Summary: 2025/04/28 23:49

First reported date: 2012/07/17
Inquiry period : 2025/04/21 23:49 ~ 2025/04/28 23:49 (7 days), 17 search results

전 기간대비 동일한 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
Malware Report Campaign Victim Phishing 입니다.
악성코드 유형 RATel Crytox DYEPACK CACTUS Phobos Maze 도 새롭게 확인됩니다.
공격기술 Backdoor ClearFake 도 새롭게 확인됩니다.
기관 및 기업 Government Palo Alto Networks Ukraine Mandiant Europe Banking 도 새롭게 확인됩니다.
기타 Software APT41 Comet Elusive DarkWeb 등 신규 키워드도 확인됩니다.

보안학적 측면에서 기술적인 방법이 아닌 사람들 간의 기본적인 신뢰를 기반으로 사람을 속여 비밀 정보를 획득하는 기법, 인간 상호 작용의 깊은 신뢰를 바탕으로 사람들을 속여 정상 보안 절차를 깨트리기 위한 비기술적 침입 수단

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/28 Introducing XSIAM 3.0
    ㆍ 2025/04/28 IR Trends Q1 2025: Phishing soars as identity-based attacks persist
    ㆍ 2025/04/28 Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1Social Engineering 17 - 0 (0%)
2Malware 12 ▲ 2 (17%)
3Report 11 ▲ 4 (36%)
4Campaign 9 ▲ 2 (22%)
5Victim 8 ▲ 5 (63%)
6Microsoft 7 - 0 (0%)
7Phishing 7 ▲ 1 (14%)
8attack 7 ▲ 6 (86%)
9Exploit 6 - 0 (0%)
10target 6 ▼ -1 (-17%)
11Ransomware 5 ▲ 2 (40%)
12United States 5 - 0 (0%)
13Operation 5 ▲ 4 (80%)
14RCE 4 ▲ 3 (75%)
15Russia 4 ▲ 1 (25%)
16Kaspersky 4 ▲ 1 (25%)
17powershell 4 ▲ 2 (50%)
18Black Basta 3 ▲ 1 (33%)
19Email 3 - 0 (0%)
20WhatsApp 3 ▲ 2 (67%)
21MFA 3 ▲ 2 (67%)
22Vulnerability 3 - 0 (0%)
23EDR 3 ▲ 2 (67%)
24Ucraina 3 ▲ 2 (67%)
25IoC 3 - 0 (0%)
26Windows 3 - 0 (0%)
27Education 3 ▲ 1 (33%)
28Software 2 ▲ new
29North Korea 2 ▼ -2 (-100%)
30Advertising 2 ▼ -1 (-50%)
31Browser 2 - 0 (0%)
32Java 2 ▲ 1 (50%)
33hacking 2 ▲ 1 (50%)
34Criminal 2 ▼ -2 (-100%)
35Google 2 - 0 (0%)
36Iran 2 ▼ -1 (-50%)
37Cryptocurrency 2 - 0 (0%)
38APT41 2 ▲ new
39Android 2 ▲ 1 (50%)
40NetWireRC 2 ▲ 1 (50%)
41Smishing 2 ▲ 1 (50%)
42Comet 2 ▲ new
43c&c 2 ▼ -1 (-50%)
44Government 2 ▲ new
45Palo Alto Networks 2 ▲ new
46Germany 2 ▲ 1 (50%)
47Cobalt Strike 2 ▲ 1 (50%)
48ClickFix 2 ▼ -2 (-100%)
49group 2 ▲ 1 (50%)
50Elusive 2 ▲ new
51DarkWeb 2 ▲ new
52RATel 2 ▲ new
53Distribution 2 ▲ 1 (50%)
54MURKYTOUR 1 ▲ new
55Russian 1 ▲ new
56threat 1 ▼ -5 (-500%)
57actor 1 ▲ new
58Ukraine 1 ▲ new
59UNC 1 ▲ new
60Israel 1 - 0 (0%)
61Backdoor 1 ▲ new
62Mandiant 1 ▲ new
63UTA 1 ▲ new
64Volexity 1 ▲ new
65access 1 ▲ new
66conference 1 ▲ new
67Europe 1 ▲ new
68Cobra Carbon System 1 ▲ new
69China 1 ▼ -2 (-200%)
70Hackers 1 - 0 (0%)
71statesponsored 1 ▼ -2 (-200%)
72Italy 1 - 0 (0%)
73Pisces 1 ▼ -1 (-100%)
74Crytox 1 ▲ new
75DYEPACK 1 ▲ new
76Cisco 1 - 0 (0%)
77Booking 1 ▲ new
78MimiKatz 1 ▲ new
79WMI 1 - 0 (0%)
80CACTUS 1 ▲ new
81SMB 1 ▲ new
82Cortex 1 ▲ new
83XSIAM 1 ▲ new
84Phobos 1 ▲ new
85AI 1 ▲ new
86Maze 1 ▲ new
87Banking 1 ▲ new
88Ch 1 ▲ new
89APT15 1 ▲ new
90Slow 1 ▼ -1 (-100%)
91Telegram 1 - 0 (0%)
92JadeSleet 1 ▲ new
93ClearFake 1 ▲ new
94Korea 1 - 0 (0%)
95North 1 ▼ -1 (-100%)
96Takedown 1 - 0 (0%)
97Proofpoint 1 - 0 (0%)
98card 1 ▲ new
99phone 1 ▲ new
100payment 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
Ransomware
5 (25%)
Black Basta
3 (15%)
NetWireRC
2 (10%)
RATel
2 (10%)
Crytox
1 (5%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Tick
1 (100%)
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Social Engineering
17 (32.1%)
Campaign
9 (17%)
Phishing
7 (13.2%)
Exploit
6 (11.3%)
RCE
4 (7.5%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
Microsoft
7 (15.2%)
United States
5 (10.9%)
Russia
4 (8.7%)
Kaspersky
4 (8.7%)
Ucraina
3 (6.5%)
Threat info
Last 5

