Summary: 2025/04/30 06:13

First reported date: 2013/08/25
Inquiry period : 2025/03/31 06:13 ~ 2025/04/30 06:13 (1 months), 5 search results

전 기간대비 -80% 낮은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
Criminal 입니다.
악성코드 유형 Konni 도 새롭게 확인됩니다.
공격기술 Exploit 도 새롭게 확인됩니다.
기관 및 기업 Kaspersky Russia 도 새롭게 확인됩니다.
기타 Access Initial Website powershell Dec 등 신규 키워드도 확인됩니다.

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1compromised 5 ▼ -4 (-80%)
2Criminal 2 ▲ 1 (50%)
3Access 1 ▲ new
4Initial 1 ▲ new
5Alleged 1 - 0 (0%)
6Kaspersky 1 ▲ new
7target 1 ▼ -3 (-300%)
8Email 1 ▼ -4 (-400%)
9Website 1 ▲ new
10Browser 1 - 0 (0%)
11powershell 1 ▲ new
12Campaign 1 ▼ -2 (-200%)
13Dec 1 ▲ new
14Russia 1 ▲ new
15UNKRemoteRogue 1 ▲ new
16httpsC 1 ▲ new
17signature 1 ▲ new
18WordPress 1 ▲ new
19cybercriminal 1 ▲ new
20Konni 1 ▲ new
21Exploit 1 ▲ new
22Report 1 - 0 (0%)
23Government 1 - 0 (0%)
24rise 1 ▲ new
25EDRasaService 1 ▲ new
26Group 1 ▲ new
27Meridian 1 ▲ new
28actor 1 ▲ new
29threat 1 ▲ new
30persistent 1 ▲ new
31Youre 1 ▲ new
32POV 1 ▲ new
33humancentricsecurity 1 ▲ new
34French 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
Konni
1 (100%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


No data.

Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Campaign
1 (50%)
Exploit
1 (50%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
Kaspersky
1 (33.3%)
Russia
1 (33.3%)
Government
1 (33.3%)
Threat info
Last 5

SNS

(Total : 5)
  Total keyword

Criminal Kaspersky target Email Browser powershell Campaign Russia WordPress Konni Exploit Report Government

No Title Date
1Dark Web Informer - Cyber Threat Intelligence @DarkWebInformer
????????????Alleged Initial Access to a Compromised French PrestaShop Company https://t.co/qqTs9C9R9M
2025.04.21
2Threat Insight @threatinsight
UNK_RemoteRogue (Russia): In Dec 2024, a targeted campaign used compromised infrastructure to send emails to people linked to a defense industry manufacturer. The emails contained directions in Russian to copy malicious PowerShell code from the browser to their terminal. https://t.co/8c7S1wTplG
2025.04.17
3blackorbird @blackorbird
#Konni #Compromised WordPress Website signature: https://{C2}/wp-includes/js/inc/(other Common paths)/get.php?ra=iew&zw=lk0100 https://t.co/AcdiedQHpu https://t.co/XCkX5mNqWH https://t.co/wjrxpF6yPX
2025.04.10
4Cyber_OSINT @Cyber_O51NT
Meridian Group reports that "EDR-as-a-Service" is on the rise, with cybercriminals exploiting compromised accounts to submit fraudulent Emergency Data Requests, threatening privacy and security for citizens and government agencies alike. #Cybersecurity #… https://t.co/lkeIAioJsD
2025.04.07
5Proofpoint @proofpoint
POV: You're a persistent threat actor who plays the long game, knowing that one #compromised account can unlock a company's crown jewels: sensitive data. Step into the mind of a #cybercriminal to learn why a holistic #HumanCentricSecurity strategy is key. https://t.co/9T95D1LINF
2025.03.31

News

(Total : 0)

No data.

Additional information

No data
No data
No data
No URL CC ASN Co Reporter Date
1https://aproductions360.com/index/wp-content/plugins/core/716.7z
compromised IcedID
ES ESComvive Servidores S.L.JAMESWT_MHT2023.10.02
Beta Service, If you select keyword, you can check detailed information.