Summary: 2025/04/19 11:22
First reported date: 2007/12/04
Inquiry period : 2025/03/20 11:22 ~ 2025/04/19 11:22 (1 months), 17 search results
전 기간대비 -235% 낮은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 Linux Mirai Advertising Cryptocurrency Cryptocurrency Miner 입니다.
악성코드 유형 SmokeLoader BumbleBee Pikabot TrickBot IcedID RATel 도 새롭게 확인됩니다.
공격기술 Hijacking RCE 도 새롭게 확인됩니다.
기관 및 기업 US South Korea 도 새롭게 확인됩니다.
기타 arrest GorillaBot SSH Outlaw ALERT 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/10 Operation Endgame follow-up cracks down on Smokeloader botnet
ㆍ 2025/04/10 Europol Arrests Five SmokeLoader Clients Linked by Seized Database Evidence
ㆍ 2025/04/03 Additional details on Outlaw Linux cryptomining botnet emerge
참고로 동일한 그룹의 악성코드 타입은 PingPull Prometei Mirai 등 9개 종이 확인됩니다.
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Botnet | 17 | ▼ -40 (-235%) |
2 | Malware | 11 | ▼ -12 (-109%) |
3 | target | 7 | ▼ -2 (-29%) |
4 | attack | 6 | ▼ -12 (-200%) |
5 | Linux | 6 | ▲ 5 (83%) |
6 | Mirai | 4 | ▲ 3 (75%) |
7 | Advertising | 4 | ▲ 1 (25%) |
8 | DDoS | 4 | ▼ -4 (-100%) |
9 | United States | 4 | ▼ -1 (-25%) |
10 | Report | 4 | ▼ -7 (-175%) |
11 | Remote Code Execution | 3 | ▼ -5 (-167%) |
12 | Operation | 3 | ▼ -3 (-100%) |
13 | Cryptocurrency | 3 | ▲ 2 (67%) |
14 | IoC | 3 | ▼ -1 (-33%) |
15 | Cryptocurrency Miner | 3 | ▲ 2 (67%) |
16 | Phishing | 3 | ▼ -2 (-67%) |
17 | Hijacking | 2 | ▲ new |
18 | hijack | 2 | ▲ 1 (50%) |
19 | DarkWeb | 2 | ▼ -2 (-100%) |
20 | SmokeLoader | 2 | ▲ new |
21 | arrest | 2 | ▲ new |
22 | GorillaBot | 2 | ▲ new |
23 | SSH | 2 | ▲ new |
24 | intelligence | 2 | ▼ -5 (-250%) |
25 | Windows | 2 | - 0 (0%) |
26 | Government | 2 | ▼ -2 (-100%) |
27 | Exploit | 2 | ▼ -6 (-300%) |
28 | Outlaw | 2 | ▲ new |
29 | Criminal | 2 | ▼ -3 (-150%) |
30 | Campaign | 2 | ▼ -5 (-250%) |
31 | c&c | 2 | ▼ -3 (-150%) |
32 | Software | 2 | - 0 (0%) |
33 | Victim | 2 | - 0 (0%) |
34 | 2 | ▼ -2 (-100%) | |
35 | Stealer | 2 | ▲ 1 (50%) |
36 | Update | 1 | ▼ -8 (-800%) |
37 | Distribution | 1 | ▼ -2 (-200%) |
38 | ALERT | 1 | ▲ new |
39 | Sandbox | 1 | ▲ new |
40 | ANY | 1 | ▲ new |
41 | TI | 1 | ▲ new |
42 | Lookup | 1 | ▲ new |
43 | Password | 1 | ▼ -9 (-900%) |
44 | SHODAN | 1 | - 0 (0%) |
45 | flaxtyphoon | 1 | ▲ new |
46 | Ubuntu | 1 | ▲ new |
47 | YouTube | 1 | ▲ new |
48 | US | 1 | ▲ new |
49 | Forensics | 1 | ▲ new |
50 | Stressor | 1 | ▲ new |
51 | Claims | 1 | ▼ -1 (-100%) |
52 | tool | 1 | ▲ new |
53 | TeamR | 1 | ▲ new |
54 | mining | 1 | ▲ new |
55 | RCE | 1 | ▲ new |
56 | Targets | 1 | ▼ -1 (-100%) |
57 | followup | 1 | ▲ new |
58 | Evidence | 1 | ▲ new |
59 | Endgame | 1 | ▲ new |
60 | BumbleBee | 1 | ▲ new |
61 | Pikabot | 1 | ▲ new |
62 | Flax | 1 | ▲ new |
63 | TrickBot | 1 | ▲ new |
64 | Typhoon | 1 | ▲ new |
65 | SystemBC | 1 | - 0 (0%) |
66 | IcedID | 1 | ▲ new |
67 | mid | 1 | ▲ new |
68 | Database | 1 | ▲ new |
69 | Additional | 1 | ▲ new |
70 | Seized | 1 | ▲ new |
71 | Africa | 1 | ▼ -1 (-100%) |
72 | Europol | 1 | ▲ new |
73 | South Korea | 1 | ▲ new |
74 | XorDDoS | 1 | ▲ new |
75 | DVR | 1 | ▲ new |
76 | TVT | 1 | ▲ new |
77 | surge | 1 | ▲ new |
