Summary: 2025/04/28 20:15
First reported date: 2009/06/19
Inquiry period : 2025/04/21 20:15 ~ 2025/04/28 20:15 (7 days), 5 search results
전 기간대비 -20% 낮은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 Vulnerability Email attack target 입니다.
악성코드 유형 Cryptocurrency Miner CoreDN 도 새롭게 확인됩니다.
공격자 Storm-1977 도 새롭게 확인됩니다.
공격기술 Exploit hijack Backdoor Phishing DDoS 도 새롭게 확인됩니다.
기관 및 기업 Google CyberArk 도 새롭게 확인됩니다.
기타 Gmail Education YouTube Booking Zoom 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/28 머스크 "드론에 밀려 유인 전투기 '멸종'할 것" 경고
ㆍ 2025/04/25 Zoom attack tricks victims into allowing remote access to install malware and steal money
ㆍ 2025/04/24 Understanding the threat landscape for Kubernetes and containerized assets
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | 5 | ▼ -1 (-20%) | |
2 | Vulnerability | 3 | ▲ 2 (67%) |
3 | Malware | 3 | - 0 (0%) |
4 | Report | 3 | - 0 (0%) |
5 | 3 | ▲ 2 (67%) | |
6 | United States | 2 | ▼ -3 (-150%) |
7 | attack | 2 | ▲ 1 (50%) |
8 | target | 2 | ▲ 1 (50%) |
9 | 2 | ▲ new | |
10 | Exploit | 2 | ▲ new |
11 | Gmail | 2 | ▲ new |
12 | Education | 2 | ▲ new |
13 | YouTube | 2 | ▲ new |
14 | Cryptocurrency | 1 | - 0 (0%) |
15 | Victim | 1 | ▼ -1 (-100%) |
16 | Storm-1977 | 1 | ▲ new |
17 | Browser | 1 | - 0 (0%) |
18 | Booking | 1 | ▲ new |
19 | Zoom | 1 | ▲ new |
20 | control | 1 | ▲ new |
21 | remote | 1 | ▲ new |
22 | address | 1 | ▲ new |
23 | call | 1 | ▲ new |
24 | system | 1 | ▲ new |
25 | OSINT | 1 | ▲ new |
26 | tool | 1 | ▲ new |
27 | intelligence | 1 | - 0 (0%) |
28 | Software | 1 | ▲ new |
29 | 드론 | 1 | ▲ new |
30 | 군집 | 1 | ▲ new |
31 | F35 | 1 | ▲ new |
32 | 있다 | 1 | - 0 (0%) |
33 | hijack | 1 | ▲ new |
34 | Linux | 1 | - 0 (0%) |
35 | Backdoor | 1 | ▲ new |
36 | Cryptocurrency Miner | 1 | ▲ new |
37 | Phishing | 1 | ▲ new |
38 | Criminal | 1 | ▲ new |
39 | 1 | ▲ new | |
40 | DNS | 1 | ▲ new |
41 | account | 1 | ▲ new |
42 | com | 1 | ▲ new |
43 | Nick | 1 | ▲ new |
44 | DDoS | 1 | ▲ new |
45 | Campaign | 1 | ▼ -2 (-200%) |
46 | Takedown | 1 | ▲ new |
47 | Microsoft | 1 | ▼ -2 (-200%) |
48 | Malicious Traffic | 1 | ▲ new |
49 | MFA | 1 | ▲ new |
50 | CoreDN | 1 | ▲ new |
51 | CyberArk | 1 | ▲ new |
52 | 1 | - 0 (0%) | |
53 | Update | 1 | ▼ -3 (-300%) |
54 | Advertising | 1 | - 0 (0%) |
55 | 공격 | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Cryptocurrency Miner |
|
1 (50%) |
CoreDN |
|
1 (50%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|---|---|
Storm-1977 |
|
1 (100%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
United States |
|
2 (33.3%) |
|
2 (33.3%) | |
Microsoft |
|
1 (16.7%) |
CyberArk |
|
1 (16.7%) |
Threat info
Last 5SNS
(Total : 1)No | Title | Date |
---|---|---|
1 | Gi7w0rm @Gi7w0rm #Osint ers on Twitter, whats the best tool to find out if an email address has been used to create any social media profiles? | 2025.04.26 |
News
(Total : 4)Twitter Vulnerability Malware Report Attacker Google United States attack target Email Education Exploit YouTube Gmail intelligence hijack Storm-1977 Cryptocurrency Victim Browser Booking Backdoor Software CoreDN Takedown DDoS Phishing Criminal Facebook DNS Cryptocurrency Miner Advertising Campaign Microsoft Malicious Traffic MFA CyberArk Linux LinkedIn Update
No | Title | Date |
---|---|---|
1 | 머스크 "드론에 밀려 유인 전투기 '멸종'할 것" 경고 - 시큐리티팩트 | 2025.04.28 |
2 | Zoom attack tricks victims into allowing remote access to install malware and steal money - Malware.News | 2025.04.25 |
3 | Understanding the threat landscape for Kubernetes and containerized assets - Malware.News | 2025.04.24 |
4 | All Gmail users at risk from clever replay attack - Malware.News | 2025.04.22 |
Additional information
No | Title | Date |
---|---|---|
1 | Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries - Malware.News | 2025.04.28 |
2 | 28th April – Threat Intelligence Report - Malware.News | 2025.04.28 |
3 | Navigating Through The Fog - Malware.News | 2025.04.28 |
4 | Huawei Set to Test Powerful AI Chip to Rival Nvidia’s, WSJ Says - Bloomberg Technology | 2025.04.28 |
5 | Gamers Beware! New Attack Targets Gamers to Deploy AgeoStealer Malware - Malware.News | 2025.04.26 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Understanding the threat landscape for Kubernetes and containerized assets - Malware.News | 2025.04.24 |
2 | Understanding the threat landscape for Kubernetes and containerized assets - Malware.News | 2025.04.24 |
3 | Understanding the threat landscape for Kubernetes and containerized assets - Malware.News | 2025.04.24 |
4 | All Gmail users at risk from clever replay attack - Malware.News | 2025.04.22 |
5 | Threat actors misuse Node.js to deliver malware and other malicious payloads - Malware.News | 2025.04.16 |
View only the last 5 |