Summary: 2025/04/18 11:20

First reported date: 2011/08/10
Inquiry period : 2025/03/19 11:20 ~ 2025/04/18 11:20 (1 months), 37 search results

전 기간대비 38% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
DNS Malware Phishing attack Report 입니다.
악성코드 유형 Anchor 도 새롭게 확인됩니다.
공격자 Anonymous 도 새롭게 확인됩니다.
기관 및 기업 NSA Australia FBI Government VirusTotal Canada Ucraina Germany Banking SentinelOne 도 새롭게 확인됩니다.
기타 Fast Flux Meerkat Morphing Infoblox 등 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/18 Microsoft’s Secure by Design journey: One year of success
    ㆍ 2025/04/15 Kubernetes Threat Hunting using API Server Audit Logs
    ㆍ 2025/04/12 Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1DNS 37 ▲ 14 (38%)
2Malware 22 ▲ 5 (23%)
3Phishing 17 ▲ 15 (88%)
4attack 14 ▲ 7 (50%)
5Report 14 ▲ 7 (50%)
6Exploit 13 ▲ 5 (38%)
7United States 12 ▲ 3 (25%)
8Update 11 ▲ 2 (18%)
9target 10 ▲ 2 (20%)
10intelligence 10 ▲ 5 (50%)
11Remote Code Execution 9 ▼ -1 (-11%)
12Campaign 8 ▲ 2 (25%)
13c&c 8 ▲ 7 (88%)
14Advertising 8 - 0 (0%)
15Email 7 ▲ 6 (86%)
16Victim 7 ▲ 3 (43%)
17CISA 6 ▲ 5 (83%)
18Fast 6 ▲ new
19Software 6 ▲ 2 (33%)
20Windows 6 ▲ 1 (17%)
21GitHub 6 ▲ 2 (33%)
22RCE 6 ▲ 5 (83%)
23Flux 6 ▲ new
24Vulnerability 6 ▲ 1 (17%)
25Telegram 5 ▲ 4 (80%)
26Microsoft 5 ▼ -1 (-20%)
27IoC 5 ▲ 3 (60%)
28Google 4 ▲ 3 (75%)
29Meerkat 4 ▲ new
30Morphing 4 ▲ new
31Operation 4 ▼ -1 (-25%)
32NSA 4 ▲ new
33hacking 4 ▲ 3 (75%)
34GameoverP2P 3 ▲ 1 (33%)
35Infoblox 3 ▲ new
36DYEPACK 3 ▲ 2 (67%)
37Distribution 3 - 0 (0%)
38Backdoor 3 ▲ 2 (67%)
39powershell 3 ▲ 1 (33%)
40LinkedIn 3 - 0 (0%)
41Threat 3 ▲ new
42MX 3 ▲ new
43Australia 3 ▲ new
44Ransomware 3 - 0 (0%)
45Linux 3 ▼ -3 (-100%)
46Ubuntu 3 ▲ 2 (67%)
47Cloudflare 3 ▲ 1 (33%)
48Zero Trust 3 ▲ 2 (67%)
49Education 3 ▲ 1 (33%)
50FBI 3 ▲ new
51Government 2 ▲ new
52Twitter 2 ▼ -1 (-50%)
53DDoS 2 ▼ -1 (-50%)
54Honeynet 2 ▲ new
55VirusTotal 2 ▲ new
56IPv 2 ▲ new
57Data Center 2 ▲ 1 (50%)
58ChatGPT 2 ▲ new
59Public 2 ▲ new
60플럭스 2 ▲ new
61Canada 2 ▲ new
62securityaffairs 2 ▲ new
63subdomain 2 ▲ new
64Red Team 2 ▲ new
65Password 2 ▲ 1 (50%)
66Firmware 2 ▲ new
67Red Hat 2 ▲ 1 (50%)
68Chrome 2 ▲ new
69Anonymous 2 ▲ new
70WMI 2 ▲ new
71YouTube 2 ▲ 1 (50%)
72Ucraina 2 ▲ new
73Docker 2 ▲ 1 (50%)
74Kaspersky 2 ▲ 1 (50%)
75Cisco 2 ▲ 1 (50%)
76MFA 2 ▲ new
77Germany 2 ▲ new
78Russia 2 ▲ 1 (50%)
79PhaaS 2 ▲ new
80Kubernetes 2 ▲ 1 (50%)
81Banking 1 ▲ new
82attac 1 - 0 (0%)
83엔비디아 1 ▲ new
84name 1 ▲ new
85Supply chain 1 ▲ new
86Falco 1 ▲ new
87블루 1 ▲ new
88Actions 1 ▲ new
89memory 1 ▲ new
90workflow 1 ▲ new
91xabyss 1 ▲ new
92Trojan 1 - 0 (0%)
93Malvertising 1 ▼ -1 (-100%)
94필드 1 ▲ new
95Browser 1 ▼ -1 (-100%)
96Java 1 - 0 (0%)
97Smishing 1 ▲ new
98Criminal 1 ▼ -2 (-200%)
99Anchor 1 ▲ new
100SentinelOne 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
GameoverP2P
3 (23.1%)
DYEPACK
3 (23.1%)
Ransomware
3 (23.1%)
Trojan
1 (7.7%)
Anchor
1 (7.7%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Anonymous
2 (100%)
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Phishing
17 (26.6%)
Exploit
13 (20.3%)
Remote Code Execution
9 (14.1%)
Campaign
8 (12.5%)
RCE
6 (9.4%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
United States
12 (20%)
CISA
6 (10%)
Microsoft
5 (8.3%)
Google
4 (6.7%)
NSA
4 (6.7%)
Threat info
Last 5

Additional information

No Request Hash(md5) Report No Date
1http://www.cipd.org/globalasse...
Downloader Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Hijack Network Sniff Audio HTTP DNS Code injection Internet API persistence FTP KeyLogger P2P AntiDebug AntiVM MSOffice File PNG Format JPEG Format
4e58a191b515eed2a9894dc8698bc5c0590782025.04.18
2 1 Podgląd wpisu po zmianie _ C...
Client SW User Data Stealer browser info stealer Generic Malware Google Chrome User Data Downloader Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Sniff Audio HTTP DNS Code injection BitCoin Internet API persistenc
0b0afec69e7d62568ab3bfdadc92c631591772025.04.18
3 1 Podgląd wpisu po zmianie _ C...
Client SW User Data Stealer browser info stealer Generic Malware Google Chrome User Data Downloader Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Sniff Audio HTTP DNS Code injection BitCoin Internet API persistenc
0b0afec69e7d62568ab3bfdadc92c631591742025.04.18
4 layout.bin
Downloader Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Hijack Network Sniff Audio HTTP DNS Code injection Internet API persistence FTP KeyLogger P2P AntiDebug AntiVM MSOffice File
72c582ab7db10af86a90608f98e5e614590582025.04.17
5 os.dat
Downloader Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Hijack Network Sniff Audio HTTP DNS Code injection Internet API persistence FTP KeyLogger P2P AntiDebug AntiVM MSOffice File
af1d8d9435cb10fe2f4b4215eaf6bec4590592025.04.17
View only the last 5
Level Description
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Performs some HTTP requests
notice Potentially malicious URLs were found in the process memory dump
notice Uses Windows utilities for basic Windows functionality
notice Yara rule detected in process memory
Network ET INFO TLS Handshake Failure
Network SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
No data
No data
Beta Service, If you select keyword, you can check detailed information.