Summary: 2025/04/28 20:14

First reported date: 2003/08/22
Inquiry period : 2025/04/21 20:14 ~ 2025/04/28 20:14 (7 days), 345 search results

전 기간대비 -10% 낮은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
Ransomware hacking Victim Google North Korea 입니다.
악성코드 유형 DslogdRAT CACTUS 도 새롭게 확인됩니다.

software that is intended to damage or disable computers and computer systems.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/28 Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries
    ㆍ 2025/04/28 Earth Kurma Targets Southeast Asia With Rootkits and Cloud-Based Data Theft Tools
    ㆍ 2025/04/28 28th April – Threat Intelligence Report

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1Malware 345 ▼ -34 (-10%)
2Report 108 ▼ -17 (-16%)
3MWNEWS 89 ▼ -52 (-58%)
4attack 89 ▼ -3 (-3%)
5Campaign 67 ▼ -6 (-9%)
6target 59 ▼ -12 (-20%)
7Exploit 56 ▼ -1 (-2%)
8Update 52 ▼ -10 (-19%)
9Vulnerability 47 ▼ -7 (-15%)
10Operation 45 ▼ -4 (-9%)
11intelligence 43 ▼ -8 (-19%)
12United States 39 ▼ -3 (-8%)
13Ransomware 37 ▲ 1 (3%)
14RCE 36 ▼ -13 (-36%)
15Phishing 34 ▼ -15 (-44%)
16Software 33 ▼ -9 (-27%)
17Advertising 29 ▼ -9 (-31%)
18hacking 29 ▲ 2 (7%)
19Microsoft 25 ▼ -17 (-68%)
20Email 25 ▼ -1 (-4%)
21Victim 25 ▲ 1 (4%)
22Google 24 ▲ 9 (38%)
23Government 22 ▼ -11 (-50%)
24Kaspersky 22 ▼ -8 (-36%)
25North Korea 22 ▲ 6 (27%)
26Cryptocurrency 19 ▲ 8 (42%)
27Threat 19 ▼ -1 (-5%)
28China 18 ▼ -19 (-106%)
29Android 18 ▼ -7 (-39%)
30Russia 18 ▼ -9 (-50%)
31Criminal 18 ▼ -4 (-22%)
32AI 17 ▼ -1 (-6%)
33Distribution 17 ▲ 6 (35%)
34Education 15 ▼ -1 (-7%)
35NetWireRC 15 ▼ -6 (-40%)
36ZeroDay 15 ▲ 3 (20%)
37CISA 15 ▼ -7 (-47%)
38Windows 15 ▼ -20 (-133%)
39South Korea 14 ▲ 6 (43%)
40Browser 13 - 0 (0%)
41advisory 13 - 0 (0%)
42Linux 12 ▼ -9 (-75%)
43Social Engineering 12 ▲ 2 (17%)
44Recorded Future 11 ▲ 3 (27%)
45NortonLifeLock 11 ▲ 5 (45%)
46securityaffairs 11 ▲ 2 (18%)
47c&c 11 ▼ -7 (-64%)
48IoC 11 ▼ -5 (-45%)
49Lazarus 10 ▲ 9 (90%)
50ThreatProtection 10 ▲ 4 (40%)
51Stealer 10 ▼ -2 (-20%)
52payment 10 ▲ 4 (40%)
53GitHub 9 ▼ -6 (-67%)
54Supply chain 9 ▲ 3 (33%)
55Version 9 ▲ 6 (67%)
56Japan 9 ▲ 4 (44%)
57MFA 9 ▲ 3 (33%)
58North 8 ▲ 4 (50%)
59GameoverP2P 8 ▼ -2 (-25%)
60EDR 8 ▼ -1 (-13%)
61Access 8 ▲ 3 (38%)
62DslogdRAT 8 ▲ new
63py 8 ▲ 7 (88%)
64Amazon 7 ▲ 5 (71%)
65DarkWeb 7 ▲ 1 (14%)
66Korean 7 ▲ 6 (86%)
67YouTube 7 ▲ 2 (29%)
68Telegram 7 ▼ -3 (-43%)
69dprk 7 ▲ 2 (29%)
70ChatGPT 7 ▲ 1 (14%)
71Cisco 7 ▼ -2 (-29%)
72RATel 7 ▲ 1 (14%)
73code 7 ▲ 1 (14%)
74Backdoor 7 ▼ -8 (-114%)
75malicious 7 ▲ 3 (43%)
76Vawtrak 7 - 0 (0%)
77fake 7 ▲ 4 (57%)
78activity 7 ▲ 6 (86%)
79United Kingdom 6 ▼ -7 (-117%)
80cti 6 ▲ 2 (33%)
81Mandiant 6 ▲ 5 (83%)
82data 6 ▲ 1 (17%)
83LinkedIn 6 ▼ -3 (-50%)
84Password 6 ▼ -4 (-67%)
85AhnLab 6 ▲ 1 (17%)
86APT 6 - 0 (0%)
87Trojan 6 ▼ -8 (-133%)
88CVE 6 ▼ -8 (-133%)
89Europe 6 ▼ -9 (-150%)
90Red Team 6 ▲ 4 (67%)
91powershell 6 ▼ -3 (-50%)
92Critical 6 - 0 (0%)
93CrowdStrike 6 ▲ 1 (17%)
94CACTUS 6 ▲ new
95Smishing 6 ▲ 3 (50%)
96South 5 ▲ 4 (80%)
97Stormcast 5 - 0 (0%)
98ISC 5 - 0 (0%)
99DOGE 5 ▲ 3 (60%)
100Takedown 5 ▼ -6 (-120%)
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
Ransomware
37 (30.1%)
NetWireRC
15 (12.2%)
GameoverP2P
8 (6.5%)
DslogdRAT
8 (6.5%)
RATel
7 (5.7%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Lazarus
10 (66.7%)
Kimsuky
5 (33.3%)
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Campaign
67 (24.9%)
Exploit
56 (20.8%)
RCE
36 (13.4%)
Phishing
34 (12.6%)
hacking
29 (10.8%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
United States
39 (12.7%)
Microsoft
25 (8.2%)
Google
24 (7.8%)
Government
22 (7.2%)
Kaspersky
22 (7.2%)
Threat info
Last 5

