Summary: 2025/04/23 22:37
First reported date: 2020/12/17
Inquiry period : 2025/04/22 22:37 ~ 2025/04/23 22:37 (1 days), 1 search results
지난 7일 기간대비 신규 트렌드를 보이고 있습니다.
악성코드 유형 SocGholish Alureon Rhysida Ransomware 도 새롭게 확인됩니다.
공격기술 Campaign 도 새롭게 확인됩니다.
기관 및 기업 Europe Government Google Kaspersky Recorded Future United States Russia 도 새롭게 확인됩니다.
기타 Malware Update attack target intelligence 등 신규 키워드도 확인됩니다. Ref.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/23 The Massive, Hidden Infrastructure Enabling Big Game Hunting at Scale
참고로 동일한 그룹의 악성코드 타입은 FormBook QakBot RedLine 등 101개 종이 확인됩니다.
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Malware | 1 | ▲ new |
2 | Update | 1 | ▲ new |
3 | attack | 1 | ▲ new |
4 | target | 1 | ▲ new |
5 | SocGholish | 1 | ▲ new |
6 | Europe | 1 | ▲ new |
7 | intelligence | 1 | ▲ new |
8 | Government | 1 | ▲ new |
9 | 1 | ▲ new | |
10 | Advertising | 1 | ▲ new |
11 | Education | 1 | ▲ new |
12 | Browser | 1 | ▲ new |
13 | Chrome | 1 | ▲ new |
14 | Criminal | 1 | ▲ new |
15 | Kaspersky | 1 | ▲ new |
16 | Alureon | 1 | ▲ new |
17 | Recorded Future | 1 | ▲ new |
18 | Rhysida | 1 | ▲ new |
19 | Ransomware | 1 | ▲ new |
20 | Distribution | 1 | ▲ new |
21 | Victim | 1 | ▲ new |
22 | Cryptocurrency | 1 | ▲ new |
23 | United States | 1 | ▲ new |
24 | Campaign | 1 | ▲ new |
25 | Russia | 1 | ▲ new |
26 | Report | 1 | ▲ new |
27 | Rhysid | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
SocGholish |
|
1 (25%) |
Alureon |
|
1 (25%) |
Rhysida |
|
1 (25%) |
Ransomware |
|
1 (25%) |

Attacker & Actors
The status of the attacker or attack group being issued.
No data.

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Campaign |
|
1 (100%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
Europe |
|
1 (14.3%) |
Government |
|
1 (14.3%) |
|
1 (14.3%) | |
Kaspersky |
|
1 (14.3%) |
Recorded Future |
|
1 (14.3%) |
Malware Family
Top 5
A malware family is a group of applications with similar attack techniques.
In this trend, it is classified into Ransomware, Stealer, RAT or Backdoor, Loader, Botnet, Cryptocurrency Miner.
Threat info
Last 5SNS
(Total : 0)No data.
News
(Total : 1)Malware Update attack target SocGholish Europe intelligence Government Google Advertising Education Browser Chrome Criminal Kaspersky Alureon Recorded Future Rhysida Ransomware Distribution Victim Cryptocurrency United States Campaign Russia Report
No | Title | Date |
---|---|---|
1 | The Massive, Hidden Infrastructure Enabling Big Game Hunting at Scale - Malware.News | 2025.04.23 |
Additional information
No | Title | Date |
---|---|---|
1 | M-Trends 2025: Data, Insights, and Recommendations From the Frontlines - Malware.News | 2025.04.23 |
2 | Private: Stealing the Future: Infostealers Power Cybercrime in 2025 - Malware.News | 2025.04.23 |
3 | Changes to CVE program are a call to action on your AppSec strategy - Malware.News | 2025.04.23 |
4 | Alafia AI Puts a Supercomputer on Your Desk - Bloomberg Technology | 2025.04.23 |
5 | Verizon discovers spike in ransomware and exploited vulnerabilities - CyberScoop | 2025.04.23 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | The Massive, Hidden Infrastructure Enabling Big Game Hunting at Scale - Malware.News | 2025.04.23 |
2 | The Massive, Hidden Infrastructure Enabling Big Game Hunting at Scale - Malware.News | 2025.04.23 |
3 | The Massive, Hidden Infrastructure Enabling Big Game Hunting at Scale - Malware.News | 2025.04.23 |
4 | When the victimizers become the victims…. RansomHub the victim of a takeover? - Malware.News | 2025.04.08 |
5 | SocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware - Malware.News | 2025.03.14 |
View only the last 5 |
No | Category | URL | CC | ASN Co | Date |
---|---|---|---|---|---|
1 | c2 | https://kdqd.free.thebitmeister.com/orderReview | US ![]() | HostUS | 2025.02.19 |
2 | malicious | https://ywp.guide.borden-carleton.ca/orderReview | US ![]() | AS-COLOCROSSING | 2024.11.21 |
3 | malicious | https://xke.range.cccinvolve.org/orderReview | US ![]() | COGENT-174 | 2024.11.15 |
4 | malicious | https://jqpc.strategies.mvpstrat.com/orderReview | US ![]() | PONYNET | 2024.11.08 |
5 | malicious | https://huwst.range.cccinvolve.org/orderReview | CA ![]() | UNREAL-SERVERS | 2024.11.01 |
View only the last 5 |
No | URL | CC | ASN Co | Reporter | Date |
---|---|---|---|---|---|
1 | https://secure.gatecollegesystem.com/profileLayout SocGholish | US ![]() | AS-CHOOPA | Cryptolaemus1 | 2025.04.23 |
2 | https://cpanel.freein-deed.com/profileLayout SocGholish | CA ![]() | UNREAL-SERVERS | Cryptolaemus1 | 2025.04.22 |
3 | https://booking.driveawayrentals.com/profileLayout SocGholish | US ![]() | SHOCK-1 | Cryptolaemus1 | 2025.04.19 |
4 | https://www.purepassionwellness.com/profileLayout SocGholish | US ![]() | AS-CHOOPA | Cryptolaemus1 | 2025.04.18 |
5 | https://signin.certifiedbk.com/profileLayout SocGholish | RU ![]() | Flex Ltd. | Cryptolaemus1 | 2025.04.17 |
View only the last 5 |