Summary: 2025/05/01 03:42
First reported date: 2015/11/30
Inquiry period : 2025/04/01 03:42 ~ 2025/05/01 03:42 (1 months), 8 search results
전 기간대비 동일한 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 attack Software Email TI Phishing 입니다.
악성코드 유형 RAT Cryptocurrency Miner Mirai Botnet NetWireRC 도 새롭게 확인됩니다.
공격기술 RCE Spear Phishing DDoS Stealer 도 새롭게 확인됩니다.
기관 및 기업 ESET 도 새롭게 확인됩니다.
기타 ZeroDay XDR RUNs SDK Vulnerability 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/24 ANY.RUN Becomes a Gold Winner in Threat Intelligence at Globee Awards 2025
ㆍ 2025/04/23 How Threat Intelligence Feeds Help During Incident Response
ㆍ 2025/04/17 Seamlessly Integrate ANY.RUN’s Services into Your Infrastructure via SDK
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Any | 8 | - 0 (0%) |
2 | attack | 5 | ▲ 1 (20%) |
3 | intelligence | 5 | ▼ -2 (-40%) |
4 | Malware | 5 | ▼ -2 (-40%) |
5 | IoC | 4 | ▼ -2 (-50%) |
6 | target | 4 | ▼ -2 (-50%) |
7 | Software | 4 | ▲ 1 (25%) |
8 | Update | 4 | - 0 (0%) |
9 | Windows | 4 | ▼ -2 (-50%) |
10 | Linux | 4 | ▼ -2 (-50%) |
11 | 3 | ▲ 2 (67%) | |
12 | TI | 3 | ▲ 2 (67%) |
13 | Campaign | 3 | - 0 (0%) |
14 | RUN | 3 | ▼ -2 (-67%) |
15 | Phishing | 3 | ▲ 1 (33%) |
16 | Lookup | 2 | ▲ 1 (50%) |
17 | Report | 2 | ▼ -2 (-100%) |
18 | threat | 2 | ▲ 1 (50%) |
19 | United States | 2 | - 0 (0%) |
20 | Advertising | 2 | ▼ -1 (-50%) |
21 | c&c | 2 | ▲ 1 (50%) |
22 | ZeroDay | 2 | ▲ new |
23 | Android | 2 | ▲ 1 (50%) |
24 | XDR | 1 | ▲ new |
25 | RUNs | 1 | ▲ new |
26 | SDK | 1 | ▲ new |
27 | Vulnerability | 1 | ▲ new |
28 | GitHub | 1 | - 0 (0%) |
29 | Exploit Kit | 1 | ▲ new |
30 | YARA | 1 | ▲ new |
31 | Yo | 1 | ▲ new |
32 | powershell | 1 | - 0 (0%) |
33 | Ransomware | 1 | - 0 (0%) |
34 | Exploit | 1 | - 0 (0%) |
35 | Trojan | 1 | - 0 (0%) |
36 | Education | 1 | - 0 (0%) |
37 | RCE | 1 | ▲ new |
38 | Operation | 1 | ▼ -2 (-200%) |
39 | Spear Phishing | 1 | ▲ new |
40 | Feeds | 1 | ▲ new |
41 | Microsoft | 1 | - 0 (0%) |
42 | dataprivacy | 1 | ▲ new |
43 | documents | 1 | ▲ new |
44 | sensitive | 1 | ▲ new |
45 | Suricata | 1 | ▲ new |
46 | CHM | 1 | ▲ new |
47 | RAT | 1 | ▲ new |
48 | SHODAN | 1 | ▲ new |
49 | dm | 1 | ▲ new |
50 | Premium | 1 | ▲ new |
51 | DDoS | 1 | ▲ new |
52 | Cryptocurrency Miner | 1 | ▲ new |
53 | Forensics | 1 | - 0 (0%) |
54 | YouTube | 1 | ▲ new |
55 | Victim | 1 | - 0 (0%) |
56 | Mirai | 1 | ▲ new |
57 | Stealer | 1 | ▲ new |
58 | Ubuntu | 1 | ▲ new |
59 | Botnet | 1 | ▲ new |
60 | Takedown | 1 | - 0 (0%) |
61 | Password | 1 | ▲ new |
62 | Sandbox | 1 | - 0 (0%) |
63 | ESET | 1 | ▲ new |
64 | detection | 1 | ▲ new |
65 | cant | 1 | ▲ new |
66 | FrostyNeighbor | 1 | ▲ new |
67 | NetWireRC | 1 | ▲ new |
