Summary: 2025/04/28 23:56
First reported date: 2014/05/09
Inquiry period : 2025/03/29 23:56 ~ 2025/04/28 23:56 (1 months), 21 search results
전 기간대비 29% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 Firmware Malware Update Vulnerability Exploit 입니다.
악성코드 유형 Entropy Trojan DYEPACK 도 새롭게 확인됩니다.
공격자 DragonOK 도 새롭게 확인됩니다.
공격기술 RCE hijack XSS Hijacking Social Engineering 도 새롭게 확인됩니다.
기관 및 기업 Kaspersky United Kingdom Australia Europe Coinbase 도 새롭게 확인됩니다.
기타 Cryptocurrency code SMA Email iCloud 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/26 What is the xBOM?
ㆍ 2025/04/24 Eclypsium Supply Chain Security Platform Now Offered Through GuidePoint Security
ㆍ 2025/04/24 Exploiting the Synology DiskStation with Null-byte Writes
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Firmware | 21 | ▲ 6 (29%) |
2 | Malware | 12 | ▲ 1 (8%) |
3 | Update | 12 | ▲ 4 (33%) |
4 | Vulnerability | 10 | ▲ 4 (40%) |
5 | Exploit | 8 | ▲ 2 (25%) |
6 | Software | 7 | ▲ 2 (29%) |
7 | Remote Code Execution | 6 | ▲ 1 (17%) |
8 | attack | 6 | ▼ -1 (-17%) |
9 | United States | 6 | ▲ 4 (67%) |
10 | target | 5 | ▼ -2 (-40%) |
11 | Advertising | 5 | ▲ 4 (80%) |
12 | Report | 5 | ▼ -2 (-40%) |
13 | Supply chain | 4 | ▼ -2 (-50%) |
14 | Operation | 4 | ▲ 3 (75%) |
15 | Microsoft | 4 | ▲ 3 (75%) |
16 | ESET | 3 | ▲ 2 (67%) |
17 | Campaign | 3 | ▼ -1 (-33%) |
18 | Windows | 3 | ▲ 1 (33%) |
19 | RCE | 3 | ▲ new |
20 | intelligence | 3 | ▼ -1 (-33%) |
21 | Ransomware | 3 | - 0 (0%) |
22 | hardware | 2 | - 0 (0%) |
23 | Phishing | 2 | ▲ 1 (50%) |
24 | c&c | 2 | - 0 (0%) |
25 | Cryptocurrency | 2 | ▲ new |
26 | code | 2 | ▲ new |
27 | Government | 2 | - 0 (0%) |
28 | Entropy | 2 | ▲ new |
29 | SMA | 2 | ▲ new |
30 | 2 | ▲ new | |
31 | iCloud | 2 | ▲ new |
32 | Trojan | 2 | ▲ new |
33 | hijack | 2 | ▲ new |
34 | MWNEWS | 2 | ▲ new |
35 | Kaspersky | 2 | ▲ new |
36 | CVSS | 2 | - 0 (0%) |
37 | GameoverP2P | 2 | - 0 (0%) |
38 | GitHub | 2 | ▲ new |
39 | 2 | ▲ new | |
40 | RATel | 2 | ▲ 1 (50%) |
41 | DNS | 2 | ▲ new |
42 | NIST | 2 | ▲ new |
43 | Command | 2 | ▲ new |
44 | Sonicwall | 2 | ▲ new |
45 | Linux | 2 | - 0 (0%) |
46 | IoT | 2 | ▲ 1 (50%) |
47 | AI | 2 | ▲ new |
48 | CISA | 2 | ▼ -2 (-100%) |
49 | 2 | ▲ new | |
50 | ta | 1 | ▲ new |
51 | Router | 1 | - 0 (0%) |
52 | XSS | 1 | ▲ new |
53 | Angreifer | 1 | ▲ new |
54 | missbrauchen | 1 | ▲ new |
55 | Data Center | 1 | - 0 (0%) |
56 | Flaw | 1 | ▲ new |
57 | Hits | 1 | ▲ new |
58 | DYEPACK | 1 | ▲ new |
59 | Zero Trust | 1 | ▲ new |
60 | United Kingdom | 1 | ▲ new |
61 | Australia | 1 | ▲ new |
62 | CISAs | 1 | ▲ new |
63 | AiCloud | 1 | ▲ new |
64 | Hijacking | 1 | ▲ new |
65 | ASUS | 1 | ▲ new |
66 | supply | 1 | ▲ new |
67 | Materials | 1 | ▲ new |
68 | Bill | 1 | ▲ new |
69 | Europe | 1 | ▲ new |
70 | Takedown | 1 | ▲ new |
71 | Education | 1 | - 0 (0%) |
72 | Android | 1 | ▼ -1 (-100%) |
73 | Triada | 1 | ▲ new |
74 | research | 1 | ▲ new |
75 | Kasperskys | 1 | ▲ new |
76 | chain | 1 | ▲ new |
77 | Eclypsium | 1 | - 0 (0%) |
78 | Confirms | 1 | ▲ new |
79 | gt | 1 | ▲ new |
80 | Synology | 1 | ▲ new |
81 | pointer | 1 | ▲ new |
82 | payload | 1 | ▲ new |
83 | NAS | 1 | ▲ new |
84 | PoC | 1 | ▲ new |
85 | Oracle | 1 | - 0 (0%) |
86 | April | 1 | ▲ new |
87 | traditional | 1 | ▲ new |
88 | Rockbox | 1 | ▲ new |
89 | Critical | 1 | ▲ new |
90 | alte | 1 | ▲ new |
91 | DragonOK | 1 | ▲ new |
92 | future | 1 | ▲ new |
93 | memory | 1 | ▲ new |
94 | Cloudflare | 1 | ▲ new |
95 | Java | 1 | - 0 (0%) |
96 | Gmail | 1 | ▲ new |
97 | Coinbase | 1 | ▲ new |
