Summary: 2025/04/17 10:04

Inquiry period : 2025/04/16 10:04 ~ 2025/04/17 10:04 (1 days), 381 search results


지난 7일 기간대비 상승한 Top5 연관 키워드는
Malware MWNEWS Report United States Update 입니다.
기타 sherrodim MITRE Funding MUSTANG PANDA 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/17 Former cyber official Chris Krebs to leave SentinelOne in bid to fight Trump pressure
    ㆍ 2025/04/17 Enterprise mobile apps riddled with sloppy data security
    ㆍ 2025/04/17 LabHost: A defunct but potent phishing service

Trend graph by period

Total number of trend targets


Related keyword cloud
Top 100

# Trend Count Comparison
1Malware 86 ▲ 36 (42%)
2MWNEWS 39 ▲ 26 (67%)
3Report 39 ▲ 12 (31%)
4United States 38 ▲ 11 (29%)
5Update 36 ▲ 6 (17%)
6Vulnerability 33 ▲ 17 (52%)
7target 31 ▲ 6 (19%)
8Ransomware 30 ▲ 8 (27%)
9attack 29 ▲ 4 (14%)
10Campaign 27 ▲ 14 (52%)
11Microsoft 24 ▲ 5 (21%)
12Victim 24 ▲ 10 (42%)
13China 24 ▲ 13 (54%)
14Software 23 ▲ 7 (30%)
15intelligence 22 ▲ 12 (55%)
16Alert 21 ▲ 5 (24%)
17Google 21 ▲ 11 (52%)
18Advertising 20 ▲ 12 (60%)
19Phishing 20 ▲ 9 (45%)
20Government 19 ▲ 13 (68%)
21RCE 17 ▲ 5 (29%)
22Windows 17 ▲ 2 (12%)
23Operation 17 ▲ 6 (35%)
24Exploit 17 ▼ -2 (-12%)
25South Korea 16 ▲ 10 (63%)
26Education 16 ▲ 4 (25%)
27CISA 15 ▲ 11 (73%)
28CVE 15 ▲ 11 (73%)
29Threat 14 ▲ 5 (36%)
30Europe 14 ▲ 11 (79%)
31Kaspersky 13 ▲ 5 (38%)
32AI 12 ▼ -1 (-8%)
33c&c 11 ▲ 6 (55%)
34Browser 11 ▲ 8 (73%)
35Email 10 ▲ 1 (10%)
36ChatGPT 10 ▲ 6 (60%)
37Russia 10 ▲ 5 (50%)
38Android 9 ▲ 4 (44%)
39program 8 ▲ 8 (100%)
40Criminal 8 ▲ 1 (13%)
41Mehrere 8 ▲ 4 (50%)
42NetWireRC 8 ▲ 3 (38%)
43WhatsApp 8 ▲ 4 (50%)
44Trojan 8 ▲ 6 (75%)
45Schwachstellen 8 ▲ 2 (25%)
46CRITICAL 7 ▲ 5 (71%)
47Zusammenfassung 7 ▲ 2 (29%)
48Sicherheitsnews 7 ▲ 2 (29%)
49sherrodim 7 ▲ new
50Backdoor 7 ▲ 5 (71%)
51Apple 7 ▲ 4 (57%)
52taegliche 7 ▲ 3 (43%)
53MITRE 7 ▲ new
54Chrome 7 ▲ 5 (71%)
55hijack 6 ▲ 4 (67%)
56hacking 6 ▼ -5 (-83%)
57Distribution 6 ▲ 3 (50%)
58Telegram 6 ▲ 3 (50%)
59North Korea 6 ▲ 1 (17%)
60DarkWeb 6 ▲ 2 (33%)
61US 6 - 0 (0%)
62United Kingdom 6 ▲ 3 (50%)
63ZeroDay 6 ▲ 1 (17%)
64Stealer 6 ▲ 2 (33%)
65Funding 6 ▲ new
66httpstco 6 ▲ 2 (33%)
67Cryptocurrency 6 ▲ 3 (50%)
68amp 6 ▲ 3 (50%)
69Cobalt Strike 6 ▲ 6 (100%)
70Register 5 ▲ 2 (40%)
71Linux 5 ▲ 1 (20%)
72njRAT 5 ▲ 4 (80%)
73conference 5 ▲ 3 (60%)
74Supply chain 5 ▲ 2 (40%)
75Oracle 5 ▲ 3 (60%)
76Dark 5 - 0 (0%)
77advisory 5 ▲ 2 (40%)
78Chief 5 ▲ 5 (100%)
79last 5 - 0 (0%)
80account 5 ▲ 4 (80%)
81GitHub 5 ▲ 3 (60%)
82C2 5 ▲ 3 (60%)
83Team 5 ▲ 2 (40%)
84von 5 - 0 (0%)
85IoC 5 ▲ 1 (20%)
86DDoS 5 ▼ -3 (-60%)
87UK 4 ▲ 3 (75%)
88RAT 4 ▲ 2 (50%)
89India 4 - 0 (0%)
90data 4 ▼ -1 (-25%)
91Apps 4 ▲ 4 (100%)
92scam 4 ▲ 4 (100%)
93Schwachstelle 4 - 0 (0%)
94Chinese 4 ▲ 3 (75%)
95EDR 4 ▲ 3 (75%)
96RATel 4 ▲ 3 (75%)
97Password 4 ▲ 1 (25%)
98MUSTANG PANDA 4 ▲ new
99Code 4 - 0 (0%)
100arrest 4 ▲ 2 (50%)
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
Ransomware
30 (33%)
NetWireRC
8 (8.8%)
Trojan
8 (8.8%)
njRAT
5 (5.5%)
RAT
4 (4.4%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Kimsuky
2 (11.1%)
Lazarus
2 (11.1%)
Anonymous
2 (11.1%)
APT29
2 (11.1%)
TraderTraitor
1 (5.6%)
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Campaign
27 (20.8%)
Phishing
20 (15.4%)
RCE
17 (13.1%)
Exploit
17 (13.1%)
Backdoor
7 (5.4%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
United States
38 (11.8%)
Microsoft
24 (7.4%)
China
24 (7.4%)
Google
21 (6.5%)
Government
19 (5.9%)
Malware Type
Top 5

