Summary: 2025/04/29 02:14
First reported date: 2013/01/30
Inquiry period : 2025/04/22 02:14 ~ 2025/04/29 02:14 (7 days), 58 search results
전 기간대비 28% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 North Korea dprk Campaign Malware cti 입니다.
악성코드 유형 Black Basta 도 새롭게 확인됩니다.
공격자 Andariel 도 새롭게 확인됩니다.
공격기술 Exploit ClearFake Hijacking hijack 도 새롭게 확인됩니다.
기관 및 기업 Mandiant Okta 도 새롭게 확인됩니다.
기타 Software amp Interview ZeroDay Web 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/28 Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries
ㆍ 2025/04/27 북한 라자루스, 한국 금융·IT·통신 분야 겨냥한 ‘오퍼레이션 싱크홀’ 공격 감행
ㆍ 2025/04/26 North Korean Hackers Exploit GenAI to Land Remote Jobs Worldwide
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | North Korea | 58 | ▲ 16 (28%) |
2 | dprk | 28 | ▲ 6 (21%) |
3 | Campaign | 24 | ▲ 17 (71%) |
4 | Malware | 22 | ▲ 6 (27%) |
5 | cti | 21 | ▲ 5 (24%) |
6 | North | 15 | ▲ 9 (60%) |
7 | Korean | 12 | ▲ 11 (92%) |
8 | Kaspersky | 10 | ▲ 4 (40%) |
9 | Report | 10 | ▲ 2 (20%) |
10 | Lazarus | 9 | ▲ 6 (67%) |
11 | Cryptocurrency | 9 | ▲ 6 (67%) |
12 | South Korea | 8 | ▲ 5 (63%) |
13 | hacking | 8 | ▲ 2 (25%) |
14 | Operation | 7 | ▲ 5 (71%) |
15 | United States | 7 | ▲ 4 (57%) |
16 | Russia | 7 | - 0 (0%) |
17 | Software | 7 | ▲ new |
18 | ITWorker | 6 | ▲ 4 (67%) |
19 | 북한 | 5 | ▲ 2 (40%) |
20 | APT | 5 | ▲ 2 (40%) |
21 | Kimsuky | 5 | ▼ -4 (-80%) |
22 | Vulnerability | 5 | ▲ 2 (40%) |
23 | AhnLab | 5 | ▲ 3 (60%) |
24 | Phishing | 5 | ▲ 1 (20%) |
25 | 공격 | 5 | ▲ 2 (40%) |
26 | SECUI | 4 | ▲ 2 (50%) |
27 | LNK | 4 | - 0 (0%) |
28 | attack | 4 | ▲ 2 (50%) |
29 | target | 4 | ▼ -4 (-100%) |
30 | amp | 4 | ▲ new |
31 | Ransomware | 4 | ▲ 3 (75%) |
32 | Interview | 4 | ▲ new |
33 | Trend | 4 | ▲ 2 (50%) |
34 | 위장 | 3 | ▲ 2 (67%) |
35 | AhnLabSecuInfo | 3 | ▲ 2 (67%) |
36 | Distribution | 3 | ▲ 2 (67%) |
37 | Konni | 3 | ▼ -3 (-100%) |
38 | ZeroDay | 3 | ▲ new |
39 | Web | 3 | ▲ new |
40 | Mandiant | 3 | ▲ new |
41 | China | 3 | ▲ 1 (33%) |
42 | contagiousinterview | 3 | ▲ new |
43 | Contagious | 3 | ▲ new |
44 | TraderTraitor | 3 | ▼ -2 (-67%) |
45 | Update | 3 | ▲ new |
46 | Korea | 3 | ▼ -2 (-67%) |
47 | 3 | ▲ 2 (67%) | |
48 | ClickFix | 3 | ▼ -4 (-133%) |
49 | Looks | 2 | ▲ new |
50 | Launches | 2 | ▲ new |
51 | DriverFixer | 2 | ▲ new |
52 | Exploit | 2 | ▲ new |
53 | South | 2 | ▲ new |
54 | Plays | 2 | ▲ new |
55 | use | 2 | ▲ new |
56 | Russian | 2 | ▲ new |
57 | beavertail | 2 | ▲ new |
58 | DarkWeb | 2 | ▲ new |
59 | 제안 | 2 | ▲ new |
60 | CryptoCore | 2 | ▲ new |
61 | Social Engineering | 2 | ▼ -2 (-100%) |
62 | ClearFake | 2 | ▲ new |
63 | 있다 | 2 | ▲ new |
64 | front | 2 | ▲ new |
65 | threat | 2 | - 0 (0%) |
66 | March | 2 | ▲ new |
67 | 서로 | 2 | ▲ new |
68 | Telegram | 2 | ▲ 1 (50%) |
69 | APT37 | 2 | ▲ 1 (50%) |
70 | Okta | 2 | ▲ new |
71 | Victim | 2 | ▲ 1 (50%) |
72 | UNC4736 | 2 | ▲ new |
73 | Palo Alto Networks | 2 | ▲ 1 (50%) |
74 | Infrastructure | 2 | ▲ new |
75 | Proofpoint | 2 | ▼ -1 (-50%) |
76 | PebbleDash | 2 | ▲ new |
77 | Fake | 2 | ▲ new |
78 | Japan | 2 | - 0 (0%) |
79 | Browser | 2 | ▲ new |
80 | intelligence | 2 | ▲ 1 (50%) |
81 | Unit | 2 | ▲ new |
82 | deepfake | 2 | ▲ new |
83 | 탈취 | 2 | ▲ new |
84 | Iran | 2 | ▼ -4 (-200%) |
85 | VirtualRoutes | 1 | ▲ new |
86 | Masters | 1 | ▲ new |
87 | How | 1 | ▲ new |
88 | Cybercrime | 1 | - 0 (0%) |
89 | ShadowPad | 1 | ▲ new |
90 | Hijacking | 1 | ▲ new |
91 | d48032d835c95af816fbcea6e659cdbe | 1 | ▲ new |
92 | Decoy | 1 | ▲ new |
93 | EDR | 1 | - 0 (0%) |
94 | Black Basta | 1 | ▲ new |
95 | Cobra Carbon System | 1 | ▲ new |
96 | Microsoft | 1 | - 0 (0%) |
97 | hijack | 1 | ▲ new |
98 | wagemole | 1 | ▲ new |
99 | Andariel | 1 | ▲ new |
100 | Ops | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Ransomware |
|