78 | Variant | 1 | ▼ -2 (-200%) |
79 | emerge | 1 | ▲ new |
80 | Cobalt Strike | 1 | - 0 (0%) |
81 | Dropper | 1 | - 0 (0%) |
82 | Unparalleled | 1 | ▲ new |
83 | Badbox | 1 | ▼ -3 (-300%) |
84 | packet | 1 | ▲ new |
85 | C2 | 1 | - 0 (0%) |
86 | Kubernetes | 1 | ▲ new |
87 | Honeynet | 1 | - 0 (0%) |
88 | Education | 1 | ▲ new |
89 | 1 | - 0 (0%) | |
90 | RATel | 1 | ▲ new |
91 | infizierte | 1 | ▲ new |
92 | Eine | 1 | ▲ new |
93 | Million | 1 | - 0 (0%) |
94 | C | 1 | ▲ new |
95 | analysis | 1 | ▲ new |
96 | Spear Phishing | 1 | - 0 (0%) |
97 | Trojan | 1 | ▼ -2 (-200%) |
98 | 1 | ▼ -3 (-300%) | |
99 | Browser | 1 | ▼ -1 (-100%) |
100 | Opera | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Botnet |
|
17 (50%) |
Mirai |
|
4 (11.8%) |
Cryptocurrency Miner |
|
3 (8.8%) |
SmokeLoader |
|
2 (5.9%) |
BumbleBee |
|
1 (2.9%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
DDoS |
|
4 (17.4%) |
Remote Code Execution |
|
3 (13%) |
Phishing |
|
3 (13%) |
Hijacking |
|
2 (8.7%) |
hijack |
|
2 (8.7%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
United States |
|
4 (25%) |
Government |
|
2 (12.5%) |
US |
|
1 (6.3%) |
Africa |
|
1 (6.3%) |
South Korea |
|
1 (6.3%) |
Malware Family
Top 5
A malware family is a group of applications with similar attack techniques.
In this trend, it is classified into Ransomware, Stealer, RAT or Backdoor, Loader, Botnet, Cryptocurrency Miner.
Threat info
Last 5SNS
(Total : 8)botnet DDoS Malware Hijacking Mirai Exploit United States Government hijack DarkWeb Linux target RCE attack Docker DVR US Report South Korea Africa Distribution Advertising Android Dropper Java Interception USA Operation
News
(Total : 9)Botnet Malware target attack Linux Remote Code Execution Cryptocurrency Miner Phishing IoC Cryptocurrency Advertising Report Software SmokeLoader Operation Mirai Windows Email arrest intelligence Campaign c&c Stealer Criminal Victim United States Update Password SHODAN YouTube Ubuntu Forensics DDoS Cobalt Strike BumbleBee Pikabot TrickBot SystemBC IcedID Kaspersky Google Spear Phishing Trojan Browser RATel Opera Microsoft Edge Chrome Discord Telegram Microsoft LinkedIn WAF Attacker IoT Takedown GitHub China North Korea VMware Russia Education PIZZO SPIDER C2 Kubernetes Honeynet
No | Title | Date |
---|---|---|
1 | Operation Endgame follow-up cracks down on Smokeloader botnet - Malware.News | 2025.04.10 |
2 | Europol Arrests Five SmokeLoader Clients Linked by Seized Database Evidence - The Hacker News | 2025.04.10 |
3 | Additional details on Outlaw Linux cryptomining botnet emerge - Malware.News | 2025.04.03 |
4 | How to Hunt and Investigate Linux Malware - Malware.News | 2025.04.02 |
5 | Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers - The Hacker News | 2025.04.02 |
Additional information
No | Title | Date |
---|---|---|
1 | Tesla to Delay Production of Cheaper EVs, Reuters Reports - Bloomberg Technology | 2025.04.19 |
2 | When Vulnerability Information Flows are Vulnerable Themselves - Malware.News | 2025.04.19 |
3 | CISA warns threat hunting staff of end to Google, Censys contracts as agency cuts set in - Malware.News | 2025.04.19 |
