameoverP2P Kimsuky South Korea CrowdStrike Japan AhnLab XSS YouTube BlueKeep IcedID Ucraina IoC Banking Palo Alto Networks Red Team PoC Chrome Stealer CyberArk powershell ...
No | Title | Date |
---|---|---|
1 | Zero Trust Best Practices for Enterprises and Small Businesses - Malware.News | 2025.04.28 |
2 | ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion - The Hacker News | 2025.04.26 |
3 | Zoom attack tricks victims into allowing remote access to install malware and steal money - Malwarebytes Labs | 2025.04.25 |
4 | Zoom attack tricks victims into allowing remote access to install malware and steal money - Malwarebytes Labs | 2025.04.25 |
5 | Phishing for Codes: Russian Threat Actors Target Microsoft 365 OAuth Workflows - Malware.News | 2025.04.23 |
Additional information
No | Title | Date |
---|---|---|
1 | What privacy? Perplexity wants your data, builds browser to track you and serve ads - Malware.News | 2025.04.29 |
2 | Foldable Phones Need Better Software to Drive Wider Interest - Bloomberg Technology | 2025.04.29 |
3 | Year in Review: AI based threats - Malware.News | 2025.04.29 |
4 | Spotify’s Subscriber Count Climbs 12%, Beating Forecast - Bloomberg Technology | 2025.04.29 |
5 | Microsoft and Amazon Capex in Focus Amid Potential AI Pullback - Bloomberg Technology | 2025.04.29 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Phishing for Codes: Russian Threat Actors Target Microsoft 365 OAuth Workflows - Malware.News | 2025.04.23 |
2 | Phishing for Codes: Russian Threat Actors Target Microsoft 365 OAuth Workflows - Malware.News | 2025.04.23 |
3 | CrowdStrike Falcon Privileged Access Unifies Identity Protection Across Critical Environments - Malware.News | 2025.04.22 |
4 | Kimsuky Exploits BlueKeep RDP Vulnerability to Breach Systems in South Korea and Japan - The Hacker News | 2025.04.22 |
5 | Kimsuky Exploits BlueKeep RDP Vulnerability to Breach Systems in South Korea and Japan - The Hacker News | 2025.04.22 |
View only the last 5 |