4 (44.4%) |
Konni |
|
3 (33.3%) |
Black Basta |
|
1 (11.1%) |
Maze |
|
1 (11.1%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|---|---|
Lazarus |
|
9 (45%) |
Kimsuky |
|
5 (25%) |
TraderTraitor |
|
3 (15%) |
APT37 |
|
2 (10%) |
Andariel |
|
1 (5%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
North Korea |
|
58 (36%) |
dprk |
|
28 (17.4%) |
Kaspersky |
|
10 (6.2%) |
South Korea |
|
8 (5%) |
United States |
|
7 (4.3%) |
Threat info
Last 5SNS
(Total : 37)North Korea dprk Campaign Malware APT Kaspersky AhnLab SECUI ClickFix Kimsuky Lazarus Russia Cryptocurrency Proofpoint Ransomware Report Distribution Browser TraderTraitor ClearFake APT37 Konni Iran Hijacking hijack Andariel Update Operation attack Target Okta Recorded Future ...
News
(Total : 21)North Korea Campaign Malware hacking South Korea Report Software Cryptocurrency Operation United States Kaspersky Lazarus 북한 Vulnerability Phishing Russia Attacker target ZeroDay Google attack China Kimsuky DarkWeb intelligence Telegram Victim Palo Alto Networks Exploit Japan Mandiant Ransomware Update DPRK US 한국 Cobalt Strike EDR Black Basta Cobra Carbon System Microsoft Social Engineering APT15 APT41 Maze Okta 피싱 Police Education Distribution 취약점 Dropper Singapore Mexico AhnLab Canada United Kingdom Germany UNC4736 ...
No | Title | Date |
---|---|---|
1 | Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries - Malware.News | 2025.04.28 |
2 | 북한 라자루스, 한국 금융·IT·통신 분야 겨냥한 ‘오퍼레이션 싱크홀’ 공격 감행 - 데일리시큐 | 2025.04.27 |
3 | North Korean Hackers Exploit GenAI to Land Remote Jobs Worldwide - Malware.News | 2025.04.26 |
4 | North Korean Group Creates Fake Crypto Firms in Job Complex Scam - Malware.News | 2025.04.26 |
5 | North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures - The Hacker News | 2025.04.25 |
Additional information
No | Title | Date |
---|---|---|
1 | Employee monitoring app exposes users, leaks 21+ million screenshots - Malware.News | 2025.04.28 |
2 | Introducing XSIAM 3.0 - Malware.News | 2025.04.28 |
3 | Deploy Bravely with Prisma AIRS - Malware.News | 2025.04.28 |
4 | 2025 Cyber Resilience Research Discovers Speed of AI Advancing Emerging Attack Types - Malware.News | 2025.04.28 |
5 | Intel CEO Targets Change in Corporate Culture to Shape Up - Bloomberg Technology | 2025.04.28 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries - Malware.News | 2025.04.28 |
2 | Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries - Malware.News | 2025.04.28 |
3 | Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries - Malware.News | 2025.04.28 |
4 | 북한 라자루스, 한국 금융·IT·통신 분야 겨냥한 ‘오퍼레이션 싱크홀’ 공격 감행 - 데일리시큐 | 2025.04.27 |
5 | North Korean Hackers Exploit GenAI to Land Remote Jobs Worldwide - Malware.News | 2025.04.26 |
View only the last 5 |
No | Request | Hash(md5) | Report No | Date |
---|---|---|---|---|
1 | ![]() North Korea Generic Malware Malicious Library Malicious Packer UPX PE File DLL PE32 OS Processor Check .NET DLL | 8e7ded0089b6adfdd951b5d8175078f7 | 58916 | 2025.04.09 |
2 | ![]() North Korea Generic Malware Malicious Library Malicious Packer UPX PE File DLL PE32 OS Processor Check .NET DLL | 8e7ded0089b6adfdd951b5d8175078f7 | 58918 | 2025.04.09 |
3 | ![]() North Korea Malicious Library Malicious Packer UPX PE File DLL PE32 OS Processor Check .NET DLL | c308a9d1c6d5328c8ee007303770eda7 | 58406 | 2025.03.31 |
4 | ![]() North Korea Generic Malware Malicious Library Antivirus PE File .NET EXE PE32 | 9e02078809cf34479e5108fca383862c | 58310 | 2025.03.26 |
5 | ![]() North Korea Generic Malware Malicious Library Antivirus PE File .NET EXE PE32 | 9fff72f95c07e3922b9a34d51723f586 | 58318 | 2025.03.26 |
View only the last 5 |
Level | Description |
---|---|
danger | File has been identified by 47 AntiVirus engines on VirusTotal as malicious |