68 | GhostRAT | 1 | ▲ new |
69 | Malicious Traffic | 1 | ▲ new |
70 | Vawtrak | 1 | - 0 (0%) |
71 | Defender | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Ransomware |
|
1 (12.5%) |
Trojan |
|
1 (12.5%) |
RAT |
|
1 (12.5%) |
Cryptocurrency Miner |
|
1 (12.5%) |
Mirai |
|
1 (12.5%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Campaign |
|
3 (27.3%) |
Phishing |
|
3 (27.3%) |
Exploit |
|
1 (9.1%) |
RCE |
|
1 (9.1%) |
Spear Phishing |
|
1 (9.1%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
United States |
|
2 (50%) |
Microsoft |
|
1 (25%) |
ESET |
|
1 (25%) |
Threat info
Last 5SNS
(Total : 3)News
(Total : 5)intelligence Malware attack Update target Windows Linux IoC Software Email Campaign Phishing Android c&c ZeroDay Advertising Report United States Spear Phishing GitHub XDR Exploit Kit Vulnerability Ransomware Operation RCE Attacker powershell Education Exploit DDoS Botnet Forensics YouTube Victim Mirai Stealer Ubuntu SHODAN Password Trojan Cryptocurrency Miner NetWireRC Malicious Traffic Vawtrak Takedown RAT
No | Title | Date |
---|---|---|
1 | ANY.RUN Becomes a Gold Winner in Threat Intelligence at Globee Awards 2025 - Malware.News | 2025.04.24 |
2 | How Threat Intelligence Feeds Help During Incident Response - Malware.News | 2025.04.23 |
3 | Seamlessly Integrate ANY.RUN’s Services into Your Infrastructure via SDK - Malware.News | 2025.04.17 |
4 | Malware Signatures: How Cybersecurity Teams Use Them to Catch Threats - Malware.News | 2025.04.15 |
5 | How to Hunt and Investigate Linux Malware - Malware.News | 2025.04.02 |
Additional information
No | Title | Date |
---|---|---|
1 | New platform automates malware threat response - Malware.News | 2025.05.01 |
2 | Exploits still top entry point, says Mandiant report - Malware.News | 2025.05.01 |
3 | Detailed Analysis of BPFDoor targeting South Korean Company - Malware.News | 2025.05.01 |
4 | Researchers Demonstrate How MCP Prompt Injection Can Be Used for Both Attack and Defense - The Hacker News | 2025.05.01 |
5 | Nvidia CEO on Tariffs, AI Chips, China Competition - Bloomberg Technology | 2025.04.30 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | How We Enrich TI Lookup and Feeds with Fresh Threat Data from 15,000 Organizations - Malware.News | 2025.03.27 |
2 | How We Enrich TI Lookup and Feeds with Fresh Threat Data from 15,000 Organizations - Malware.News | 2025.03.27 |
3 | Expose Android Malware in Seconds: ANY.RUN Sandbox Now Supports Real-Time APK Analysis - Malware.News | 2025.03.18 |
4 | I Used a Sandbox to Strengthen Bank’s Security—Here’s How It Worked - Malware.News | 2025.02.11 |
5 | Instant URL Analysis: Use Safebrowsing via ANY.RUN’s Extension - Malware.News | 2025.02.06 |
View only the last 5 |