Summary: 2025/04/17 15:46

First reported date: 2009/08/05
Inquiry period : 2025/03/18 15:46 ~ 2025/04/17 15:46 (1 months), 116 search results

전 기간대비 28% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
Browser Malware Update Chrome Google 입니다.
악성코드 유형 Black Basta 도 새롭게 확인됩니다.
공격기술 RCE 도 새롭게 확인됩니다.
기타 sophisticated SMB Kritische enterprise unknown 등 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/17 Hi, robot: Half of all internet traffic now automated
    ㆍ 2025/04/17 Exploiting SMS: Threat Actors Use Social Engineering to Target Companies
    ㆍ 2025/04/17 Advanced KQL Deep Dive: User State Change Tracking

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1Browser 116 ▲ 32 (28%)
2Malware 59 ▲ 9 (15%)
3Update 43 ▲ 13 (30%)
4Chrome 37 ▲ 23 (62%)
5Google 36 ▲ 14 (39%)
6Windows 35 ▲ 16 (46%)
7attack 34 ▲ 10 (29%)
8target 32 ▲ 11 (34%)
9Campaign 30 ▲ 3 (10%)
10Report 28 ▼ -1 (-4%)
11Exploit 25 ▲ 4 (16%)
12Microsoft 24 ▲ 8 (33%)
13Advertising 23 ▲ 2 (9%)
14Phishing 23 ▲ 3 (13%)
15Email 22 ▲ 3 (14%)
16Software 22 ▲ 3 (14%)
17Victim 21 ▲ 3 (14%)
18Stealer 20 ▲ 3 (15%)
19Vulnerability 18 ▲ 4 (22%)
20Criminal 18 ▼ -1 (-6%)
21United States 15 ▼ -5 (-33%)
22Remote Code Execution 14 ▼ -5 (-36%)
23Operation 14 ▲ 6 (43%)
24Password 14 ▲ 7 (50%)
25ZeroDay 13 ▲ 11 (85%)
26powershell 12 ▲ 6 (50%)
27Trojan 12 ▲ 4 (33%)
28IoC 12 ▼ -2 (-17%)
29Distribution 12 ▲ 6 (50%)
30Firefox 12 ▼ -3 (-25%)
31Kaspersky 11 - 0 (0%)
32threat 11 ▲ 7 (64%)
33c&c 10 ▼ -2 (-20%)
34intelligence 10 ▼ -1 (-10%)
35Microsoft Edge 9 ▲ 3 (33%)
36Russia 9 ▼ -2 (-22%)
37Android 8 ▼ -3 (-38%)
38Java 8 ▲ 1 (13%)
39Edge 8 ▲ 7 (88%)
40Ransomware 7 - 0 (0%)
41Linux 7 ▲ 1 (14%)
42Cryptocurrency 7 ▼ -3 (-43%)
43ChatGPT 7 ▲ 5 (71%)
44Apple 6 ▼ -4 (-67%)
45Government 6 ▼ -8 (-133%)
46Tor 6 ▲ 5 (83%)
47GameoverP2P 6 - 0 (0%)
48hijack 6 ▲ 3 (50%)
49GitHub 6 - 0 (0%)
50MFA 6 ▼ -3 (-50%)
51RCE 6 ▲ new
52payment 6 ▲ 2 (33%)
53Social Engineering 6 ▼ -1 (-17%)
54NetWireRC 6 ▼ -5 (-83%)
55RAT 6 - 0 (0%)
56WhatsApp 5 ▲ 3 (60%)
57VPN 5 ▼ -2 (-40%)
58MWNEWS 5 ▲ 4 (80%)
59Twitter 5 ▼ -4 (-80%)
60Takedown 5 ▲ 1 (20%)
61LinkedIn 5 ▼ -1 (-20%)
62Lumma 5 ▼ -2 (-40%)
63China 5 ▼ -1 (-20%)
64DarkWeb 4 ▲ 2 (50%)
65Tick 4 ▲ 2 (50%)
66fake 4 ▲ 2 (50%)
67RATel 4 ▲ 3 (75%)
68Telegram 4 ▼ -1 (-25%)
69VBScript 4 ▲ 2 (50%)
70Banking 4 ▼ -3 (-75%)
71mozilla 4 ▲ 1 (25%)
72sophisticated 4 ▲ new
73Education 4 ▼ -6 (-150%)
74account 4 ▲ 3 (75%)
75SMB 4 ▲ new
76Cloudflare 4 ▲ 2 (50%)
77taegliche 3 - 0 (0%)
78ThreatProtection 3 - 0 (0%)
79web 3 ▼ -2 (-67%)
80Endpoint 3 ▲ 1 (33%)
81NortonLifeLock 3 - 0 (0%)
82Black Basta 3 ▲ new
83Sicherheitsnews 3 - 0 (0%)
84AI 3 ▲ 2 (67%)
85Code 3 ▲ 1 (33%)
86Vawtrak 3 ▲ 2 (67%)
87IPS 3 ▲ 1 (33%)
88fingerprint 3 ▲ 2 (67%)
89last 3 ▲ 1 (33%)
90DYEPACK 3 - 0 (0%)
91amp 3 ▲ 1 (33%)
92Symantec 3 ▲ 1 (33%)
93malicious 3 ▼ -1 (-33%)
94Kritische 3 ▲ new
95Zusammenfassung 3 - 0 (0%)
96enterprise 3 ▲ new
97protection 3 ▲ 1 (33%)
98unknown 3 ▲ new
99googlechrome 3 ▲ new
100YouTube 3 - 0 (0%)
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
Trojan
12 (20%)
Ransomware
7 (11.7%)
GameoverP2P
6 (10%)
NetWireRC
6 (10%)
RAT
6 (10%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Tick
4 (100%)
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Campaign
30 (22.1%)
Exploit
25 (18.4%)
Phishing
23 (16.9%)
Stealer
20 (14.7%)
Remote Code Execution
14 (10.3%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
Google
36 (26.3%)
Microsoft
24 (17.5%)
United States
15 (10.9%)
Kaspersky
11 (8%)
Russia
9 (6.6%)
Threat info
Last 5

