Summary: 2025/04/28 20:01

First reported date: 2012/03/26
Inquiry period : 2025/04/21 20:00 ~ 2025/04/28 20:00 (7 days), 25 search results

전 기간대비 32% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
apt Campaign attack North Korea dprk 입니다.
악성코드 유형 LPEClient NetWireRC RokRAT 도 새롭게 확인됩니다.
공격자 SideCopy APT37 도 새롭게 확인됩니다.
공격기술 Spear Phishing Stealer Backdoor 도 새롭게 확인됩니다.
기관 및 기업 Government South Korea India Japan Google Trend Micro United States Egypt 도 새롭게 확인됩니다.
기타 IoC Earth Kurma Chinalinked amp 등 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/25 Earth Kurma APT Campaign Targets Southeast Asian Government, Telecom Sectors
    ㆍ 2025/04/25 Earth Kurma APT Campaign Targets Southeast Asian Government, Telecom Sectors

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1apt 25 ▲ 8 (32%)
2Campaign 22 ▲ 9 (41%)
3attack 6 ▲ 5 (83%)
4Malware 6 - 0 (0%)
5Government 5 ▲ new
6North Korea 4 ▲ 1 (25%)
7dprk 4 ▲ 1 (25%)
8Report 4 ▼ -2 (-50%)
9target 4 ▲ 1 (25%)
10IoC 4 ▲ new
11Update 4 ▲ 3 (75%)
12China 3 ▼ -1 (-33%)
13hacking 3 ▲ 2 (67%)
14securityaffairs 3 ▲ 2 (67%)
15Kimsuky 3 ▲ 1 (33%)
16Lazarus 3 ▲ 1 (33%)
17Earth 3 ▲ new
18Kurma 3 ▲ new
19South Korea 3 ▲ new
20Chinalinked 2 ▲ new
21India 2 ▲ new
22amp 2 ▲ new
23Infra 2 ▲ new
24Southeast 2 ▲ new
25espionage 2 ▲ new
26sample 2 ▲ 1 (50%)
27Exploit 2 - 0 (0%)
28synchole 2 ▲ new
29BlueKeep 2 ▲ new
30Recent 2 ▲ 1 (50%)
31Billbug 2 ▲ new
32multiple 2 ▲ new
33SideWinder 2 ▲ new
34httpsgofinanciallycomimagesupload 2 ▲ new
35RDP 2 ▲ new
36flaw 2 ▲ new
37Kaspersky 2 - 0 (0%)
38Japan 2 ▲ new
39SideCopy 2 ▲ new
40cti 1 ▼ -2 (-200%)
41signbt 1 ▲ new
42threatneedle 1 ▲ new
43LPEClient 1 ▲ new
44innorix 1 ▲ new
45Google 1 ▲ new
46toolset 1 ▲ new
47crossex 1 ▲ new
48hole 1 ▲ new
49agamemnon 1 ▲ new
50South 1 ▲ new
51MSC 1 ▲ new
52Asia 1 ▲ new
53Hash 1 ▲ new
54Decoy 1 ▲ new
55d48032d835c95af816fbcea6e659cdbe 1 ▲ new
56Phishing 1 ▼ -2 (-200%)
57Spear Phishing 1 ▲ new
58NSFOCUS 1 ▲ new
59March 1 ▲ new
60Konni 1 - 0 (0%)
61Alert 1 ▲ new
62VT 1 ▲ new
63comment 1 ▲ new
64Trend Micro 1 ▲ new
65United States 1 ▲ new
66Supply chain 1 ▲ new
67DLs 1 ▲ new
68Operation 1 - 0 (0%)
69Egypt 1 ▲ new
70PDF 1 ▲ new
71Limited 1 ▲ new
72LNK 1 ▲ new
73Grade 1 ▲ new
74group 1 - 0 (0%)
75Query 1 ▲ new
76statelytaurus 1 ▲ new
77MustangPanda 1 ▲ new
78Fofa 1 ▲ new
79C2 1 ▲ new
80IIIdocx 1 ▲ new
81Promotion 1 ▲ new
82Panda 1 - 0 (0%)
83Interactive 1 ▲ new
84letter 1 ▲ new
85Invitation 1 ▲ new
86Reference 1 ▲ new
87Stealer 1 ▲ new
88Backdoor 1 ▲ new
89Lotus 1 ▲ new
90key 1 ▲ new
91Patchwork 1 ▲ new
92과세표준 1 ▲ new
93NetWireRC 1 ▲ new
94df5ba1678a4bf515536c0e622a2f97c597927e01bb674a648d82bbdd797425d9 1 ▲ new
95RokRAT 1 ▲ new
96APT37 1 ▲ new
97Suspicious 1 ▲ new
98신고 1 ▲ new
99확정 1 ▲ new
100종합소득세 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
LPEClient
1 (25%)
Konni
1 (25%)
NetWireRC
1 (25%)
RokRAT
1 (25%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Kimsuky
3 (30%)
Lazarus
3 (30%)
SideCopy
2 (20%)
APT37
1 (10%)
LOTUS PANDA
1 (10%)
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
apt
25 (43.9%)
Campaign
22 (38.6%)
hacking
3 (5.3%)
Exploit
2 (3.5%)
Phishing
1 (1.8%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
Government
5 (17.2%)
North Korea
4 (13.8%)
dprk
4 (13.8%)
China
3 (10.3%)
South Korea
3 (10.3%)
Threat info
Last 5

