Summary: 2025/04/28 19:58

First reported date: 2016/02/24
Inquiry period : 2025/04/21 19:58 ~ 2025/04/28 19:58 (7 days), 18 search results

전 기간대비 67% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
Lazarus Campaign Malware Report North Korea 입니다.
악성코드 유형 LPEClient RATel Bankshot Volgmer NetWireRC Black Basta Ransomware LockBit Maze 도 새롭게 확인됩니다.
공격자 OilRig APT28 LOTUS PANDA Sandworm 도 새롭게 확인됩니다.
공격기술 hacking Backdoor Exploit Phishing Social Engineering 해킹 도 새롭게 확인됩니다.
기관 및 기업 South Korea Kaspersky United States CISA Government US 한국 Ucraina Japan United Kingdom Microsoft 도 새롭게 확인됩니다.
기타 attack Software Operation Update South 등 신규 키워드도 확인됩니다.

Since 2009, HIDDEN COBRA actors have leveraged their capabilities to target and compromise a range of victims; some intrusions have resulted in the exfiltration of data while others have been disruptive in nature. Commercial reporting has referred to this activity as Lazarus Group and Guardians of Peace. Tools and capabilities used by HIDDEN COBRA actors include DDoS botnets, keyloggers, remote access tools (RATs), and wiper malware. Variants of malware and tools used by HIDDEN COBRA actors include Destover, Duuzer, and Hangman.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/27 북한 라자루스, 한국 금융·IT·통신 분야 겨냥한 ‘오퍼레이션 싱크홀’ 공격 감행
    ㆍ 2025/04/25 New Lazarus campaign hits South Korea
    ㆍ 2025/04/25 North Korean cyberespionage facilitated by bogus US firms, crackdown underway

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1Lazarus 18 ▲ 12 (67%)
2Campaign 12 ▲ 10 (83%)
3Malware 10 ▲ 9 (90%)
4South Korea 8 ▲ new
5Report 7 ▲ 6 (86%)
6North Korea 7 ▲ 4 (57%)
7attack 6 ▲ new
8Software 6 ▲ new
9hacking 6 ▲ new
10Kaspersky 6 ▲ new
11Operation 5 ▲ new
12Update 4 ▲ new
13South 4 ▲ new
14Distribution 4 ▲ new
15Vulnerability 4 ▲ new
16ZeroDay 4 ▲ new
17United States 4 ▲ new
18SyncHole 4 ▲ new
19Cryptocurrency 3 ▲ new
20Korean 3 ▲ new
21APT 3 ▲ 1 (33%)
22PebbleDash 2 ▲ new
23target 2 ▲ new
24Asia 2 ▲ new
25amp 2 ▲ new
26공격 2 ▲ new
27Backdoor 2 ▲ new
28LPEClient 2 ▲ new
29Exploit 2 ▲ new
30CISA 2 ▲ new
31c&c 2 ▲ 1 (50%)
32March 2 ▲ new
33hole 2 ▲ new
34Victim 2 ▲ new
35Phishing 2 ▲ new
36Kimsuky 2 ▲ 1 (50%)
37Supply chain 1 ▲ new
38dprk 1 ▼ -2 (-200%)
39crossex 1 ▲ new
40agamemnon 1 ▲ new
41threatneedle 1 ▲ new
42signbt 1 ▲ new
43Government 1 ▲ new
44NSFOCUS 1 ▲ new
45innorix 1 ▲ new
46Ex 1 ▲ new
47Windows 1 ▲ new
48UNIX 1 ▲ new
49RATel 1 ▲ new
50Bankshot 1 ▲ new
51cti 1 ▼ -2 (-200%)
52레이 1 ▲ new
53싱크홀 1 ▲ new
54Korea 1 ▲ new
55Firms 1 ▲ new
56DeepWeb 1 ▲ new
57Tsunami 1 ▲ new
58evolution 1 ▲ new
59C2 1 - 0 (0%)
60North 1 ▲ new
61cyberespionage 1 ▲ new
62securityaffairs 1 ▲ new
63bogus 1 ▲ new
64US 1 ▲ new
65한국 1 ▲ new
66toolset 1 ▲ new
67금융 1 ▲ new
68통신 1 ▲ new
69Volgmer 1 ▲ new
70APT41 1 ▲ new
71EDR 1 ▲ new
72OilRig 1 ▲ new
73Cobalt Strike 1 ▲ new
74NetWireRC 1 ▲ new
75North K 1 ▲ new
76Black Basta 1 ▲ new
77VMware 1 ▲ new
78powershell 1 ▲ new
79Ucraina 1 ▲ new
80Ransomware 1 ▲ new
81APT28 1 ▲ new
82Android 1 ▲ new
83Social Engineering 1 ▲ new
84LockBit 1 ▲ new
85Sea Turtle 1 ▲ new
86RedEcho 1 ▲ new
87LOTUS PANDA 1 ▲ new
88Japan 1 ▲ new
89DarkWeb 1 ▲ new
90United Kingdom 1 ▲ new
91Sandworm 1 ▲ new
92Malicious Traffic 1 ▲ new
93Microsoft 1 ▲ new
94IoC 1 ▲ new
95RSA Conference 1 ▲ new
96Maze 1 ▲ new
97lazarusapt 1 ▲ new
98그룹 1 - 0 (0%)
99Education 1 ▲ new
100해킹 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
LPEClient
2 (20%)
RATel
1 (10%)
Bankshot
1 (10%)
Volgmer
1 (10%)
NetWireRC
1 (10%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Lazarus
18 (72%)
Kimsuky
2 (8%)
OilRig
1 (4%)
APT28
1 (4%)
LOTUS PANDA
1 (4%)
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Campaign
12 (40%)
hacking
6 (20%)
APT
3 (10%)
Backdoor
2 (6.7%)
Exploit
2 (6.7%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
South Korea
8 (22.2%)
North Korea
7 (19.4%)
Kaspersky
6 (16.7%)
United States
4 (11.1%)
CISA
2 (5.6%)
Threat info
Last 5

Additional information

No Request Hash(md5) Report No Date
1 Winvoke.exe
Lazarus Generic Malware PE64 PE File OS Processor Check GIF Format
f4d46629ca15313b94992f3798718df7123522021.06.16
Level Description
danger File has been identified by 49 AntiVirus engines on VirusTotal as malicious
watch Installs itself for autorun at Windows startup
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates a shortcut to an executable file
notice Creates executable files on the filesystem
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation
notice Sends data using the HTTP POST Method
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
No Category URL CC ASN Co Date
1c2https://blockchain-newtech.com/download/download.asp2023.10.10
No URL CC ASN Co Reporter Date
1https://api.camdrivers.cloud/linux.update
Lazarus zip
US USNAMECHEAP-NETNDA0E2025.03.04
2https://api.camdrivers.cloud/linux-al2i.sh
Lazarus sh ua-curl
US USNAMECHEAP-NETNDA0E2025.03.04
3https://api.drivercamhub.cloud/linux-al2i.sh
Lazarus
US USADVANTAGECOMlontze72025.02.27
4http://45.43.11.201:1244/pdown
APT BeaverTail Lazarus python StrelaStealer
US USPacket Flip, LLCDaveLikesMalwre2024.12.12
5http://147.124.197.138:1244/pdown
APT BeaverTail Lazarus python StrelaStealer
US USAC-AS-1DaveLikesMalwre2024.12.12
View only the last 5
Beta Service, If you select keyword, you can check detailed information.