Summary: 2025/04/19 13:16
First reported date: 2010/02/20
Inquiry period : 2025/04/18 13:16 ~ 2025/04/19 13:16 (1 days), 11 search results
지난 7일 기간대비 -55% 낮은 트렌드를 보이고 있습니다.
지난 7일 기간대비 상승한 Top5 연관 키워드는 attack China Exploit Kaspersky intelligence 입니다.
악성코드 유형 Mirai RedLine Vidar Raccoon 도 새롭게 확인됩니다.
기관 및 기업 Proofpoint Hong Kong 카스퍼스키 도 새롭게 확인됩니다.
기타 Kali MimiKatz NTLM Mar leak 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/19 When Vulnerability Information Flows are Vulnerable Themselves
ㆍ 2025/04/19 Phishing campaigns abuse Windows NTLM hash leak bug
ㆍ 2025/04/19 Chinese Smishing Kit Powers Widespread Toll Fraud Campaign Targeting U.S. Users in 8 States
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Campaign | 11 | ▼ -6 (-55%) |
2 | Malware | 7 | ▼ -3 (-43%) |
3 | attack | 6 | ▲ 3 (50%) |
4 | China | 5 | ▲ 2 (40%) |
5 | Exploit | 5 | ▲ 2 (40%) |
6 | Update | 4 | - 0 (0%) |
7 | Kaspersky | 4 | ▲ 2 (50%) |
8 | intelligence | 4 | ▲ 1 (25%) |
9 | Phishing | 4 | ▼ -1 (-25%) |
10 | Report | 4 | ▼ -2 (-50%) |
11 | target | 3 | ▼ -3 (-100%) |
12 | Russia | 3 | ▲ 1 (33%) |
13 | Vulnerability | 3 | - 0 (0%) |
14 | Operation | 3 | ▲ 1 (33%) |
15 | Criminal | 3 | ▲ 1 (33%) |
16 | RCE | 3 | ▼ -1 (-33%) |
17 | Software | 3 | ▲ 1 (33%) |
18 | United States | 3 | ▼ -1 (-33%) |
19 | Chinese | 2 | ▲ 1 (50%) |
20 | powershell | 2 | ▲ 1 (50%) |
21 | c&c | 2 | - 0 (0%) |
22 | Government | 2 | - 0 (0%) |
23 | 2 | ▲ 1 (50%) | |
24 | Kali | 2 | ▲ new |
25 | South Korea | 2 | ▲ 2 (100%) |
26 | VPN | 2 | ▲ 2 (100%) |
27 | Victim | 2 | ▼ -1 (-50%) |
28 | Android | 2 | - 0 (0%) |
29 | DarkWeb | 2 | ▲ 2 (100%) |
30 | Windows | 2 | ▼ -1 (-50%) |
31 | Java | 1 | - 0 (0%) |
32 | Education | 1 | - 0 (0%) |
33 | Proofpoint | 1 | ▲ new |
34 | Mirai | 1 | ▲ new |
35 | MimiKatz | 1 | ▲ new |
36 | EDR | 1 | - 0 (0%) |
37 | MFA | 1 | ▲ 1 (100%) |
38 | Australia | 1 | - 0 (0%) |
39 | Taiwan | 1 | - 0 (0%) |
40 | Microsoft | 1 | ▼ -3 (-300%) |
41 | 1 | ▼ -1 (-100%) | |
42 | Advertising | 1 | ▼ -2 (-200%) |
43 | group | 1 | - 0 (0%) |
44 | CISA | 1 | ▲ 1 (100%) |
45 | NTLM | 1 | ▲ new |
46 | MITRE | 1 | ▲ 1 (100%) |
47 | information | 1 | ▲ 1 (100%) |
48 | Supply chain | 1 | ▲ 1 (100%) |
49 | Recorded Future | 1 | ▲ 1 (100%) |
50 | CVSS | 1 | ▲ 1 (100%) |
51 | Mar | 1 | ▲ new |
52 | leak | 1 | ▲ new |
53 | hash | 1 | ▲ new |
54 | APT28 | 1 | ▲ 1 (100%) |
55 | Backdoor | 1 | ▲ 1 (100%) |
56 | Kit | 1 | ▲ new |
57 | road | 1 | ▲ 1 (100%) |
58 | toll | 1 | ▲ 1 (100%) |
59 | Smishing | 1 | - 0 (0%) |
60 | Cisco | 1 | - 0 (0%) |
61 | intrusion | 1 | ▲ new |
62 | Chinalinked | 1 | ▲ new |
63 | Billbug | 1 | ▲ new |
64 | Europ | 1 | ▲ new |
65 | Takedown | 1 | - 0 (0%) |
66 | RedLine | 1 | ▲ new |
67 | Browser | 1 | ▲ 1 (100%) |
68 | 멀웨어 | 1 | ▲ new |
69 | Hong Kong | 1 | ▲ new |
70 | Cobalt Strike | 1 | - 0 (0%) |
71 | MUSTANG PANDA | 1 | ▲ 1 (100%) |
72 | Mustang | 1 | ▲ 1 (100%) |
73 | APT | 1 | ▼ -1 (-100%) |
74 | Reading | 1 | ▲ new |
75 | Dark | 1 | ▲ 1 (100%) |
76 | amp | 1 | ▲ 1 (100%) |
77 | 카스퍼스키 | 1 | ▲ new |
78 | Spyware | 1 | ▲ new |
79 | 청첩장 | 1 | ▲ new |
80 | Distribution | 1 | - 0 (0%) |
81 | North Korea | 1 | - 0 (0%) |
82 | Social Engineering | 1 | - 0 (0%) |
83 | ClickFix | 1 | ▲ 1 (100%) |
84 | Iran | 1 | - 0 (0%) |
85 | Korea | 1 | ▲ new |
86 | North | 1 | ▲ 1 (100%) |
87 | SpyMax | 1 | ▲ new |
88 | Full | 1 | ▲ new |
89 | Stealer | 1 | - 0 (0%) |
90 | MultiStage | 1 | ▲ 1 (100%) |
91 | GameoverP2P | 1 | - 0 (0%) |
92 | Lumma | 1 | ▲ 1 (100%) |
93 | Ransomware | 1 | ▼ -1 (-100%) |
94 | Telegram | 1 | ▼ -1 (-100%) |
95 | Cryptocurrency | 1 | ▼ -1 (-100%) |
96 | Vidar | 1 | ▲ new |
97 | Raccoon | 1 | ▲ new |
98 | statesponsored | 1 | ▲ new |
