Summary: 2025/04/29 00:22
First reported date: 2014/05/15
Inquiry period : 2025/04/22 00:22 ~ 2025/04/29 00:22 (7 days), 5 search results
전 기간대비 40% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 Tick Exploit attack target RCE 입니다.
악성코드 유형 Ransomware Vawtrak Anchor RATel 도 새롭게 확인됩니다.
공격기술 hacking Stealer 도 새롭게 확인됩니다.
기관 및 기업 Recorded Future Government Tenable 도 새롭게 확인됩니다.
기타 valid intrusion effective Operation Red Team 등 신규 키워드도 확인됩니다.
Tick is a cyber espionage group with likely Chinese origins that has been active since at least 2008. The group appears to have close ties to the Chinese National University of Defense and Technology, which is possibly linked to the PLA. This threat actor
* 최근 뉴스기사 Top3:
ㆍ 2025/04/25 Adding an Atari Joystick Port to TheC64 USB Joystick
ㆍ 2025/04/25 Security Data Paradox: When More Data Means Less Visibility
ㆍ 2025/04/22 Attackers stick with effective intrusion points, valid credentials and exploits
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Tick | 5 | ▲ 2 (40%) |
2 | Exploit | 4 | ▲ 3 (75%) |
3 | valid | 2 | ▲ new |
4 | intrusion | 2 | ▲ new |
5 | effective | 2 | ▲ new |
6 | Malware | 2 | - 0 (0%) |
7 | Operation | 2 | ▲ new |
8 | attack | 2 | ▲ 1 (50%) |
9 | target | 2 | ▲ 1 (50%) |
10 | RCE | 2 | ▲ 1 (50%) |
11 | Red Team | 2 | ▲ new |
12 | hacking | 2 | ▲ new |
13 | Report | 2 | ▲ 1 (50%) |
14 | c&c | 2 | ▲ 1 (50%) |
15 | Distribution | 2 | ▲ 1 (50%) |
16 | Cyber Kill Chain | 1 | ▲ new |
17 | Stealer | 1 | ▲ new |
18 | Infostealers | 1 | ▲ new |
19 | power | 1 | ▲ new |
20 | Vulnerability | 1 | ▲ new |
21 | United States | 1 | ▼ -2 (-200%) |
22 | Malicious Traffic | 1 | ▲ new |
23 | Ransomware | 1 | ▲ new |
24 | Recorded Future | 1 | ▲ new |
25 | QRadar Security Suite | 1 | ▲ new |
26 | Vawtrak | 1 | ▲ new |
27 | intelligence | 1 | ▲ new |
28 | threat | 1 | - 0 (0%) |
29 | Data | 1 | ▲ new |
30 | visibility | 1 | ▲ new |
31 | network | 1 | ▲ new |
32 | Joystick | 1 | ▲ new |
33 | Atari | 1 | ▲ new |
34 | Port | 1 | ▲ new |
35 | USB | 1 | ▲ new |
36 | IBM | 1 | ▲ new |
37 | Phishing | 1 | - 0 (0%) |
38 | Social Engineering | 1 | - 0 (0%) |
39 | Education | 1 | - 0 (0%) |
40 | UNIX | 1 | - 0 (0%) |
41 | Windows | 1 | ▲ new |
42 | Kali | 1 | ▲ new |
43 | GitHub | 1 | - 0 (0%) |
44 | Discord | 1 | ▲ new |
45 | Update | 1 | - 0 (0%) |
46 | Smishing | 1 | - 0 (0%) |
47 | VPN | 1 | ▲ new |
48 | Government | 1 | ▲ new |
49 | Linux | 1 | - 0 (0%) |
50 | PoC | 1 | ▲ new |
51 | Anchor | 1 | ▲ new |
52 | Software | 1 | ▲ new |
53 | Tenable | 1 | ▲ new |
54 | RATel | 1 | ▲ new |
55 | powershell | 1 | ▲ new |
56 | Blue Tea | 1 | ▲ new |
57 | CyberScoop | 1 | ▲ new |
58 | Attackers | 1 | ▲ new |
59 | TheC | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Ransomware |
|
1 (25%) |
Vawtrak |
|
1 (25%) |
Anchor |
|
1 (25%) |
RATel |
|
1 (25%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|---|---|
Tick |
|
5 (100%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
United States |
|
1 (25%) |
Recorded Future |
|
1 (25%) |
Government |
|
1 (25%) |
Tenable |
|
1 (25%) |
Threat info
Last 5SNS
(Total : 1)No | Title | Date |
---|---|---|
1 | Kimberly @StopMalvertisin CyberScoop | Attackers stick with effective intrusion points, valid credentials and exploits https://t.co/8K4CwlRned | 2025.04.22 |
News
(Total : 4)Tick Exploit hacking Red Team Malware attack target RCE Operation Report c&c Distribution Tenable Cyber Kill Chain Vulnerability United States Malicious Traffic Ransomware Vawtrak Recorded Future intelligence IBM Stealer VPN Smishing RATel Linux UNIX Windows Kali GitHub Discord Update Education Attacker Government PoC powershell Software Phishing Social Engineering QRadar Security Suite Anchor
No | Title | Date |
---|---|---|
1 | Adding an Atari Joystick Port to TheC64 USB Joystick - Hackaday | 2025.04.25 |
2 | Security Data Paradox: When More Data Means Less Visibility - Malware.News | 2025.04.25 |
3 | Attackers stick with effective intrusion points, valid credentials and exploits - CyberScoop | 2025.04.22 |
4 | Getting the Most Value Out of the OSCP: The Exam - Malware.News | 2025.04.22 |
Additional information
No | Title | Date |
---|---|---|
1 | Employee monitoring app exposes users, leaks 21+ million screenshots - Malware.News | 2025.04.28 |
2 | Introducing XSIAM 3.0 - Malware.News | 2025.04.28 |
3 | Deploy Bravely with Prisma AIRS - Malware.News | 2025.04.28 |
4 | 2025 Cyber Resilience Research Discovers Speed of AI Advancing Emerging Attack Types - Malware.News | 2025.04.28 |
5 | Intel CEO Targets Change in Corporate Culture to Shape Up - Bloomberg Technology | 2025.04.28 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Security Data Paradox: When More Data Means Less Visibility - Malware.News | 2025.04.25 |
2 | Attackers stick with effective intrusion points, valid credentials and exploits - CyberScoop | 2025.04.22 |
3 | Getting the Most Value Out of the OSCP: The Exam - Malware.News | 2025.04.22 |
4 | Unmasking the new XorDDoS controller and infrastructure - Malware.News | 2025.04.17 |
5 | Exploiting SMS: Threat Actors Use Social Engineering to Target Companies - Malware.News | 2025.04.17 |
View only the last 5 |