Summary: 2025/04/28 21:24

First reported date: 2014/05/13
Inquiry period : 2025/03/29 21:24 ~ 2025/04/28 21:24 (1 months), 16 search results

전 기간대비 31% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
HTTP Next stage Remote 입니다.
공격자 Kimsuky 도 새롭게 확인됩니다.
기관 및 기업 DPRK North Korea 도 새롭게 확인됩니다.
기타 Alert CVE Navigator IBMi QRadar Security Suite 등 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/17 [webapps] IBMi Navigator 7.5 - HTTP Security Token Bypass
    ㆍ 2025/04/15 [webapps] IBMi Navigator 7.5 - HTTP Security Token Bypass

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1HTTP 16 ▲ 5 (31%)
2Next 4 ▲ 2 (50%)
3stage 4 ▲ 2 (50%)
4Alert 2 ▲ new
5CVE 2 ▲ new
6Navigator 2 ▲ new
7IBMi 2 ▲ new
8QRadar Security Suite 2 ▲ new
9Token 2 ▲ new
10Request 2 ▲ new
11Remote 2 ▲ 1 (50%)
12Vulnerability 2 ▲ new
13Related 1 ▲ new
14DPRK 1 ▲ new
15vstAdphpnewpacomlineampwpnaaa 1 ▲ new
16North Korea 1 ▲ new
17same 1 ▲ new
18error 1 ▲ new
19PaloNetworkFilesJL 1 ▲ new
20emacsbin 1 ▲ new
21httpstcoTpRg 1 ▲ new
22archive 1 ▼ -1 (-100%)
23Password 1 ▲ new
24Panel 1 ▲ new
25httpswinrarnet 1 ▲ new
26copy 1 ▲ new
27official 1 ▲ new
28Kimsuky 1 ▲ new
29thorscanner 1 ▲ new
30crond 1 ▲ new
31Codes 1 ▲ new
32SAP 1 ▲ new
33opendir 1 ▲ new
34httpstcoZOUNJmYwkc 1 ▲ new
35Open Directory 1 ▲ new
36openwinsys 1 ▲ new
37Status 1 ▲ new
38Vite 1 ▲ new
39NetWeaver 1 ▲ new
40target 1 ▲ new
41unauthenticated 1 ▲ new
42FUD 1 ▲ new
43AV 1 ▲ new
44VT 1 ▲ new
45WinRAR 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


No data.

Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Kimsuky
1 (100%)
Attack technique
Technique

This is an attack technique that is becoming an issue.


No data.

Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
DPRK
1 (50%)
North Korea
1 (50%)
Threat info
Last 5

Additional information

No Title Date
1HTTP/3 is everywhere but nowhere - Malware.News2025.03.13
2HTTP/3 is everywhere but nowhere - Malware.News2025.03.13
3HTTP/3 is everywhere but nowhere - Malware.News2025.03.13
4HTTP/3 is everywhere but nowhere - Malware.News2025.03.13
5HTTP/3 is everywhere but nowhere - Malware.News2025.03.13
View only the last 5
Level Description
danger File has been identified by 33 AntiVirus engines on VirusTotal as malicious
watch Attempts to stop active services
watch Creates known SpyNet files
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops a binary and executes it
notice Drops an executable to the user AppData folder
notice Executes one or more WMI queries
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Uses Windows utilities for basic Windows functionality
notice Yara rule detected in process memory
info Checks amount of memory in system
info Command line console output was observed
info One or more processes crashed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
No data
No data
Beta Service, If you select keyword, you can check detailed information.