Summary: 2025/04/28 23:54
First reported date: 2016/04/21
Inquiry period : 2025/03/29 23:54 ~ 2025/04/28 23:54 (1 months), 6 search results
전 기간대비 67% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 Malware Entropy Update Software attack 입니다.
악성코드 유형 RATel TrickBot Ransomware DYEPACK 도 새롭게 확인됩니다.
공격기술 Exploit RCE Campaign Phishing Hijacking Stealer Social Engineering 도 새롭게 확인됩니다.
기관 및 기업 United States Kaspersky Recorded Future Google Oracle Paloalto Australia ESET Russia Ucraina 도 새롭게 확인됩니다.
기타 Advertising Password Vulnerability Firmware c&c 등 신규 키워드도 확인됩니다.
Entropy is a ransomware first seen in 1st quarter of 2022, is being used in conjunction of Dridex infection. The ransomware uses a custom packer to pack itself which has been seen in some early dridex samples. Ref.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/24 Exploiting the Synology DiskStation with Null-byte Writes
ㆍ 2025/04/15 Quantum delivers really random numbers: How that boosts AppSec
ㆍ 2025/04/09 The SQL Server Crypto Detour
참고로 동일한 그룹의 악성코드 타입은 WannaCry Sodinokibi Phobos 등 78개 종이 확인됩니다.
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Malware | 6 | ▲ 4 (67%) |
2 | Entropy | 6 | ▲ 4 (67%) |
3 | Update | 6 | ▲ 5 (83%) |
4 | United States | 5 | ▲ new |
5 | Software | 4 | ▲ 3 (75%) |
6 | attack | 3 | ▲ 2 (67%) |
7 | target | 3 | ▲ 2 (67%) |
8 | Advertising | 3 | ▲ new |
9 | Vawtrak | 3 | ▲ 2 (67%) |
10 | GameoverP2P | 3 | ▲ 2 (67%) |
11 | Exploit | 3 | ▲ new |
12 | Password | 2 | ▲ new |
13 | Operation | 2 | ▲ 1 (50%) |
14 | Vulnerability | 2 | ▲ new |
15 | RCE | 2 | ▲ new |
16 | Firmware | 2 | ▲ new |
17 | RATel | 2 | ▲ new |
18 | Windows | 2 | ▲ 1 (50%) |
19 | Report | 2 | ▲ 1 (50%) |
20 | Campaign | 2 | ▲ new |
21 | c&c | 2 | ▲ new |
22 | Victim | 2 | ▲ new |
23 | Cyber Caliphate Army | 1 | ▲ new |
24 | Cryptographic key | 1 | ▲ new |
25 | Kaspersky | 1 | ▲ new |
26 | Red Hat | 1 | ▲ new |
27 | Recorded Future | 1 | ▲ new |
28 | NIST | 1 | ▲ new |
29 | Server | 1 | ▲ new |
30 | SQL | 1 | ▲ new |
31 | database | 1 | ▲ new |
32 | Phishing | 1 | ▲ new |
33 | RSA Conference | 1 | ▲ new |
34 | Remote Code Execution | 1 | - 0 (0%) |
35 | 1 | ▲ new | |
36 | key | 1 | ▲ new |
37 | random | 1 | ▲ new |
38 | IoT | 1 | ▲ new |
39 | QRNGs | 1 | ▲ new |
40 | QRNG | 1 | ▲ new |
41 | quantum | 1 | ▲ new |
42 | randomness | 1 | ▲ new |
43 | Oracle | 1 | ▲ new |
44 | Linux | 1 | ▲ new |
45 | PoC | 1 | ▲ new |
46 | hijack | 1 | - 0 (0%) |
47 | Hijacking | 1 | ▲ new |
48 | NAS | 1 | ▲ new |
49 | command | 1 | ▲ new |
50 | payload | 1 | ▲ new |
51 | pointer | 1 | ▲ new |
52 | Synology | 1 | ▲ new |
53 | Microsoft | 1 | - 0 (0%) |
54 | Jungian | 1 | ▲ new |
55 | lo | 1 | ▲ new |
56 | TrickBot | 1 | ▲ new |
57 | Criminal | 1 | ▲ new |
58 | Palo Alto | 1 | ▲ new |
59 | Stealer | 1 | ▲ new |
60 | 팔로알토 | 1 | ▲ new |
61 | Paloalto | 1 | ▲ new |
62 | DarkWeb | 1 | ▲ new |
63 | Ransomware | 1 | ▲ new |
64 | Australia | 1 | ▲ new |
65 | ESET | 1 | ▲ new |
66 | Malicious Traffic | 1 | ▲ new |
67 | memory | 1 | ▲ new |
68 | Ninja | 1 | ▲ new |
69 | analysis | 1 | ▲ new |
70 | Careto | 1 | ▲ new |
71 | DYEPACK | 1 | ▲ new |
72 | Copy-Paste | 1 | ▲ new |