Detailed trend analysis by malware type.

Threat info
Last 5

SNS

(Total : 163)
  Total keyword

Ransomware Microsoft Victim Malware target Campaign Update United States attack Report Vulnerability Windows Phishing Kaspersky DarkWeb CISA CVE WhatsApp Advertising China Government Google Exploit Europe Russia Education Recorded Future Distribution Backdoor India Operation LockBit hacking c&c NetWireRC C2 Email APT intelligence njRAT Cloudflare Zscaler Proofpoint Android conference Telegram Lazarus Browser Attacker Trojan ...Cobalt Strike MUSTANG PANDA US GitHub dprk Software ChatGPT APT29 Check Point GraphicalNeutrino North Korea DDoS Singapore Open Directory Spear Phishing Akira keylogger Ucraina Tor EDR plugin CrowdStrike TONESHELL Taiwan Oracle SSRF Germany opendir ZeroDay iPhone targeted Apple MacOS AnyDesk schtasks Password Rapid7 ClickFix DDNS Malvertising Vawtrak catch RCE RAT Italy Zero Trust Israel CVEs Supply chain sectora01 Virus 보고서 AhnLab SECUI Konni Kimsuky Chinese Canada Stealer Linux Hijacking Red Team payment hijack Criminal

1ANY.RUN @anyrun_app
???? Effective threat detection depends on Indicators of Compromise, Attack & Behavior. But do you know the difference between them? Find out and see how you can use them to enrich alerts, gain threat context, and perform malware hunting ???? https://t.co/9QddtlZwEz
2025.04.16
2MalwareHunterTeam @malwrhunterteam
"screenshot_0201_jpg.apk": fc18b0a28b4bba428cb63e8c9432f8dbae758cb816e3324685c0371562bbbb30 https://t.co/EXnC8HSORf
2025.04.16
3MalwareHunterTeam @malwrhunterteam
95.67.13.216 https://t.co/1Y9Xi2CyMA
2025.04.16
4MalwareHunterTeam @malwrhunterteam
"Hiya.apk": 6d0b751bd996229cf446c3f04cd5b98f4582581de037464674e3148b2ac4078b 212.224.88.213 https://t.co/5uI298lEV1
2025.04.16
5Kimberly @StopMalvertisin
The Register | Russians lure European diplomats into malware trap with wine-tasting invite https://t.co/ugPtgi7zFx
2025.04.16

