Summary: 2025/04/28 20:18
First reported date: 2013/05/26
Inquiry period : 2025/04/21 20:18 ~ 2025/04/28 20:18 (7 days), 2 search results
전 기간대비 동일한 트렌드를 보이고 있습니다.
악성코드 유형 lummastealer Lumma 도 새롭게 확인됩니다.
공격기술 MalSpam Stealer 도 새롭게 확인됩니다.
기타 malspamming Somebody late Beogradska Bankas 등 신규 키워드도 확인됩니다.
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | malspamming | 2 | ▲ new |
2 | Somebody | 2 | ▲ new |
3 | late | 2 | ▲ new |
4 | Beogradska | 2 | ▲ new |
5 | Bankas | 2 | ▲ new |
6 | name | 2 | - 0 (0%) |
7 | c&c | 2 | ▲ new |
8 | MalSpam | 2 | ▲ new |
9 | Operation | 2 | ▲ new |
10 | lummastealer | 1 | ▲ new |
11 | Lumma | 1 | ▲ new |
12 | Stealer | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
lummastealer |
|
1 (50%) |
Lumma |
|
1 (50%) |

Attacker & Actors
The status of the attacker or attack group being issued.
No data.

Country & Company
This is a country or company that is an issue.
No data.
Threat info
Last 5SNS
(Total : 2)
Total keyword
c&c MalSpam Operation lummastealer Lumma Stealer
News
(Total : 0)No data.
Additional information
No | Title | Date |
---|---|---|
1 | Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries - Malware.News | 2025.04.28 |
2 | 28th April – Threat Intelligence Report - Malware.News | 2025.04.28 |
3 | Navigating Through The Fog - Malware.News | 2025.04.28 |
4 | Huawei Set to Test Powerful AI Chip to Rival Nvidia’s, WSJ Says - Bloomberg Technology | 2025.04.28 |
5 | Gamers Beware! New Attack Targets Gamers to Deploy AgeoStealer Malware - Malware.News | 2025.04.26 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Tj-actions/changed-files with Falco Actions - Malware.News | 2025.04.10 |
2 | Hackers Use Trump’s Coin, Binance’s Name in Crypto Phishing Scam - Malware.News | 2025.03.13 |
3 | Using Terraform for container security as code with Sysdig - Malware.News | 2025.02.28 |
4 | New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution - The Hacker News | 2025.02.15 |
5 | Decrypting Full Disk Encryption with Dissect - Malware.News | 2024.12.11 |
View only the last 5 |
No data
No data
No data
No data
Beta Service, If you select keyword, you can check detailed information.