SNS

(Total : 23)
  Total keyword

apt Campaign attack dprk Malware Report North Korea Update IoC hacking Government Kimsuky China Lazarus South Korea SideCopy Kaspersky target India BlueKeep SideWinder Japan Exploit Backdoor LPEClient Google Supply chain Egypt Phishing Spear Phishing Operation Konni Software hijack Chrome LOTUS PANDA C2 Attacker NetWireRC RokRAT APT37 Stealer c&c ...

No Title Date
1Ginkgo @ginkgo_g
???? waves Found another #APT sample like this! ???? Hash: 667549ae95d4e0d8d04892f5246173bf ???? URL: https://gofinancially.com/images/upload/0424.png Would anyone be sweet enough to share if they've grabbed the payload? ???? I'd be super grateful! ???? https://t.co/qs8aehktJz https://t.co/KSAqeI4
2025.04.28
2JangPro @JangPr0
#APT #DPRK d48032d835c95af816fbcea6e659cdbe Decoy: NTS_eTaxInvoice.html.lnk https://deliberatecollaboration.com/wp-includes/js/src/get.php & upload.php & list.php similar https://t.co/rldVG2Syaw https://t.co/ZKJcng4RBL
2025.04.28
3Cyber_OSINT @Cyber_O51NT
In March 2025, NSFOCUS reported 19 APT attacks primarily targeting government agencies in South Asia and East Asia, with spear phishing accounting for 79% of incidents, highlighting the ongoing threat from groups like Bitter and Lazarus. #CyberSecurity https://t.co/EcOmYPGKC4
2025.04.27
4Ginkgo @ginkgo_g
#Konni #APT https://t.co/R6oBhwFMze
2025.04.25
5Cyber_OSINT @Cyber_O51NT
A recent report reveals that the Earth Kurma APT campaign is actively targeting Southeast Asian government and telecom sectors using advanced malware and cyberespionage techniques. #Cybersecurity #APT https://t.co/afQWXKIEc4
2025.04.25

Additional information

Level Description
danger File has been identified by 56 AntiVirus engines on VirusTotal as malicious
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice The binary likely contains encrypted or compressed data indicative of a packer
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path
No Category URL CC ASN Co Date
1c2http://00701111.000webhostapp.com/wp-extra/show.phpUS US...2023.09.18
No URL CC ASN Co Reporter Date
1https://jpkinki.com/fjugm
APT Kimsuky
US USCLOUDFLARENETIdaNotPro2025.03.26
2https://www.dropbox.com/scl/fi/cnfhxf0nc3qxfklznh5na/zzJG_2.zip?rlkey=7t1et81enar4uvbb7nnk58m9b&st=2...
APT Kimsuky zip
US USDROPBOXabuse_ch2025.02.12
3https://www.dropbox.com/scl/fi/icvpzbx4vn6lcthva168z/zzJG.zip?rlkey=kntc36792grkm64xriqputbdq&st=px5...
APT Kimsuky
US USDROPBOXJAMESWT_MHT2025.02.05
4https://liuyi.neectar.info/hsdverd_3ed5d/mdswsourt_4rfs
APT decoy Patchwork PDF
GB GBabuse_ch2025.01.22
5https://liuyi.neectar.info/lksderdd_4dferd/jhdfer3s_jh3de
APT exe Patchwork rustystealer
GB GBabuse_ch2025.01.22
View only the last 5
Beta Service, If you select keyword, you can check detailed information.