Summary: 2025/04/28 22:50

First reported date: 2014/05/07
Inquiry period : 2025/03/29 22:50 ~ 2025/04/28 22:50 (1 months), 28 search results

전 기간대비 4% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
key Report attack Exploit Ransomware 입니다.
악성코드 유형 Vawtrak Astasia Entropy 도 새롭게 확인됩니다.
공격기술 RCE APT hijack 도 새롭게 확인됩니다.
기관 및 기업 Rapid7 FBI 도 새롭게 확인됩니다.
기타 incident real detection api triggered 등 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/28 Navigating Through The Fog
    ㆍ 2025/04/24 10 key numbers from the 2024 FBI IC3 report
    ㆍ 2025/04/16 API Security Is Key to Cyber Resilience in Media and Entertainment

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1key 28 ▲ 1 (4%)
2Report 9 ▲ 5 (56%)
3attack 7 ▲ 4 (57%)
4Malware 4 ▼ -4 (-100%)
5Exploit 4 ▲ 3 (75%)
6Ransomware 3 ▲ 1 (33%)
7incident 3 ▲ new
8real 3 ▲ new
9RCE 3 ▲ new
10detection 3 ▲ new
11api 3 ▲ new
12triggered 3 ▲ new
13Server 2 ▲ new
14c&c 2 ▲ new
15Operation 2 - 0 (0%)
16Email 2 ▲ 1 (50%)
17Review 2 ▲ new
18AI 2 - 0 (0%)
19Vawtrak 2 ▲ new
20Windows 2 ▲ 1 (50%)
21Update 2 ▲ 1 (50%)
22target 2 - 0 (0%)
23APT 2 ▲ new
24Software 2 ▲ new
25market 2 ▲ 1 (50%)
26Campaign 2 - 0 (0%)
27job 2 ▲ 1 (50%)
28Google 2 ▲ 1 (50%)
29CybelAngel 1 ▲ new
30Rapid7 1 ▲ new
31Q1 1 ▲ new
32Labs 1 ▲ new
33Rapid 1 ▲ new
34Harvest 1 ▲ new
35LOTUS PANDA 1 - 0 (0%)
36Chrome 1 - 0 (0%)
37youve 1 ▲ new
38hijack 1 ▲ new
39Chinalinked 1 ▲ new
40Panda 1 - 0 (0%)
41Passwort 1 ▲ new
42Lotus 1 - 0 (0%)
43Is 1 ▲ new
44Kaspersky 1 - 0 (0%)
45China 1 ▼ -1 (-100%)
46BreachForumsST 1 ▲ new
47Takeaways 1 - 0 (0%)
48MWNEWS 1 ▼ -3 (-300%)
49Fog 1 ▲ new
50MTrends 1 ▲ new
51Join 1 ▲ new
52arrest 1 ▲ new
53Astasia 1 ▲ new
54Forum 1 ▲ new
55Shiny 1 ▲ new
56IntelBroker 1 ▲ new
57breachforums 1 ▲ new
58OT 1 ▲ new
59unifying 1 ▲ new
60product 1 ▲ new
61Proofpoint 1 - 0 (0%)
62datasecurity 1 ▲ new
63threatprotection 1 ▲ new
64yearly 1 ▲ new
65IC3 1 ▲ new
66FBI 1 ▲ new
67Infrastructure 1 ▲ new
68GITEX 1 ▲ new
69Challenges 1 ▲ new
70Authentifizierung 1 ▲ new
71result 1 ▲ new
72Public 1 - 0 (0%)
73internal 1 ▲ new
74Vulnerability 1 - 0 (0%)
75Phishing 1 - 0 (0%)
76Blog 1 ▲ new
77Talos 1 ▲ new
78Shaped 1 ▲ new
79Roles 1 ▲ new
80intelligence 1 ▼ -3 (-300%)
81grep 1 ▲ new
82Rey 1 ▲ new
83httpstcobbh 1 ▲ new
84Microsoft 1 ▼ -1 (-100%)
85ra 1 ▲ new
86Mentoring 1 ▲ new
87Intergenerational 1 ▲ new
88Reading 1 ▲ new
89Dark 1 ▲ new
90CICD 1 ▲ new
91Misconfigurations 1 ▲ new
92OHMYDC 1 ▲ new
93OIDC 1 ▲ new
94Data Center 1 ▲ new
95United States 1 - 0 (0%)
96Entropy 1 ▲ new
97demos 1 ▲ new
98Blue Team 1 ▲ new
99handson 1 ▲ new
100Day 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
Ransomware
3 (37.5%)
Vawtrak
2 (25%)
Astasia
1 (12.5%)
Entropy
1 (12.5%)
Konni
1 (12.5%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
LOTUS PANDA
1 (100%)
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Exploit
4 (26.7%)
RCE
3 (20%)
APT
2 (13.3%)
Campaign
2 (13.3%)
hijack
1 (6.7%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
Google
2 (20%)
Rapid7
1 (10%)
Kaspersky
1 (10%)
China
1 (10%)
Proofpoint
1 (10%)
Threat info
Last 5

