Summary: 2025/04/28 19:54
First reported date: 2009/08/05
Inquiry period : 2025/04/27 19:54 ~ 2025/04/28 19:54 (1 days), 1 search results
지난 7일 기간대비 -400% 낮은 트렌드를 보이고 있습니다.
지난 7일 기간대비 상승한 Top5 연관 키워드는 LOTUS PANDA Education ZeroDay Update WhatsApp 입니다.
악성코드 유형 Lobshot Clop 도 새롭게 확인됩니다.
기관 및 기업 Check Point 도 새롭게 확인됩니다.
기타 DarkWeb CVSS 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/28 28th April – Threat Intelligence Report
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | LOTUS PANDA | 1 | ▲ 1 (100%) |
2 | Microsoft | 1 | - 0 (0%) |
3 | Education | 1 | ▲ 1 (100%) |
4 | Browser | 1 | ▼ -4 (-400%) |
5 | Chrome | 1 | - 0 (0%) |
6 | Exploit | 1 | - 0 (0%) |
7 | ZeroDay | 1 | ▲ 1 (100%) |
8 | Update | 1 | ▲ 1 (100%) |
9 | 1 | ▲ 1 (100%) | |
10 | Check Point | 1 | ▲ new |
11 | RATel | 1 | ▲ 1 (100%) |
12 | DarkWeb | 1 | ▲ new |
13 | Ransomware | 1 | ▲ 1 (100%) |
14 | China | 1 | ▲ 1 (100%) |
15 | Lobshot | 1 | ▲ new |
16 | Vulnerability | 1 | ▲ 1 (100%) |
17 | Victim | 1 | - 0 (0%) |
18 | Cryptocurrency | 1 | - 0 (0%) |
19 | Campaign | 1 | - 0 (0%) |
20 | Russia | 1 | ▲ 1 (100%) |
21 | Ucraina | 1 | ▲ 1 (100%) |
22 | Report | 1 | - 0 (0%) |
23 | Phishing | 1 | - 0 (0%) |
24 | Kaspersky | 1 | ▲ 1 (100%) |
25 | CVSS | 1 | ▲ new |
26 | Malware | 1 | ▼ -1 (-100%) |
27 | Clop | 1 | ▲ new |
28 | Advertising | 1 | - 0 (0%) |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
RATel |
|
1 (25%) |
Ransomware |
|
1 (25%) |
Lobshot |
|
1 (25%) |
Clop |
|
1 (25%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|---|---|
LOTUS PANDA |
|
1 (100%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
Microsoft |
|
1 (16.7%) |
Check Point |
|
1 (16.7%) |
China |
|
1 (16.7%) |
Russia |
|
1 (16.7%) |
Ucraina |
|
1 (16.7%) |
Threat info
Last 5SNS
(Total : 0)No data.
News
(Total : 1)LOTUS PANDA Microsoft Education Browser Chrome Exploit ZeroDay Update WhatsApp Check Point RATel DarkWeb Ransomware China Lobshot Vulnerability Attacker Victim Cryptocurrency Campaign Russia Ucraina Report Phishing Kaspersky CVSS Malware Clop Advertising
No | Title | Date |
---|---|---|
1 | 28th April – Threat Intelligence Report - Malware.News | 2025.04.28 |
Additional information
No | Title | Date |
---|---|---|
1 | Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries - Malware.News | 2025.04.28 |
2 | 28th April – Threat Intelligence Report - Malware.News | 2025.04.28 |
3 | Navigating Through The Fog - Malware.News | 2025.04.28 |
4 | Huawei Set to Test Powerful AI Chip to Rival Nvidia’s, WSJ Says - Bloomberg Technology | 2025.04.28 |
5 | Gamers Beware! New Attack Targets Gamers to Deploy AgeoStealer Malware - Malware.News | 2025.04.26 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | 28th April – Threat Intelligence Report - Malware.News | 2025.04.28 |
2 | 28th April – Threat Intelligence Report - Malware.News | 2025.04.28 |
3 | 28th April – Threat Intelligence Report - Malware.News | 2025.04.28 |
4 | Only Google Can Run Chrome, Company’s Browser Chief Tells Judge - Bloomberg Technolo... | 2025.04.26 |
5 | Yahoo Is Ready to Buy Chrome Browser If Google Is Forced to Sell - Bloomberg Technolo... | 2025.04.25 |
View only the last 5 |
Level | Description |
---|---|
warning | File has been identified by 27 AntiVirus engines on VirusTotal as malicious |
watch | Drops a binary and executes it |
watch | Found URLs in memory pointing to an IP address rather than a domain (potentially indicative of Command & Control traffic) |
watch | One or more non-whitelisted processes were created |
watch | Requests access to read memory contents of lsass.exe potentially indicative of credential dumping |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
notice | A process created a hidden window |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | An application raised an exception which may be indicative of an exploit crash |
notice | Creates (office) documents on the filesystem |
notice | Creates a shortcut to an executable file |
notice | Creates a suspicious process |
notice | Creates executable files on the filesystem |
notice | Drops an executable to the user AppData folder |
notice | One or more potentially interesting buffers were extracted |
notice | Potentially malicious URLs were found in the process memory dump |
notice | Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation |
notice | Starts servers listening |
notice | Steals private information from local Internet browsers |
notice | Yara rule detected in process memory |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | One or more processes crashed |
info | Tries to locate where the browsers are installed |