98 | Akamai | 1 | ▲ new |
99 | Victim | 1 | ▼ -1 (-100%) |
100 | Social Engineering | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Ransomware |
|
3 (23.1%) |
Entropy |
|
2 (15.4%) |
Trojan |
|
2 (15.4%) |
GameoverP2P |
|
2 (15.4%) |
RATel |
|
2 (15.4%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|---|---|
DragonOK |
|
1 (100%) |

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Exploit |
|
8 (29.6%) |
Remote Code Execution |
|
6 (22.2%) |
Campaign |
|
3 (11.1%) |
RCE |
|
3 (11.1%) |
Phishing |
|
2 (7.4%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
United States |
|
6 (23.1%) |
Microsoft |
|
4 (15.4%) |
ESET |
|
3 (11.5%) |
Government |
|
2 (7.7%) |
Kaspersky |
|
2 (7.7%) |
Threat info
Last 5SNS
(Total : 2)Firmware CVSS Cryptocurrency Android Trojan Attacker Update Exploit Vulnerability CISA Kaspersky
News
(Total : 19)Firmware Malware Update Vulnerability Attacker Exploit Software United States Remote Code Execution attack Report target Advertising Supply chain Microsoft Operation Campaign intelligence ESET Ransomware RCE Windows Email hijack c&c iCloud RATel Entropy GameoverP2P IoT Government Phishing DNS NIST Linux LinkedIn Twitter GitHub NAS Australia DYEPACK Education Zero Trust Takedown United Kingdom Europe CISA XSS Data Center Hijacking PoC Router CVSS Oracle EDR Cisco Red Hat Victim Cryptocurrency Social Engineering Vawtrak Google Ubuntu Coinbase Distribution DragonOK ...
No | Title | Date |
---|---|---|
1 | What is the xBOM? - Malware.News | 2025.04.26 |
2 | Eclypsium Supply Chain Security Platform Now Offered Through GuidePoint Security - Malware.News | 2025.04.24 |
3 | Exploiting the Synology DiskStation with Null-byte Writes - Malware.News | 2025.04.24 |
4 | Rockbox 4.0 Released - Hackaday | 2025.04.20 |
5 | ASUS Confirms Critical Flaw in AiCloud Routers; Users Urged to Update Firmware - The Hacker News | 2025.04.19 |
Additional information
No | Title | Date |
---|---|---|
1 | Employee monitoring app exposes users, leaks 21+ million screenshots - Malware.News | 2025.04.28 |
2 | Introducing XSIAM 3.0 - Malware.News | 2025.04.28 |
3 | Deploy Bravely with Prisma AIRS - Malware.News | 2025.04.28 |
4 | 2025 Cyber Resilience Research Discovers Speed of AI Advancing Emerging Attack Types - Malware.News | 2025.04.28 |
5 | Intel CEO Targets Change in Corporate Culture to Shape Up - Bloomberg Technology | 2025.04.28 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Exploiting the Synology DiskStation with Null-byte Writes - Malware.News | 2025.04.24 |
2 | Microsoft’s Secure by Design journey: One year of success - Malware.News | 2025.04.18 |
3 | Microsoft’s Secure by Design journey: One year of success - Malware.News | 2025.04.18 |
4 | A Seven‑Year‑Old Cisco Flaw Now Lets Hackers Execute Code Remotely on Network Gear - Malware.News | 2025.04.11 |
5 | How ToddyCat tried to hide behind AV software - Malware.News | 2025.04.07 |
View only the last 5 |
No | URL | CC | ASN Co | Reporter | Date |
---|---|---|---|---|---|
1 | http://194.116.215.67/i firmware mirai sh ua-wget | RU ![]() | Perviy TSOD LLC | NDA0E | 2024.09.05 |
2 | http://194.116.215.67/e firmware mirai sh ua-wget | RU ![]() | Perviy TSOD LLC | NDA0E | 2024.09.05 |
3 | http://194.116.215.67/f firmware mirai sh ua-wget | RU ![]() | Perviy TSOD LLC | NDA0E | 2024.09.05 |
4 | https://194.116.215.67/e firmware mirai sh ua-wget | RU ![]() | Perviy TSOD LLC | NDA0E | 2024.09.05 |
5 | http://194.116.215.67/a firmware mirai sh ua-wget | RU ![]() | Perviy TSOD LLC | NDA0E | 2024.09.05 |
View only the last 5 |