99 | delivery | 1 | ▲ new |
100 | Remote | 1 | ▲ 1 (100%) |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Mirai |
|
1 (9.1%) |
RedLine |
|
1 (9.1%) |
GameoverP2P |
|
1 (9.1%) |
Lumma |
|
1 (9.1%) |
Ransomware |
|
1 (9.1%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|---|---|
APT28 |
|
1 (100%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
China |
|
5 (14.3%) |
Kaspersky |
|
4 (11.4%) |
Russia |
|
3 (8.6%) |
United States |
|
3 (8.6%) |
Chinese |
|
2 (5.7%) |
Threat info
Last 5SNS
(Total : 3)Campaign China attack Proofpoint Chinese Report Cobalt Strike MUSTANG PANDA APT Kaspersky North Korea Russia Social Engineering ClickFix Criminal Iran
News
(Total : 8)Campaign Malware Exploit Phishing attack Update intelligence China Vulnerability Operation RCE Kaspersky United States target Software Report Russia powershell Android Victim c&c Google Government Windows VPN Criminal South Korea DarkWeb Kali Mirai CVSS MimiKatz Java MFA Australia Taiwan Microsoft EDR CISA Education APT28 Supply chain Advertising Chinese Smishing Cisco Backdoor Recorded Future Ransomware Email Attacker Distribution 카스퍼스키 멀웨어 Hong Kong Spyware Remcos NetWireRC Palo Alto Networks Xloader Takedown RAT RedLine Raccoon Vidar Cryptocurrency Telegram Lumma GameoverP2P Stealer Browser
No | Title | Date |
---|---|---|
1 | When Vulnerability Information Flows are Vulnerable Themselves - Malware.News | 2025.04.19 |
2 | Chinese Smishing Kit Powers Widespread Toll Fraud Campaign Targeting U.S. Users in 8 States - The Hacker News | 2025.04.19 |
3 | Phishing campaigns abuse Windows NTLM hash leak bug - Malware.News | 2025.04.19 |
4 | Dark Web Profile: Flax Typhoon - Malware.News | 2025.04.18 |
5 | Dark Web Market: STYX Market - Malware.News | 2025.04.18 |
Additional information
No | Title | Date |
---|---|---|
1 | Tesla to Delay Production of Cheaper EVs, Reuters Reports - Bloomberg Technology | 2025.04.19 |
2 | When Vulnerability Information Flows are Vulnerable Themselves - Malware.News | 2025.04.19 |
3 | CISA warns threat hunting staff of end to Google, Censys contracts as agency cuts set in - Malware.News | 2025.04.19 |
4 | Radiology practice reportedly working with FBI after ‘data security incident’ - Malware.News | 2025.04.19 |
5 | Text scams grow to steal hundreds of millions of dollars - Malware.News | 2025.04.19 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | When Vulnerability Information Flows are Vulnerable Themselves - Malware.News | 2025.04.19 |
2 | Chinese Smishing Kit Powers Widespread Toll Fraud Campaign Targeting U.S. Users in 8 States - The Hacker News | 2025.04.19 |
3 | Phishing campaigns abuse Windows NTLM hash leak bug - Malware.News | 2025.04.19 |
4 | Dark Web Profile: Flax Typhoon - Malware.News | 2025.04.18 |
5 | Dark Web Profile: Flax Typhoon - Malware.News | 2025.04.18 |
View only the last 5 |
No | URL | CC | ASN Co | Reporter | Date |
---|---|---|---|---|---|
1 | http://comodozeropoint.com/updates/96313727/GoodTEst/Pycnonotidae.zip campaign opendir stealer | US ![]() | CLOUDFLARENET | abus3reports | 2024.10.19 |
2 | http://comodozeropoint.com/updates/96313727/GoodTEst/12.exe campaign opendir stealer | US ![]() | CLOUDFLARENET | abus3reports | 2024.10.19 |
3 | http://comodozeropoint.com/updates/1736162964/N1/Team.exe campaign opendir stealer | US ![]() | CLOUDFLARENET | abus3reports | 2024.10.19 |
4 | http://comodozeropoint.com/updates/5591113345/Choung/unroughened.exe campaign opendir stealer | US ![]() | CLOUDFLARENET | abus3reports | 2024.10.19 |
5 | http://comodozeropoint.com/updates/EvotoInstaller_Setup_1.0.0-256_stable.exe campaign opendir stealer | US ![]() | abus3reports | 2024.10.19 | |
View only the last 5 |