Summary: 2025/05/04 09:42

First reported date: 2010/11/26
Inquiry period : 2025/04/04 09:42 ~ 2025/05/04 09:42 (1 months), 85 search results

전 기간대비 -15% 낮은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
target Linux RCE hijack Distribution 입니다.
악성코드 유형 BPFDoor TONESHELL XMRig 도 새롭게 확인됩니다.
공격자 Red Menshen 도 새롭게 확인됩니다.
공격기술 Spear Phishing Hijacking 도 새롭게 확인됩니다.
기관 및 기업 Egypt Zscaler 도 새롭게 확인됩니다.
기타 MUSTANG PANDA Controller 사용 Mustang ML 등 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/05/03 Venom Spider Uses Server-Side Polymorphism to Weave a Web Around Victims
    ㆍ 2025/05/02 SKT 해킹 배후에 중국 그림자?.. 악명 떨치는 중국계 해킹 조직들
    ㆍ 2025/05/01 Detailed Analysis of BPFDoor targeting South Korean Company

Trend graph by period


Related keyword cloud
Top 100

BackdoorMalwaretargetCampaignUpdateattackReportExploitLinuxChinaAdvertisingVulnerabilityUnited StatesSoftwareKasperskyVictimPhishingRCEintelligenceWindowsc&cMicrosofthijackDistributionGovernmentBPFDoorRussiaSouth KoreahackingIoCOperationEDRZeroDayCobalt StrikeTrojanGitHubSupply chainTONESHELLHong KongGameoverP2PMUSTANG PANDATaiwanCryptocurrency MinerEmailiotMWNEWSTwitterEgyptThreatpowershellRATLazarusfileIranAppleFortinetNetWireRCTrend MicroEducationCISAZscalerTelegramControllernpmDDoSXMRig사용Spear PhishingRSA ConferenceStealerCiscoRed MenshenMFAMustangAIWordPresspluginChineseaccessHijackingEuropeLinkedInCryptocurrencyNorth KoreaGoogleYesmattresssmart공격techiotsecurityresearcherJavamodelMLchainSupplyPebbleDashMicrosTrend
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
BPFDoor
8 (14.3%)
Trojan
6 (10.7%)
TONESHELL
5 (8.9%)
GameoverP2P
5 (8.9%)
Cryptocurrency Miner
5 (8.9%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Lazarus
4 (57.1%)
Red Menshen
3 (42.9%)
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Backdoor
85 (45%)
Campaign
25 (13.2%)
Exploit
16 (8.5%)
Phishing
12 (6.3%)
RCE
12 (6.3%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
China
15 (11.1%)
United States
14 (10.4%)
Kaspersky
12 (8.9%)
Microsoft
10 (7.4%)
Government
9 (6.7%)
Threat info
Last 5

SNS

(Total : 39)
  Total keyword

Backdoor target attack Update Malware Campaign China Phishing Fortinet Kaspersky Exploit iot Linux Trend Micro Cryptocurrency Miner Supply chain c&c RCE XMRig Telegram Russia apt Stealer Attacker hijack Victim BPFDoor Iran Chinese United States WordPress Japan Government Iranian CACTUS SocGholish plugin Email Cisco FakeCaptcha Lumma Botnet Trojan ...

No Title Date
1The Hacker News @TheHackersNews
???? Two years inside. Nation-state footprints. Critical infrastructure targeted. Fortinet links Iranian APT Lemon Sandstorm to a stealthy attack on a Middle East CNI (May '23–Feb '25). Used VPN exploits, chained proxies, 7 custom backdoors across 4 phases. Read this story ➡️ https://t.co/9QOUlV5C
2025.05.03
2Virus Bulletin @virusbtn
Trend Micro's Hara Hiroaki outlines recent modifications observed in Earth Kasha’s TTPs in its latest campaign, detected in March 2025, targeting Taiwan & Japan. The attack begins with a spear-phishing email that leads to a new version of the ANEL backdoor https://t.co/uPzsBAhS9A https://t.co/RZ
2025.05.02
3Cybernews @CyberNews
Mozilla has launched an online petition calling on governments to protect and secure personal information and privacy by rejecting encryption backdoors. #Mozilla #petition #government #privacy #encryption https://t.co/sjagM0Bf6Z
2025.05.02
4Virus Bulletin @virusbtn
Trustwave researchers observed a notable increase in NodeJS-based backdoor deployments across multiple malware campaigns, including KongTuke, Fake CAPTCHA schemes, Mispadu, and Lumma stealers. https://t.co/GdOaemuReO https://t.co/5ekJi09tCs
2025.05.01
5Threat Intelligence @threatintel
#ThreatProtection Trojanized Uyghur text editor used to spy on World Uyghur Congress via spoofed C2 domains. Read more about Symantec's protection: https://t.co/dhBDRSplRX #WUC #Backdoor #Phishing
2025.05.01

Additional information

Level Description
warning File has been identified by 24 AntiVirus engines on VirusTotal as malicious
watch Creates known Upatre files
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice One or more potentially interesting buffers were extracted
notice Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Queries for the computername
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path
info Uses Windows APIs to generate a cryptographic key
No data
No URL CC ASN Co Reporter Date
1http://92.41.52.166:8083/sshd
backdoor censys elf sshdkit
GB GBThreeDaveLikesMalwre2025.05.04
2http://134.35.31.210:8080/sshd
backdoor censys elf sshdkit
YE YE...DaveLikesMalwre2025.05.04
3http://120.61.29.97:2000/sshd
backdoor censys elf sshdkit
IN IN...DaveLikesMalwre2025.05.04
4http://59.182.123.229:2000/sshd
backdoor censys elf sshdkit
IN INDaveLikesMalwre2025.05.04
5http://86.150.68.246:82/sshd
backdoor censys elf sshdkit
GB GBBritish Telecommunications PLCDaveLikesMalwre2025.05.04
View only the last 5
Beta Service, If you select keyword, you can check detailed information.