Summary: 2025/04/29 00:03

First reported date: 2018/02/21
Inquiry period : 2025/04/22 00:03 ~ 2025/04/29 00:03 (7 days), 24 search results

전 기간대비 8% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
North Korea dprk cti Campaign Malware 입니다.
악성코드 유형 Ransomware LPEClient NetWireRC Zeus Vawtrak 도 새롭게 확인됩니다.
공격자 CryptoCore unc4899 도 새롭게 확인됩니다.
기관 및 기업 Mandiant Kaspersky Okta Russia S2W United States 도 새롭게 확인됩니다.
기타 beavertail Browser Launches Interview Contagious 등 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/24 DPRK Hackers Steal $137M from TRON Users in Single-Day Phishing Attack
    ㆍ 2025/04/24 Contagious Interview (DPRK) Launches a New Campaign Creating Three Front Companies to Deliver a Trio of Malware: BeaverTail, InvisibleFerret, and OtterCookie

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1North Korea 24 ▲ 2 (8%)
2dprk 24 ▲ 2 (8%)
3cti 17 ▲ 1 (6%)
4Campaign 7 ▲ 6 (86%)
5Malware 7 ▲ 2 (29%)
6itworker 5 ▲ 3 (60%)
7AhnLab 4 ▲ 2 (50%)
8LNK 4 - 0 (0%)
9APT 4 ▲ 1 (25%)
10SECUI 4 ▲ 2 (50%)
11Kimsuky 3 ▼ -4 (-133%)
12AhnLabSecuInfo 3 ▲ 2 (67%)
13beavertail 2 ▲ new
14Browser 2 ▲ new
15Ransomware 2 ▲ new
16Launches 2 ▲ new
17Interview 2 ▲ new
18Contagious 2 ▲ new
19PebbleDash 2 ▲ new
20Konni 2 ▼ -3 (-150%)
21Mandiant 2 ▲ new
22Phishing 2 ▲ 1 (50%)
23Kaspersky 2 ▲ new
24attack 2 ▲ new
25TraderTraitor 2 ▲ 1 (50%)
26Web 2 ▲ new
27Trend 2 - 0 (0%)
28위장 2 ▲ 1 (50%)
29Unit 2 ▲ new
30deepfake 2 ▲ new
31amp 2 ▲ new
32Distribution 2 ▲ new
33innorix 1 ▲ new
34Okta 1 ▲ new
35DPRKs 1 ▲ new
36power 1 ▲ new
37AI 1 ▲ new
38wagemole 1 ▲ new
39March 1 ▲ new
40확정 1 ▲ new
41Lazarus 1 ▼ -2 (-200%)
42JanuaryMarch 1 ▲ new
43Trends 1 ▲ new
44Extortion 1 ▲ new
45jumpypisces 1 ▲ new
46CryptoCore 1 ▲ new
47Data 1 ▲ new
48신고 1 ▲ new
49UNC 1 ▲ new
50d48032d835c95af816fbcea6e659cdbe 1 ▲ new
51unc5342 1 ▲ new
52unc4899 1 ▲ new
53LPEClient 1 ▲ new
54Malicious 1 ▲ new
55signbt 1 ▲ new
56frostyferret 1 ▲ new
57Operation 1 - 0 (0%)
58Role 1 ▲ new
59Crucial 1 ▲ new
60APT37 1 - 0 (0%)
61Plays 1 ▲ new
62Infrastructure 1 ▲ new
63RokRAT 1 - 0 (0%)
64Russian 1 ▲ new
65voiddokkaebi 1 ▲ new
66Update 1 ▲ new
67Russia 1 ▲ new
68UNC4736 1 ▲ new
69hole 1 ▲ new
70toolset 1 ▲ new
71df5ba1678a4bf515536c0e622a2f97c597927e01bb674a648d82bbdd797425d9 1 ▲ new
72NetWireRC 1 ▲ new
73crossex 1 ▲ new
74agamemnon 1 ▲ new
75threatneedle 1 ▲ new
76종합소득세 1 ▲ new
77과세표준 1 ▲ new
78synchole 1 ▲ new
79invisibleferret 1 ▲ new
80unc3782 1 ▲ new
81Zeus 1 ▲ new
82crypto 1 ▼ -1 (-100%)
83inside 1 ▲ new
84Vawtrak 1 ▲ new
85actor 1 - 0 (0%)
86S2W 1 ▲ new
87Analysis 1 - 0 (0%)
88Willo 1 ▲ new
89GopherGrabber 1 ▲ new
90vstAdphpnewpacomlineampwpnaaa 1 ▲ new
91http 1 ▲ new
92ZEUSDEV 1 ▲ new
93United States 1 ▲ new
94탈취 1 ▲ new
95정보 1 ▲ new
96고지서 1 ▲ new
97Ease 1 ▲ new
98Alarming 1 ▲ new
99Face 1 ▲ new
100False 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
Ransomware
2 (22.2%)
Konni
2 (22.2%)
LPEClient
1 (11.1%)
RokRAT
1 (11.1%)
NetWireRC
1 (11.1%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Kimsuky
3 (33.3%)
TraderTraitor
2 (22.2%)
Lazarus
1 (11.1%)
CryptoCore
1 (11.1%)
unc4899
1 (11.1%)
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Campaign
7 (50%)
APT
4 (28.6%)
Phishing
2 (14.3%)
Hijacking
1 (7.1%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
North Korea
24 (36.9%)
dprk
24 (36.9%)
AhnLab
4 (6.2%)
SECUI
4 (6.2%)
Mandiant
2 (3.1%)
Threat info
Last 5