73 | IoC | 1 | - 0 (0%) |
74 | powershell | 1 | - 0 (0%) |
75 | EDR | 1 | ▲ new |
76 | Social Engineering | 1 | ▲ new |
77 | GitHub | 1 | - 0 (0%) |
78 | 1 | ▲ new | |
79 | 1 | ▲ new | |
80 | intelligence | 1 | ▲ new |
81 | Russia | 1 | ▲ new |
82 | Ucraina | 1 | ▲ new |
83 | Red Team | 1 | ▲ new |
84 | detection | 1 | ▲ new |
85 | unconscious | 1 | ▲ new |
86 | gt | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Entropy |
|
6 (35.3%) |
Vawtrak |
|
3 (17.6%) |
GameoverP2P |
|
3 (17.6%) |
RATel |
|
2 (11.8%) |
TrickBot |
|
1 (5.9%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Exploit |
|
3 (23.1%) |
RCE |
|
2 (15.4%) |
Campaign |
|
2 (15.4%) |
Phishing |
|
1 (7.7%) |
Remote Code Execution |
|
1 (7.7%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
United States |
|
5 (33.3%) |
Kaspersky |
|
1 (6.7%) |
Recorded Future |
|
1 (6.7%) |
|
1 (6.7%) | |
Oracle |
|
1 (6.7%) |
Malware Family
Top 5
A malware family is a group of applications with similar attack techniques.
In this trend, it is classified into Ransomware, Stealer, RAT or Backdoor, Loader, Botnet, Cryptocurrency Miner.
Threat info
Last 5SNS
(Total : 0)No data.
News
(Total : 6)Malware Entropy Update United States Software attack Attacker target Advertising Vawtrak GameoverP2P Exploit Password Operation Vulnerability RCE Firmware RATel Windows Report Campaign c&c Victim Cyber Caliphate Army Cryptographic key Kaspersky Red Hat Recorded Future NIST Phishing RSA Conference Remote Code Execution Google IoT Oracle Linux PoC hijack Hijacking NAS Microsoft TrickBot Criminal Stealer Paloalto DarkWeb Ransomware Australia ESET Malicious Traffic Careto DYEPACK Copy-Paste IoC powershell EDR Social Engineering GitHub Twitter LinkedIn intelligence Russia Ucraina Red Team
No | Title | Date |
---|---|---|
1 | Exploiting the Synology DiskStation with Null-byte Writes - Malware.News | 2025.04.24 |
2 | Quantum delivers really random numbers: How that boosts AppSec - Malware.News | 2025.04.15 |
3 | The SQL Server Crypto Detour - Malware.News | 2025.04.09 |
4 | “Invoke-Shadow” — Applying Jungian Psychology to Detection Engineering - Malware.News | 2025.04.08 |
5 | Embedded Reverse Engineering with Firmware Ninja - Malware.News | 2025.04.03 |
Additional information
No | Title | Date |
---|---|---|
1 | Employee monitoring app exposes users, leaks 21+ million screenshots - Malware.News | 2025.04.28 |
2 | Introducing XSIAM 3.0 - Malware.News | 2025.04.28 |
3 | Deploy Bravely with Prisma AIRS - Malware.News | 2025.04.28 |
4 | 2025 Cyber Resilience Research Discovers Speed of AI Advancing Emerging Attack Types - Malware.News | 2025.04.28 |
5 | Intel CEO Targets Change in Corporate Culture to Shape Up - Bloomberg Technology | 2025.04.28 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Exploiting the Synology DiskStation with Null-byte Writes - Malware.News | 2025.04.24 |
2 | The SQL Server Crypto Detour - Malware.News | 2025.04.09 |
3 | The SQL Server Crypto Detour - Malware.News | 2025.04.09 |
4 | Embedded Reverse Engineering with Firmware Ninja - Malware.News | 2025.04.03 |
5 | Fast Flux: A National Security Threat - CISA Alerts | 2025.04.02 |
View only the last 5 |