SNS

(Total : 17)
  Total keyword

Report attack Attacker Ransomware Exploit APT China arrest RCE LOTUS PANDA Chrome hijack Software Astasia Kaspersky Proofpoint Email Campaign Vawtrak Update Google Konni Rapid7

No Title Date
1Mandiant (part of Google Cloud) @Mandiant
???? Join the experts unpacking the M-Trends 2025 Report and get the latest on evolving cyber threats! From key trends to real-world insights, hear directly from the authors and expert analysts. ???? https://t.co/S4WtJBDz5R https://t.co/Cfm7BTKITt
2025.04.27
2FalconFeeds.io @FalconFeedsio
???? #BreachForums.ST reportedly seized. Rumors circulating about arrests of key members "IntelBroker" and "Shiny." Forum admin "Anastasia" claims to have resigned and says the site is down for good. There are also unverified reports that a full backup database & source code https://t.co/9sr
2025.04.25
3Kaspersky @kaspersky
Key OT Cybersecurity Challenges Revealed at GITEX Asia! ???? New research by Kaspersky & VDC Research shows 46.6% of industrial firms cite inadequate security measures, while 42.7% struggle with compliance in their OT environments. Yet 63.6% aim for full digital transformation https://t.co/xk3s
2025.04.24
4Proofpoint @proofpoint
This week, Proofpoint made two key product announcements focused on unifying #threatprotection and #datasecurity across multiple digital channels and organizational environments. @techday_ca covered the news. https://t.co/40lTnoEEzz
2025.04.24
5Kaspersky @kaspersky
Behind the attacks: breaking down real incident tactics & key detections in 2024 From exploited gaps to the most triggered detection rules, we’re unpacking how attackers operated in 2024—and what your defenses need to stop them. Swipe through ⬇️ #Cybersecurity https://t.co/YC1vsBvlab
2025.04.23

Additional information

No Title Date
110 key numbers from the 2024 FBI IC3 report - CyberScoop2025.04.24
2Malware and cryptography 41 - encrypt/decrypt payload via TEA. Simple Nim example - Malware.News2025.04.10
3The SQL Server Crypto Detour - Malware.News2025.04.09
4The SQL Server Crypto Detour - Malware.News2025.04.09
5SnakeKeylogger: A Multistage Info Stealer Malware Campaign - Malware.News2025.03.25
View only the last 5
Level Description
danger File has been identified by 52 AntiVirus engines on VirusTotal as malicious
warning Generates some ICMP traffic
watch Appends a known multi-family ransomware file extension to files that have been encrypted
watch Attempts to access Bitcoin/ALTCoin wallets
watch Attempts to create or modify system certificates
watch Collects information about installed applications
watch Communicates with host for which no DNS query was performed
watch Installs itself for autorun at Windows startup
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops a binary and executes it
notice Drops an executable to the user AppData folder
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Looks up the external IP address
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Queries for potentially installed applications
notice Steals private information from local Internet browsers
notice Uses Windows utilities for basic Windows functionality
notice Yara rule detected in process memory
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info Command line console output was observed
info One or more processes crashed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info Tries to locate where the browsers are installed
info Uses Windows APIs to generate a cryptographic key
Network ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI)
Network ET HUNTING Telegram API Domain in DNS Lookup
Network ET INFO TLS Handshake Failure
Network ET POLICY External IP Lookup ip-api.com
Network SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
No data
No data
Beta Service, If you select keyword, you can check detailed information.