Summary: 2025/04/28 19:49
First reported date: 2011/01/20
Inquiry period : 2025/03/29 19:49 ~ 2025/04/28 19:49 (1 months), 140 search results
전 기간대비 15% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 NetWireRC c&c njRAT C2 RAT 입니다.
악성코드 유형 DslogdRAT Xloader 도 새롭게 확인됩니다.
공격자 SideCopy UNC5221 도 새롭게 확인됩니다.
공격기술 RCE 도 새롭게 확인됩니다.
기관 및 기업 CISA AhnLab Germany 도 새롭게 확인됩니다.
기타 ResolverRAT MysterySnail Ivanti healthcare Open Directory 등 신규 키워드도 확인됩니다.
Netwire is an advanced RAT — it is a malware that takes control of infected PCs and allows its operators to perform various actions. Unlike many RATs, this one can target every major operating system, including Windows, Linux, and MacOS. Ref.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/25 DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks
ㆍ 2025/04/24 DslogdRAT Malware Installed in Ivanti Connect Secure
ㆍ 2025/04/24 Top intelligence lawmaker fears China may exploit DOGE’s changes to government
참고로 동일한 그룹의 악성코드 타입은 Remcos njRAT QuasarRAT 등 112개 종이 확인됩니다.
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | NetWireRC | 140 | ▲ 21 (15%) |
2 | c&c | 59 | ▲ 17 (29%) |
3 | Malware | 56 | ▼ -7 (-13%) |
4 | njRAT | 48 | ▲ 21 (44%) |
5 | C2 | 46 | ▲ 19 (41%) |
6 | RAT | 44 | ▲ 7 (16%) |
7 | Campaign | 31 | ▼ -6 (-19%) |
8 | Phishing | 24 | - 0 (0%) |
9 | target | 20 | ▼ -5 (-25%) |
10 | Report | 20 | ▼ -9 (-45%) |
11 | attack | 17 | ▼ -2 (-12%) |
12 | Trojan | 15 | ▲ 1 (7%) |
13 | AsyncRAT | 15 | ▼ -10 (-67%) |
14 | IoC | 15 | ▼ -8 (-53%) |
15 | United States | 15 | ▼ -3 (-20%) |
16 | Update | 15 | ▼ -6 (-40%) |
17 | Remcos | 14 | ▲ 8 (57%) |
18 | Victim | 14 | ▼ -3 (-21%) |
19 | China | 14 | ▲ 2 (14%) |
20 | Advertising | 13 | ▼ -6 (-46%) |
21 | powershell | 11 | ▼ -2 (-18%) |
22 | Windows | 11 | ▼ -6 (-55%) |
23 | intelligence | 11 | ▲ 1 (9%) |
24 | 11 | ▼ -1 (-9%) | |
25 | Russia | 10 | - 0 (0%) |
26 | Kaspersky | 10 | ▼ -1 (-10%) |
27 | hacking | 9 | ▲ 5 (56%) |
28 | Vulnerability | 9 | ▼ -6 (-67%) |
29 | Distribution | 9 | - 0 (0%) |
30 | Exploit | 9 | ▼ -7 (-78%) |
31 | DslogdRAT | 8 | ▲ new |
32 | Microsoft | 8 | ▼ -12 (-150%) |
33 | ZeroDay | 8 | ▲ 6 (75%) |
34 | XWorm | 8 | ▼ -4 (-50%) |
35 | Cobalt Strike | 7 | ▲ 3 (43%) |
36 | Software | 7 | ▼ -4 (-57%) |
37 | Linux | 7 | ▲ 2 (29%) |
38 | Government | 7 | ▼ -1 (-14%) |
39 | Android | 7 | ▲ 1 (14%) |
40 | Lumma | 6 | ▼ -4 (-67%) |
41 | India | 6 | ▲ 3 (50%) |
42 | ResolverRAT | 6 | ▲ new |
43 | Japan | 6 | ▲ 3 (50%) |
44 | GameoverP2P | 5 | - 0 (0%) |
45 | Social Engineering | 5 | ▼ -2 (-40%) |
46 | abusech | 5 | ▲ 3 (60%) |
47 | Low | 5 | ▲ 4 (80%) |
48 | ThreatProtection | 5 | ▲ 1 (20%) |
49 | Backdoor | 5 | ▼ -7 (-140%) |
50 | North Korea | 5 | - 0 (0%) |
51 | Cisco | 5 | ▲ 3 (60%) |
52 | Top | 5 | ▲ 2 (40%) |
53 | RCE | 5 | ▲ new |
54 | Xloader | 5 | ▲ new |
55 | Operation | 4 | ▼ -4 (-100%) |
56 | Education | 4 | - 0 (0%) |
57 | MysterySnail | 4 | ▲ new |
58 | CISA | 4 | ▲ new |
59 | fake | 4 | ▲ 2 (50%) |
60 | last | 4 | - 0 (0%) |
61 | Ivanti | 4 | ▲ new |
62 | Amadey | 4 | ▲ 3 (75%) |
63 | AgentTesla | 4 | - 0 (0%) |
64 | NortonLifeLock | 4 | - 0 (0%) |
65 | snake | 4 | ▲ 1 (25%) |
66 | tofsee | 4 | ▲ 2 (50%) |
67 | Stealer | 4 | ▼ -17 (-425%) |
68 | Java | 4 | ▼ -3 (-75%) |
69 | Cryptocurrency | 3 | ▼ -10 (-333%) |
70 | Ucraina | 3 | ▼ -3 (-100%) |
71 | threat | 3 | - 0 (0%) |
72 | 3 | ▼ -4 (-133%) | |
73 | Banking | 3 | ▲ 2 (67%) |
74 | GitHub | 3 | ▼ -2 (-67%) |
75 | healthcare | 3 | ▲ new |
76 | Open Directory | 3 | ▲ new |
77 | AhnLab | 3 | ▲ new |
78 | NSA | 3 | ▲ 2 (67%) |
79 | Vawtrak | 3 | ▲ 1 (33%) |
80 | Cobalt | 3 | ▲ 2 (67%) |
81 | Downloader | 3 | ▲ 2 (67%) |
82 | Telegram | 3 | ▼ -1 (-33%) |
83 | Germany | 3 | ▲ new |
84 | DCRat | 3 | ▼ -5 (-167%) |
85 | Criminal | 3 | ▼ -9 (-300%) |
86 | Cloudflare | 3 | ▲ 2 (67%) |
87 | multistage | 3 | ▲ new |
88 | Ransomware | 3 | ▼ -7 (-233%) |
89 | Chinese | 3 | ▲ 2 (67%) |
90 | Volt Typhoon | 3 | ▲ 2 (67%) |