4 | Radiology practice reportedly working with FBI after ‘data security incident’ - Malware.News | 2025.04.19 |
5 | Text scams grow to steal hundreds of millions of dollars - Malware.News | 2025.04.19 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Identifying Device vendors behind connections attempts based on MAC Addresses - Malware.News | 2025.03.27 |
2 | SVC New Stealer on the Horizon - Malware.News | 2025.03.21 |
3 | SVC New Stealer on the Horizon - Malware.News | 2025.03.21 |
4 | Monthly Threat Actor Group Intelligence Report, January 2025 (JPN) - Malware.News | 2025.03.17 |
5 | Monthly Threat Actor Group Intelligence Report, January 2025 (JPN) - Malware.News | 2025.03.17 |
View only the last 5 |
No | Request | Hash(md5) | Report No | Date |
---|---|---|---|---|
1 | http://190.109.236.187:37981/i Eir D1000 routers Vulnerability Mozi Botnet IoT AntiDebug AntiVM ELF | eec5c6c219535fba3a0492ea8118b397 | 38886 | 2023.03.05 |
2 | http://182.116.103.159:45110/i Eir D1000 routers Vulnerability Mozi Botnet IoT AntiDebug AntiVM ELF | eec5c6c219535fba3a0492ea8118b397 | 38896 | 2023.03.05 |
3 | http://136.175.70.129:45330/mo... PWS[m] Mozi Botnet IoT Downloader UPX Create Service DGA Socket ScreenShot DNS Internet API Code injection Hijack Network Sniff Audio HTTP Steal credential KeyLogger P2P Escalate priviledges persistence FTP Http API AntiDebug AntiVM MSOffice File ELF | 59ce0baba11893f90527fc951ac69912 | 38947 | 2023.03.05 |
4 | http://46.100.59.70:53005/.i Hajime Botnet IoT AntiDebug AntiVM ELF | 9b6c3518a91d23ed77504b5416bfb5b3 | 38700 | 2023.03.05 |
5 | http://163.182.232.65:48836/i Mozi Botnet IoT UPX AntiDebug AntiVM ELF | 59ce0baba11893f90527fc951ac69912 | 38703 | 2023.03.05 |
View only the last 5 |
Level | Description |
---|---|
watch | Communicates with host for which no DNS query was performed |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | An application raised an exception which may be indicative of an exploit crash |
notice | Performs some HTTP requests |
notice | Uses Windows utilities for basic Windows functionality |
notice | Yara rule detected in process memory |
info | One or more processes crashed |
Network | ET POLICY Executable and linking format (ELF) file download |
No | Category | URL | CC | ASN Co | Date |
---|---|---|---|---|---|
1 | c2 | http://f.codingdrunk.cc/ | SG ![]() | AS-CHOOPA | 2023.10.06 |
2 | c2 | http://sms.codingdrunk.cc/ | 2023.10.06 | ||
3 | c2 | http://fuckyounigger.8x19.com/ | 2023.03.20 |
No | URL | CC | ASN Co | Reporter | Date |
---|---|---|---|---|---|
1 | http://196.189.108.143:38244/Mozi.m botnet iot Mozi | ET ![]() | ... | iLikeMalware | 2025.04.17 |
2 | http://177.92.240.168:52658/Mozi.m botnet iot Mozi | BR ![]() | ... | iLikeMalware | 2025.04.17 |
3 | http://222.127.237.115:52061/Mozi.m botnet iot mirai Mozi | PH ![]() | Globe Telecom Inc. | iLikeMalware | 2025.04.16 |
4 | http://138.204.196.254:60966/Mozi.m botnet iot mirai Mozi | BR ![]() | IUB Telecom Ltda | iLikeMalware | 2025.04.16 |
5 | http://77.247.88.103:33472/Mozi.m botnet Mozi | AL ![]() | Tele.Co.Albania SHPK | iLikeMalware | 2025.04.15 |
View only the last 5 |