SNS

(Total : 22)
  Total keyword

North Korea dprk Campaign Malware SECUI AhnLab APT Kimsuky Ransomware TraderTraitor Kaspersky Browser Konni Distribution Lazarus LPEClient Okta Mandiant CryptoCore Russia NetWireRC RokRAT APT37 Operation unc4899 attack Update UNC4736 Zeus Vawtrak S2W 유포 악성코드 United States Hijacking ...

No Title Date
1JangPro @JangPr0
#APT #DPRK d48032d835c95af816fbcea6e659cdbe Decoy: NTS_eTaxInvoice.html.lnk https://deliberatecollaboration.com/wp-includes/js/src/get.php & upload.php & list.php similar https://t.co/rldVG2Syaw https://t.co/ZKJcng4RBL
2025.04.28
2lazarusholic @lazarusholic
"Lazarus APT updates its toolset in watering hole attacks" published by @Kaspersky. #Innorix, #LPEClient, #Lazarus, #SIGNBT, #SyncHole, #ThreatNeedle, #AGAMEMNON, #CrossEX, #DPRK, #CTI https://t.co/bLRNQvZvWb
2025.04.24
3lazarusholic @lazarusholic
"M-Trends 2025: Data, Insights, and Recommendations From the Frontlines" published by @Mandiant. #ITWorker, #Trend, #UNC1069, #UNC3782, #UNC4736, #UNC4899, #UNC5342, #DPRK, #CTI https://t.co/aM8ET9BT6z
2025.04.24
4lazarusholic @lazarusholic
"제안서로 위장을 하고 있는 북한 코니(Konni) 에서 만든 악성코드-제안서(2025.4.11)" published by @sakaijjang. #Konni, #LNK, #DPRK, #CTI https://t.co/C8RYgvH5YI
2025.04.24
5lazarusholic @lazarusholic
"Russian Infrastructure Plays Crucial Role in North Korean Cybercrime Operations" published by @trendmicro. #BeaverTail, #FrostyFerret, #VoidDokkaebi, #DPRK, #CTI https://t.co/7tOvhUerrV
2025.04.24

Additional information

No Title Date
1DPRK Hackers Steal $137M from TRON Users in Single-Day Phishing Attack - The Hacker News2025.04.24
2DPRK Hackers Steal $137M from TRON Users in Single-Day Phishing Attack - The Hacker News2025.04.24
3Tweet on public Google Drive potentially connected to DPRK activity. - Twitter (@browserc... / Cookie Connoisseur / malpedia2025.04.21
4DPRK IT Workers Expanding in Scope and Scale - Malware.News2025.04.01
5The Fake IT Worker Triangle: Pyongyang, Moscow, and Beijing - Malware.News2025.01.29
View only the last 5
No data
No data
No data
No data
Beta Service, If you select keyword, you can check detailed information.