SNS

(Total : 78)
  Total keyword

Malware Campaign Report hacking attack North Korea Exploit Ransomware Android Kaspersky Target Phishing NetWireRC Russia Stealer Distribution DslogdRAT dprk Attacker APT Japan Cryptocurrency CACTUS ZeroDay Update Telegram FormBook Advertising ClickFix Vawtrak Cryptocurrency Miner South Korea Lazarus Intelligence Konni Social Engineering IoC Software catch Browser Vulnerability SECUI Lumma AhnLab c&c C2 HyperSSL Attacks spyware Botnet GameoverP2P Kimsuky ...

No Title Date
1Cyber_OSINT @Cyber_O51NT
A report reveals that the APT-C-56 (Transparent Tribe) group is using new malware for persistent attacks, often leveraging private chat apps that claim to encrypt communications for espionage activities. #CyberSecurity https://t.co/w09dbKa1YF
2025.04.28
2Cyber_OSINT @Cyber_O51NT
A report reveals that in March 2025, senior members of the World Uyghur Congress were targeted by a spearphishing campaign delivering malware via a trojanized Uyghur language tool, exposing ongoing digital repression faced by the Uyghur diaspora. #Uyghur… https://t.co/JpZiS8cVGe
2025.04.28
3Pierluigi Paganini - Security Affairs @securityaffairs
SECURITY AFFAIRS #MALWARE #NEWSLETTER ROUND 43 https://t.co/HyLIVq8bPi #securityaffairs #hacking
2025.04.27
4Dark Web Informer - Cyber Threat Intelligence @DarkWebInformer
???? HiddenMiner Malware, Modified XMR Crypto Mining Tool for Sale A threat actor is selling HiddenMiner, a customized Monero (XMR) miner with advanced evasion and stealth features. ???? Key Features:  ???? One-click installation  ???? Virtual Machine bypass (AntiVM)  ???? No admin https://t.co/A3
2025.04.27
5Unit 42 @Unit42_Intel
A new Slow Pisces (#JadeSleet) campaign utilizes social engineering tactics to engage with targets and deliver malware disguised as coding challenges for crypto sector developers. Our analysis includes an overview of previously undocumented malware. https://t.co/O2Q57BSwdw https://t.co/yJpI6unAXE
2025.04.26

Additional information

No data
No data
No data
No URL CC ASN Co Reporter Date
1http://45.55.147.15:8000/test2.exe
exe malware open-dir Sliver
US USDIGITALOCEAN-ASNJoker2025.03.28
2http://45.55.147.15:8000/work1.exe
exe malware open-dir Sliver
US USDIGITALOCEAN-ASNJoker2025.03.28
3http://45.55.147.15:8000/test1.exe
exe malware open-dir Sliver
US USDIGITALOCEAN-ASNJoker2025.03.28
4http://115.233.60.197:8001/gkd.exe
CobaltStrike exe malware opendir turtleloader
CN CNNo.31,Jin-rong StreetJoker2025.03.26
5http://115.233.60.197:8001/de.exe
CobaltStrike exe malware opendir turtleloader
CN CNNo.31,Jin-rong StreetJoker2025.03.26
View only the last 5
Beta Service, If you select keyword, you can check detailed information.