91 | ClickFix | 2 | - 0 (0%) |
92 | SectopRAT | 2 | ▲ 1 (50%) |
93 | SideCopy | 2 | ▲ new |
94 | YouTube | 2 | ▼ -2 (-100%) |
95 | neconyd | 2 | ▲ new |
96 | VirusTotal | 2 | ▲ 1 (50%) |
97 | RATel | 2 | ▲ 1 (50%) |
98 | UNC5221 | 2 | ▲ new |
99 | iocs | 2 | ▲ 1 (50%) |
100 | infrastructure | 2 | ▲ new |
Special keyword group
Top 5
Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|---|---|
Volt Typhoon |
|
3 (27.3%) |
SideCopy |
|
2 (18.2%) |
UNC5221 |
|
2 (18.2%) |
Anonymous |
|
2 (18.2%) |
Lazarus |
|
2 (18.2%) |

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Campaign |
|
31 (32%) |
Phishing |
|
24 (24.7%) |
hacking |
|
9 (9.3%) |
Exploit |
|
9 (9.3%) |
Social Engineering |
|
5 (5.2%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
United States |
|
15 (12%) |
China |
|
14 (11.2%) |
Russia |
|
10 (8%) |
Kaspersky |
|
10 (8%) |
Microsoft |
|
8 (6.4%) |
Malware Family
Top 5
A malware family is a group of applications with similar attack techniques.
In this trend, it is classified into Ransomware, Stealer, RAT or Backdoor, Loader, Botnet, Cryptocurrency Miner.
Threat info
Last 5SNS
(Total : 94)NetWireRC c&c njRAT C2 Malware RAT AsyncRAT Remcos XWorm DslogdRAT Campaign IoC Attacker Advertising Phishing target Amadey Japan Trojan powershell attack AgentTesla Lumma China Chinese Report Distribution Exploit Update Kaspersky Russia DCRat hacking iocs North Korea Cloudflare ZeroDay VBScript DDNS Rhadamanthys Xloader Vulnerability ClickFix Android RCE SectopRAT Banking Microsoft Binance vpn Open Directory VenomRAT opendir ...
News
(Total : 46)NetWireRC Malware Campaign RAT Phishing Report Attacker target United States c&c Victim attack Update China intelligence Trojan Email Windows IoC Advertising Microsoft Government Cobalt Strike powershell Russia Kaspersky Linux Software hacking Vulnerability Android India ZeroDay Remcos Exploit Distribution AsyncRAT GameoverP2P Cisco Education RCE Java Operation Backdoor CISA Social Engineering Cobalt Ransomware NSA Google GitHub Xloader North Korea njRAT Criminal AhnLab Stealer Vawtrak Downloader Germany Cryptocurrency Volt Typhoon Police arrest MgBot Chrome Lazarus Twitter Open Directory ChatGPT VirusTotal UNC5221 UAE Password RATel Lumma Browser SentinelOne DslogdRAT Japan Ucraina Telegram Taiwan Takedown Banking Anonymous Sliver RSA Conference SideCopy ...
No | Title | Date |
---|---|---|
1 | Decoding njRAT traffic with NetworkMiner - Netresec / Erik Hjelmvik / malpedia | 2025.04.28 |
2 | DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks - The Hacker News | 2025.04.25 |
3 | DslogdRAT Malware Installed in Ivanti Connect Secure - Malware.News | 2025.04.24 |
4 | Top intelligence lawmaker fears China may exploit DOGE’s changes to government - Malware.News | 2025.04.24 |
5 | 삼성 스마트폰 One UI, 치명적 보안 결함.. 사용자 데이터 '무방비 노출’ - 시큐리티팩트 | 2025.04.23 |
Additional information
No | Title | Date |
---|---|---|
1 | Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries - Malware.News | 2025.04.28 |
2 | 28th April – Threat Intelligence Report - Malware.News | 2025.04.28 |
3 | Navigating Through The Fog - Malware.News | 2025.04.28 |
4 | Huawei Set to Test Powerful AI Chip to Rival Nvidia’s, WSJ Says - Bloomberg Technology | 2025.04.28 |
5 | Gamers Beware! New Attack Targets Gamers to Deploy AgeoStealer Malware - Malware.News | 2025.04.26 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | DslogdRAT Malware Installed in Ivanti Connect Secure - Malware.News | 2025.04.24 |
2 | DslogdRAT Malware Installed in Ivanti Connect Secure - Malware.News | 2025.04.24 |
3 | Top intelligence lawmaker fears China may exploit DOGE’s changes to government - Malware.News | 2025.04.24 |
4 | Top intelligence lawmaker fears China may exploit DOGE’s changes to government - Malware.News | 2025.04.24 |
5 | Top intelligence lawmaker fears China may exploit DOGE’s changes to government - Malware.News | 2025.04.24 |
View only the last 5 |