Summary: 2025/05/01 05:28
First reported date: 2024/09/19
Inquiry period : 2025/04/30 05:28 ~ 2025/05/01 05:28 (1 days), 1 search results
지난 7일 기간대비 신규 트렌드를 보이고 있습니다.
악성코드 유형 Lumma 도 새롭게 확인됩니다.
공격기술 FakeCaptcha Stealer 도 새롭게 확인됩니다.
기타 Binary Defense Analyzing LummaStealers 신규 키워드도 확인됩니다.
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Binary | 1 | ▲ new |
2 | Defense | 1 | ▲ new |
3 | Analyzing | 1 | ▲ new |
4 | LummaStealers | 1 | ▲ new |
5 | FakeCaptcha | 1 | ▲ new |
6 | Lumma | 1 | ▲ new |
7 | Stealer | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Lumma |
|
1 (100%) |

Attacker & Actors
The status of the attacker or attack group being issued.
No data.

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
FakeCaptcha |
|
1 (50%) |
Stealer |
|
1 (50%) |

Country & Company
This is a country or company that is an issue.
No data.
Threat info
Last 5SNS
(Total : 1)
Total keyword
No | Title | Date |
---|---|---|
1 | Kimberly @StopMalvertisin Binary Defense | Analyzing LummaStealer’s FakeCAPTCHA Delivery Tactics https://t.co/ecUvzeWKQy | 2025.04.30 |
News
(Total : 0)No data.
Additional information
No | Title | Date |
---|---|---|
1 | Uyghur leaders subjected to malware attack - Malware.News | 2025.05.01 |
2 | Oregon agency's 1.3M files leaked by Rhysida ransomware gang - Malware.News | 2025.05.01 |
3 | Novel Gremlin Stealer malware emerges - Malware.News | 2025.05.01 |
4 | Exposed Git configuration file scanning escalates - Malware.News | 2025.05.01 |
5 | CISA: Attacks involving Qualitia, Commvault, Broadcom bugs ongoing - Malware.News | 2025.05.01 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Tracking Emmenhtal - Malware.News | 2025.03.04 |
No data
No data
No | Category | URL | CC | ASN Co | Date |
---|---|---|---|---|---|
1 | malicious | https://booking.secure-partener.com/ | US ![]() | CLOUDFLARENET | 2025.04.28 |
2 | malicious | https://booking.secure-partener.com/sign-in | US ![]() | CLOUDFLARENET | 2025.04.28 |
3 | malicious | https://secure-partener.com/ | US ![]() | CLOUDFLARENET | 2025.04.28 |
4 | malicious | https://s1.flammablegrunt.site/hpkekeyconfig.txt | US ![]() | 2025.04.24 | |
5 | malicious | https://roaminghere.fly.storage.tigris.dev/passinggateforward.html | CA ![]() | COGENT-174 | 2025.04.24 |
View only the last 5 |
No | URL | CC | ASN Co | Reporter | Date |
---|---|---|---|---|---|
1 | https://grupo-positivo.com/GUP.zip booking ClickFix FakeCaptcha | DE ![]() | Hetzner Online GmbH | JAMESWT_WT | 2025.04.29 |
2 | http://highspring.247supportsolutions.com:8080/converge.exe ClickFix exe FakeCaptcha | US ![]() | AMAZON-02 | DaveLikesMalwre | 2025.04.28 |
3 | https://stealer.cy/static/packaged_py.zip ClickFix FakeCaptcha | RU ![]() | Ddos-guard Ltd | DaveLikesMalwre | 2025.04.28 |
4 | https://stealer.cy/psc?uid=12%5E ClickFix FakeCaptcha | RU ![]() | Ddos-guard Ltd | DaveLikesMalwre | 2025.04.28 |
5 | https://stealer.cy/py-captcha?uid=12 ClickFix FakeCaptcha | RU ![]() | Ddos-guard Ltd | DaveLikesMalwre | 2025.04.28 |
View only the last 5 |
Beta Service, If you select keyword, you can check detailed information.