News

(Total : 216)
  Total keyword

Malware Report United States Update Vulnerability Software target attack intelligence China Google Campaign RCE South Korea Government Advertising Attacker Operation Phishing Education Exploit Windows Victim Europe Microsoft CVE CISA Browser Ransomware c&c Kaspersky ChatGPT Criminal Russia Android Chrome Email Cryptocurrency Apple United Kingdom Trojan Stealer IoC hijack ZeroDay NetWireRC Linux UK North Korea Oracle US RATel Backdoor Cobalt Strike arrest Telegram Supply chain Firefox GitHub LinkedIn YouTube hacking DDoS TikTok conference EDR WhatsApp GameoverP2P RAT OpenAI ...Distribution Chinese Ucraina Password Takedown Australia Taiwan Anonymous payment Social Engineering C2 MFA Germany Deloitte Vawtrak 한국 Java The Shadow Brokers Canada Dropper Ads XSS keylogger TONESHELL Egypt Smishing schtasks Zscaler MUSTANG PANDA njRAT 세미나 Japan Police KISA powershell SectopRAT Attacks Remcos Grandoreiro Banking ThreatMon FBI Xloader TraderTraitor Clipbanker ClickFix WinRAR UNC5221 Cisco SentinelOne Kubernetes Hijacking 러시아 어나니머스 APT28 SMB Türkiye Check Point MalSpam Twitter plugin Spain CVSS WordPress DPRK Equation Group Cobalt Hacking Team Volt Typhoon MgBot Sliver ZXShell NIST Tick Safari PlugX Router Kimsuky 북한 Okta UNIX CyberArk S2W 보고서 IBM 일본 QRadar Security Suite dailysecu Monitorapp 컨퍼런스 KSign SANDS Lab German 중국 체포 VBScript Malicious Traffic WMI DarkWeb NSHC Italy AhnLab KISIA Africa Zero Trust Accenture Gmail Cyber Kill Chain AsyncRAT MuddyWater Iran Lumma XWorm India Data Center Watchdog Facebook NSA Black Basta CrowdStrike Palo Alto Networks MDR Workshop QakBot Recorded Future DYEPACK Trend Micro Hong Kong

1한국장학진흥원, 방역관리사 1급 자격증 무료 수강 이벤트 상시 진행 - 데일리시큐2025.04.17
2어나니머스, 러시아 해킹.. 국가 DB '전체 분량' 털렸다 - 시큐리티팩트2025.04.17
3Former cyber official Chris Krebs to leave SentinelOne in bid to fight Trump pressure - Malware.News2025.04.17
4Ex-Cyber Chief Targeted by Trump Vows to Fight Administration - Bloomberg Technology2025.04.17
5Enterprise mobile apps riddled with sloppy data security - Malware.News2025.04.17

Additional information

Level Description
danger Executed a process and injected code into it
warning File has been identified by 28 AntiVirus engines on VirusTotal as malicious
watch Allocates execute permission to another process indicative of possible code injection
watch Code injection by writing an executable or DLL to the memory of another process
watch Communicates with host for which no DNS query was performed
watch Deletes executed files from disk
watch Manipulates memory of a non-child process indicative of process injection
watch Potential code injection by writing to the memory of another process
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Uses Windows utilities for basic Windows functionality
notice Yara rule detected in process memory
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Uses Windows APIs to generate a cryptographic key
Network ET DROP Spamhaus DROP Listed Traffic Inbound group 13
Network ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
Network ET INFO Executable Download from dotted-quad Host
Network ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
Network ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
Network ET POLICY PE EXE or DLL Windows file download HTTP
No Category URL CC ASN Co Date
1malicioushttps://u1.bufferfacelift.shop/US USCLOUDFLARENET2025.04.17
2malicioushttps://u1.establishhertz.shop/US USCLOUDFLARENET2025.04.17
3c2http://adminus4.ddns.net:8090/Vre2025.04.16
4c2http://103.149.98.247/vs/tt/d.php2025.04.16
5malicioushttps://www.xoebty.com/cloudflare.msiUS US2025.04.16
View only the last 5
No URL CC ASN Co Reporter Date
1http://117.254.176.17:39356/i
32-bit elf mips Mozi
IN INNational Internet Backbonegeenensp2025.04.17
2http://221.214.154.94:50612/i
32-bit elf mips Mozi
CN CNCHINA UNICOM China169 Backbonegeenensp2025.04.17
3http://42.224.170.22:38295/bin.sh
32-bit elf mips Mozi
CN CNCHINA UNICOM China169 Backbonegeenensp2025.04.17
4http://120.84.212.239:46091/i
32-bit elf mips Mozi
CN CN...geenensp2025.04.17
5http://59.88.6.99:51333/bin.sh
32-bit elf mips Mozi
IN INNational Internet Backbonegeenensp2025.04.17
View only the last 5
Beta Service, If you select keyword, you can check detailed information.