Summary: 2025/04/18 11:22

First reported date: 2012/03/26
Inquiry period : 2025/03/19 11:22 ~ 2025/04/18 11:22 (1 months), 60 search results

전 기간대비 8% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
APT Campaign Malware group North Korea 입니다.
악성코드 유형 GraphicalNeutrino ShadowPad Ransomware 도 새롭게 확인됩니다.
공격자 APT29 SideCopy 도 새롭게 확인됩니다.
공격기술 Downloader 도 새롭게 확인됩니다.
기관 및 기업 Europe ESET Ucraina 북한 SECUI Ukraine Google Check Point 도 새롭게 확인됩니다.
기타 March flaw Seqrite ToddyCat Labs 등 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/15 Renewed APT29 Phishing Campaign Against European Diplomats
    ㆍ 2025/04/10 March 2025 APT Group Trends (South Korea)
    ㆍ 2025/04/09 March 2025 APT Group Trends (South Korea)

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1APT 60 ▲ 5 (8%)
2Campaign 52 ▲ 7 (13%)
3Malware 14 ▲ 1 (7%)
4group 13 ▲ 6 (46%)
5North Korea 12 ▲ 5 (42%)
6target 12 - 0 (0%)
7DPRK 11 ▲ 4 (36%)
8Exploit 10 ▲ 7 (70%)
9Report 9 - 0 (0%)
10cti 8 ▲ 6 (75%)
11Konni 7 ▲ 5 (71%)
12IoC 6 ▲ 1 (17%)
13South Korea 6 ▲ 4 (67%)
14Kimsuky 6 ▲ 5 (83%)
15China 6 ▼ -6 (-100%)
16attack 6 ▼ -2 (-33%)
17Lazarus 5 ▲ 1 (20%)
18file 5 ▲ 4 (80%)
19hacking 5 ▼ -2 (-40%)
20Phishing 5 ▲ 1 (20%)
21Kaspersky 4 - 0 (0%)
22Europe 4 ▲ new
23NortonLifeLock 4 ▲ 3 (75%)
24Backdoor 4 ▲ 1 (25%)
25APT29 4 ▲ new
26GraphicalNeutrino 4 ▲ new
27ThreatProtection 4 ▲ 3 (75%)
28ESET 4 ▲ new
29Government 4 ▼ -1 (-25%)
30AhnLab 4 ▲ 2 (50%)
31securityaffairs 4 ▼ -3 (-75%)
32South 3 ▲ 1 (33%)
33lnk 3 ▲ 2 (67%)
34Update 3 ▲ 2 (67%)
35Korea 3 - 0 (0%)
36Russia 3 - 0 (0%)
37March 3 ▲ new
38flaw 3 ▲ new
39Seqrite 2 ▲ new
40ToddyCat 2 ▲ new
41Labs 2 ▲ new
42Ucraina 2 ▲ new
43ShadowPad 2 ▲ new
44Check 2 ▲ new
45북한 2 ▲ new
46SECUI 2 ▲ new
47SideWinder 2 ▼ -3 (-150%)
48보고서 2 ▲ new
49Ukraine 2 ▲ new
50Research 2 ▲ new
51Russian 2 ▲ new
52그룹 2 ▲ new
53c&c 2 ▼ -1 (-50%)
54name 2 ▲ new
55C2 2 ▼ -1 (-50%)
56flaxtyphoon 2 ▲ new
57Point 2 ▲ new
58RokRAT 2 ▲ 1 (50%)
59United States 2 ▲ 1 (50%)
60Panda 2 ▲ new
61ZeroDay 2 ▲ new
62Chrome 2 ▲ new
63Google 2 ▲ new
64Operation 2 ▲ new
65ForumTroll 2 ▲ new
66Classifying 2 ▲ new
67Practical 2 ▲ new
68Ransomware 2 ▲ new
69Education 2 ▲ new
70APT37 2 ▼ -3 (-150%)
71Challenges 2 ▲ new
72Windows 2 ▲ new
73Check Point 2 ▲ new
74Rogues 1 ▲ new
75자료 1 - 0 (0%)
76疑似Kimsuky 1 ▲ new
77APTQ 1 - 0 (0%)
78Against 1 ▲ new
79European 1 ▲ new
80MFA 1 - 0 (0%)
81Diplomats 1 ▲ new
82ad906427ef88f5d55b9ff8d363b6c3bdb34aaef2b1b980f3950e424370893cff 1 ▲ new
83uncovered 1 ▲ new
84AhnLabSecuInfo 1 ▲ new
85SideCopy 1 ▲ new
86Pakistanlinked 1 ▲ new
87plugin 1 ▲ new
88출처 1 ▲ new
89해명 1 ▲ new
90RedDrip 1 ▼ -1 (-100%)
91자금 1 ▲ new
92미신 1 ▲ new
93boring 1 ▲ new
94Fritillary 1 ▲ new
95Downloader 1 ▲ new
96Targeting 1 ▲ new
97hexe 1 ▲ new
98DLL 1 ▲ new
99recent 1 ▲ new
100Malicious 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
Konni
7 (38.9%)
GraphicalNeutrino
4 (22.2%)
ShadowPad
2 (11.1%)
RokRAT
2 (11.1%)
Ransomware
2 (11.1%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Kimsuky
6 (33.3%)
Lazarus
5 (27.8%)
APT29
4 (22.2%)
APT37
2 (11.1%)
SideCopy
1 (5.6%)
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
APT
60 (43.8%)
Campaign
52 (38%)
Exploit
10 (7.3%)
hacking
5 (3.6%)
Phishing
5 (3.6%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
North Korea
12 (15.4%)
DPRK
11 (14.1%)
South Korea
6 (7.7%)
China
6 (7.7%)
Kaspersky
4 (5.1%)
Threat info
Last 5

Additional information

Level Description
danger File has been identified by 56 AntiVirus engines on VirusTotal as malicious
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice The binary likely contains encrypted or compressed data indicative of a packer
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path
No Category URL CC ASN Co Date
1c2http://00701111.000webhostapp.com/wp-extra/show.phpUS US...2023.09.18
No URL CC ASN Co Reporter Date
1https://jpkinki.com/fjugm
APT Kimsuky
US USCLOUDFLARENETIdaNotPro2025.03.26
2https://www.dropbox.com/scl/fi/cnfhxf0nc3qxfklznh5na/zzJG_2.zip?rlkey=7t1et81enar4uvbb7nnk58m9b&st=2...
APT Kimsuky zip
US USDROPBOXabuse_ch2025.02.12
3https://www.dropbox.com/scl/fi/icvpzbx4vn6lcthva168z/zzJG.zip?rlkey=kntc36792grkm64xriqputbdq&st=px5...
APT Kimsuky
US USDROPBOXJAMESWT_MHT2025.02.05
4https://liuyi.neectar.info/hsdverd_3ed5d/mdswsourt_4rfs
APT decoy Patchwork PDF
GB GBabuse_ch2025.01.22
5https://liuyi.neectar.info/lksderdd_4dferd/jhdfer3s_jh3de
APT exe Patchwork rustystealer
GB GBabuse_ch2025.01.22
View only the last 5
Beta Service, If you select keyword, you can check detailed information.