SNS

(Total : 5)
  Total keyword

Social Engineering Campaign ClickFix Malware Report attack Proofpoint Iran ClearFake Cryptocurrency Russia North Korea Kaspersky Exploit hacking Attacker Stealer Victim NetWireRC RAT powershell Ransomware

No Title Date
1Unit 42 @Unit42_Intel
A new Slow Pisces (#JadeSleet) campaign utilizes social engineering tactics to engage with targets and deliver malware disguised as coding challenges for crypto sector developers. Our analysis includes an overview of previously undocumented malware. https://t.co/O2Q57BSwdw https://t.co/yJpI6unAXE
2025.04.26
2Virus Bulletin @virusbtn
Proofpoint researchers discovered state-sponsored actors from North Korea, Iran and Russia experimenting in multiple campaigns with the ClickFix social engineering technique as a stage in their infection chains. https://t.co/3ZswvWTX7u https://t.co/8OWQnTUthJ
2025.04.24
3Cyber_OSINT @Cyber_O51NT
Reports reveal that the hacking group 'Elusive Comet' is exploiting Zoom's remote control feature to execute social engineering attacks, tricking cryptocurrency users into granting access to their machines for crypto-theft. #CyberSecurity #CryptoTheft https://t.co/oD31qKqgiL
2025.04.23
4Cyber_OSINT @Cyber_O51NT
Cybersecurity experts report that the 'Elusive Comet' attackers are using Zoom to deploy infostealers and RATs through advanced social engineering tactics to swindle victims. #CyberSecurity #Infostealer #RAT https://t.co/7Pwkl4z0Js
2025.04.22
5Threat Intelligence @threatintel
#ThreatProtection Interlock ransomware group uses ClickFix social engineering, fake CAPTCHAs & PowerShell to deploy malware payloads. Read more about Symantec's protection: https://t.co/JGooj4A0XI #CyberThreat #Ransomware
2025.04.22

Additional information

Beta Service, If you select keyword, you can check detailed information.