Summary: 2025/04/28 11:38
First reported date: 2016/12/16
Inquiry period : 2025/04/27 11:38 ~ 2025/04/28 11:38 (1 days), 1 search results
지난 7일 기간대비 동일한 트렌드를 보이고 있습니다.
지난 7일 기간대비 상승한 Top5 연관 키워드는 Microsoft Education intelligence threat Storm-1977 입니다.
기타 attack Password Storm AzureChecker Hits 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/27 Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers
참고로 동일한 그룹의 악성코드 타입은 Cryptocurrency Miner HiddenBee XMRig 등 9개 종이 확인됩니다.
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Cryptocurrency Miner | 1 | - 0 (0%) |
2 | Microsoft | 1 | ▲ 1 (100%) |
3 | Education | 1 | ▲ 1 (100%) |
4 | intelligence | 1 | ▲ 1 (100%) |
5 | attack | 1 | ▲ new |
6 | Password | 1 | ▲ new |
7 | Storm | 1 | ▲ new |
8 | AzureChecker | 1 | ▲ new |
9 | threat | 1 | ▲ 1 (100%) |
10 | Hits | 1 | ▲ new |
11 | Storm-1977 | 1 | ▲ 1 (100%) |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Cryptocurrency Miner |
|
1 (100%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|---|---|
Storm-1977 |
|
1 (100%) |

Technique
This is an attack technique that is becoming an issue.
No data.

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
Microsoft |
|
1 (100%) |
Malware Family
Top 5
A malware family is a group of applications with similar attack techniques.
In this trend, it is classified into Ransomware, Stealer, RAT or Backdoor, Loader, Botnet, Cryptocurrency Miner.
Threat info
Last 5SNS
(Total : 0)No data.
News
(Total : 1)Cryptocurrency Miner Microsoft Education intelligence attack Password Storm-1977
No | Title | Date |
---|---|---|
1 | Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers - The Hacker News | 2025.04.27 |
Additional information
No | Title | Date |
---|---|---|
1 | Navigating Through The Fog - Malware.News | 2025.04.28 |
2 | Huawei Set to Test Powerful AI Chip to Rival Nvidia’s, WSJ Says - Bloomberg Technology | 2025.04.28 |
3 | Gamers Beware! New Attack Targets Gamers to Deploy AgeoStealer Malware - Malware.News | 2025.04.26 |
4 | Threat Hunting: For what, when, and how? - Malware.News | 2025.04.26 |
5 | Detection Engineering Fundamentals: What makes a good alert? - Malware.News | 2025.04.26 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers - The Hacker News | 2025.04.27 |
2 | Threat Actors Exploiting Unsecured Kubernetes Clusters for Crypto Mining - Malware.News | 2025.04.25 |
3 | Understanding the threat landscape for Kubernetes and containerized assets - Malware.News | 2025.04.24 |
4 | Understanding the threat landscape for Kubernetes and containerized assets - Malware.News | 2025.04.24 |
5 | Understanding the threat landscape for Kubernetes and containerized assets - Malware.News | 2025.04.24 |
View only the last 5 |
Level | Description |
---|---|
danger | File has been identified by 35 AntiVirus engines on VirusTotal as malicious |
watch | A process attempted to delay the analysis task. |
watch | Attempts to create or modify system certificates |
watch | Communicates with host for which no DNS query was performed |
watch | Connects to an IRC server |
watch | Installs itself for autorun at Windows startup |
watch | Looks for the Windows Idle Time to determine the uptime |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
notice | A process created a hidden window |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Checks adapter addresses which can be used to detect virtual network interfaces |
notice | Checks for the Locally Unique Identifier on the system for a suspicious privilege |
notice | Creates a shortcut to an executable file |
notice | Creates a suspicious process |
notice | Creates executable files on the filesystem |
notice | Creates hidden or system file |
notice | Drops a binary and executes it |
notice | Drops an executable to the user AppData folder |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | One or more potentially interesting buffers were extracted |
notice | Performs some HTTP requests |
notice | Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation |
notice | Terminates another process |
notice | Uses Windows utilities for basic Windows functionality |
notice | Yara rule detected in process memory |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | Command line console output was observed |
info | Queries for the computername |
info | The executable uses a known packer |
info | Uses Windows APIs to generate a cryptographic key |
Network | ET DROP Spamhaus DROP Listed Traffic Inbound group 23 |
Network | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
Network | ET INFO Executable Download from dotted-quad Host |
Network | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
Network | ET POLICY PE EXE or DLL Windows file download HTTP |
Network | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) |