Summary: 2025/05/05 03:07
First reported date: 2020/01/06
Inquiry period : 2025/04/05 03:07 ~ 2025/05/05 03:07 (1 months), 4 search results
전 기간대비 신규 트렌드를 보이고 있습니다.
악성코드 유형 RATel DYEPACK Lumma Ransomware Black Basta TrickBot GameoverP2P Entropy Vawtrak Clop 도 새롭게 확인됩니다.
공격기술 Campaign Phishing Exploit RCE 도 새롭게 확인됩니다.
기관 및 기업 Microsoft United States ESET Google Palo Alto Networks Oracle Russia Kaspersky 도 새롭게 확인됩니다.
기타 Copy-Paste Update Malware Advertising attack 등 신규 키워드도 확인됩니다.
The title ‘Copy-paste compromises’ is derived from the actor’s heavy use of tools copied almost identically from open source given by The Australian Government.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/28 Embracing the Future of Work with Innovations in Prisma SASE
ㆍ 2025/04/09 What’s Trending: Top Cyber Attacker Techniques, December 2024–February 2025
ㆍ 2025/04/08 “Invoke-Shadow” — Applying Jungian Psychology to Detection Engineering
Trend graph by period
Related keyword cloud
Top 100Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
RATel |
|
3 (25%) |
DYEPACK |
|
1 (8.3%) |
Lumma |
|
1 (8.3%) |
Ransomware |
|
1 (8.3%) |
Black Basta |
|
1 (8.3%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
Microsoft |
|
2 (20%) |
United States |
|
2 (20%) |
ESET |
|
1 (10%) |
|
1 (10%) | |
Palo Alto Networks |
|
1 (10%) |
Threat info
Last 5SNS
(Total : 1)News
(Total : 3)RATel Copy-Paste Malware Update Microsoft Advertising Browser Windows Phishing attack powershell Attacker Victim IoC United States Campaign Report Google DYEPACK Criminal Exploit Java VPN ESET TrickBot Oracle Email Palo Alto Networks ChatGPT Zero Trust Lumma RCE iCloud DLP Operation Password MFA Vulnerability Ransomware Software EDR GameoverP2P Entropy Vawtrak GitHub Twitter LinkedIn intelligence Red Team Black Basta Careto Clop Kaspersky Russia c&c
No | Title | Date |
---|---|---|
1 | Embracing the Future of Work with Innovations in Prisma SASE - Malware.News | 2025.04.28 |
2 | What’s Trending: Top Cyber Attacker Techniques, December 2024–February 2025 - Malware.News | 2025.04.09 |
3 | “Invoke-Shadow” — Applying Jungian Psychology to Detection Engineering - Malware.News | 2025.04.08 |
Additional information
No | Title | Date |
---|---|---|
1 | Threat Actors Attacking U.S. Citizens Via Social Engineering Attack - Malware.News | 2025.05.04 |
2 | 틱톡, 유럽 사용자 데이터 중국 전송.. 8000억대 벌금 - 시큐리티팩트 | 2025.05.03 |
3 | Saskatoon children’s hospital nurse unlawfully snooped on records of 314 patients: privacy report - Malware.News | 2025.05.03 |
4 | Dating app Raw exposed users’ location data and personal information - Malware.News | 2025.05.03 |
5 | Hacker hired Telangana man to courier threats to Star Health Insurance MD - Malware.News | 2025.05.03 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Embracing the Future of Work with Innovations in Prisma SASE - Malware.News | 2025.04.28 |
2 | Embracing the Future of Work with Innovations in Prisma SASE - Malware.News | 2025.04.28 |
3 | Embracing the Future of Work with Innovations in Prisma SASE - Malware.News | 2025.04.28 |
4 | What’s Trending: Top Cyber Attacker Techniques, December 2024–February 2025 - Malware.News | 2025.04.09 |
5 | What’s Trending: Top Cyber Attacker Techniques, December 2024–February 2025 - Malware.News | 2025.04.09 |
View only the last 5 |