SNS

(Total : 31)
  Total keyword

Browser Chrome target Google attack Update Windows Malware Stealer Takedown Tor Symantec Campaign Apple Exploit Vulnerability ZeroDay Firefox Password MacOS IoC Email RAT Phishing Safari WhatsApp Report Cloudflare Fortinet plugin hijack powershell India Police GitHub Government VPN Advertising NetWireRC ...

No Title Date
1Microsoft Threat Intelligence @MsftSecIntel
@sherrod_im However, the QR code is used by WhatsApp to connect an account to a linked device and/or the WhatsApp Web portal. If the target follows the instructions on the page, the threat actor could gain access to messages in their WhatsApp account & exfiltrate data using browser plugins.
2025.04.16
2Dark Web Informer - Cyber Threat Intelligence @DarkWebInformer
????Tor Browser 14.5 has been released! Update!???? https://t.co/eKBLwkcgFp
2025.04.16
3Yogesh Londhe @suyog41
Banshee Stealer Safari_Browser_2.45.dmg 1d96e46f60f297e1e520af4ec7d0e895 olaiokejk-oikeja 37127f6ea5453f025b1727f565107545 #Banshee #Stealer #MAC #IOC https://t.co/rphCN7rNsh
2025.04.15
4Virus Bulletin @virusbtn
Kadji's Nick Zolotko, Christopher Lopez & Adam Kohler investigate suspicious macOS cases used to capture data from macOS systems and applications, including WeChat, QQ, web browsers, email, etc. https://t.co/Ne0faplLpf https://t.co/xoCXS8LR9j
2025.04.15
5The Hacker News @TheHackersNews
???? Your biggest enterprise risk might be hiding in plain sight — THE BROWSER EXTENSIONS. ???? 99% of employees use them ???? 53% access sensitive data ???? 54% have unknown publishers ???? Your entire org could be one extension away from compromise. ???? Act now → Audit, assess, and https://t.c
2025.04.15

Additional information

No Request Hash(md5) Report No Date
1 remcos_a.exe
Client SW User Data Stealer Backdoor RemcosRAT Browser Login Data Stealer browser info stealer Generic Malware Google Chrome User Data Downloader Malicious Library Malicious Packer UPX Create Service Socket Escalate priviledges PWS Sniff Audio DNS Interne
e3aecc3188eac24edb8e34f5044b3a6a589982025.04.14
2 pdf.ps1
Client SW User Data Stealer Backdoor RemcosRAT browser info stealer Hide_EXE Generic Malware Google Chrome User Data Downloader Malicious Library .NET framework(MSIL) Antivirus Create Service Socket ScreenShot Escalate priviledges PWS Sniff Audio DNS Inte
642647cf863119977d7bd52e848e0cfe583952025.03.31
3 kent.ps1
Client SW User Data Stealer Backdoor RemcosRAT Formbook browser info stealer Hide_EXE Generic Malware Google Chrome User Data Downloader Malicious Library Confuser .NET Antivirus Create Service Socket ScreenShot Escalate priviledges PWS Sniff Audio DNS Co
432719ce1459add67ebe4c01b47310f2580592025.03.13
4 nyoilsafkjawd.exe
Client SW User Data Stealer Backdoor RemcosRAT Browser Login Data Stealer browser info stealer Generic Malware Google Chrome User Data Downloader Malicious Library Malicious Packer UPX Create Service Socket ScreenShot Escalate priviledges PWS Sniff Audio
0bea38a3f664f5c8d72ab74db022aacd580452025.03.12
5 crossings.exe
Client SW User Data Stealer Backdoor RemcosRAT Browser Login Data Stealer browser info stealer Generic Malware Google Chrome User Data Downloader Malicious Library Malicious Packer UPX Create Service Socket ScreenShot Escalate priviledges PWS Sniff Audio
db59bfef32bc15d53bdf499dd1ae62c4580442025.03.12
View only the last 5
Level Description
danger File has been identified by 66 AntiVirus engines on VirusTotal as malicious
danger The process wscript.exe wrote an executable file to disk which it then attempted to execute
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
danger Executed a process and injected code into it
warning Disables Windows Security features
watch Communicates with host for which no DNS query was performed
watch Installs itself for autorun at Windows startup
watch One or more non-whitelisted processes were created
watch Potential code injection by writing to the memory of another process
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
notice A process attempted to delay the analysis task.
notice A process created a hidden window
notice Checks whether any human activity is being performed by constantly checking whether the foreground window changed
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops a binary and executes it
notice Drops an executable to the user AppData folder
notice One or more potentially interesting buffers were extracted
notice Terminates another process
notice Uses Windows utilities for basic Windows functionality
notice Yara rule detected in process memory
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Command line console output was observed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
No data
No data
Beta Service, If you select keyword, you can check detailed information.