Summary: 2025/04/17 13:17
First reported date: 2012/01/05
Inquiry period : 2025/03/18 13:17 ~ 2025/04/17 13:17 (1 months), 259 search results
전 기간대비 5% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 Email Malware Report Campaign United States 입니다.
공격기술 RCE 도 새롭게 확인됩니다.
기타 PoisonSeed 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/17 Former cyber official Chris Krebs to leave SentinelOne in bid to fight Trump pressure
ㆍ 2025/04/17 Hi, robot: Half of all internet traffic now automated
ㆍ 2025/04/17 Exploiting SMS: Threat Actors Use Social Engineering to Target Companies
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | 259 | ▲ 14 (5%) | |
2 | Malware | 130 | ▲ 3 (2%) |
3 | Report | 99 | ▲ 25 (25%) |
4 | Phishing | 91 | ▼ -2 (-2%) |
5 | attack | 72 | ▼ -5 (-7%) |
6 | Campaign | 72 | ▲ 15 (21%) |
7 | target | 66 | ▼ -4 (-6%) |
8 | United States | 64 | ▲ 15 (23%) |
9 | Update | 58 | ▲ 13 (22%) |
10 | Victim | 53 | ▲ 14 (26%) |
11 | Advertising | 47 | ▲ 7 (15%) |
12 | intelligence | 46 | ▼ -8 (-17%) |
13 | Exploit | 45 | ▼ -11 (-24%) |
14 | Alleged | 38 | ▲ 17 (45%) |
15 | Password | 38 | ▲ 8 (21%) |
16 | Microsoft | 37 | ▲ 4 (11%) |
17 | Criminal | 37 | ▼ -8 (-22%) |
18 | Operation | 33 | ▼ -2 (-6%) |
19 | Remote Code Execution | 33 | ▼ -21 (-64%) |
20 | Windows | 30 | ▲ 9 (30%) |
21 | 29 | ▲ 7 (24%) | |
22 | Software | 27 | - 0 (0%) |
23 | data | 27 | ▲ 9 (33%) |
24 | Government | 26 | ▼ -10 (-38%) |
25 | Vulnerability | 25 | ▼ -10 (-40%) |
26 | Kaspersky | 23 | ▲ 4 (17%) |
27 | Ransomware | 22 | ▼ -3 (-14%) |
28 | Browser | 22 | ▲ 3 (14%) |
29 | IoC | 22 | - 0 (0%) |
30 | Threat | 22 | ▲ 2 (9%) |
31 | DarkWeb | 21 | ▼ -22 (-105%) |
32 | Education | 21 | ▼ -10 (-48%) |
33 | breach | 20 | ▲ 3 (15%) |
34 | Russia | 20 | ▲ 3 (15%) |
35 | Stealer | 19 | ▼ -7 (-37%) |
36 | leak | 19 | ▲ 17 (89%) |
37 | Sale | 18 | ▲ 14 (78%) |
38 | ZeroDay | 17 | ▲ 4 (24%) |
39 | MFA | 16 | ▼ -4 (-25%) |
40 | c&c | 16 | ▲ 1 (6%) |
41 | 16 | ▼ -2 (-13%) | |
42 | hacking | 15 | ▼ -3 (-20%) |
43 | GitHub | 15 | ▼ -1 (-7%) |
44 | 14 | ▼ -1 (-7%) | |
45 | China | 14 | - 0 (0%) |
46 | Trojan | 14 | ▲ 4 (29%) |
47 | Telegram | 13 | ▼ -1 (-8%) |
48 | RCE | 13 | ▲ new |
49 | Chrome | 13 | ▲ 8 (62%) |
50 | Java | 13 | ▲ 4 (31%) |
51 | NetWireRC | 13 | ▲ 3 (23%) |
52 | Social Engineering | 13 | ▼ -1 (-8%) |
53 | Distribution | 12 | ▼ -1 (-8%) |
54 | Cryptocurrency | 12 | ▼ -5 (-42%) |
55 | GameoverP2P | 12 | ▲ 2 (17%) |
56 | powershell | 11 | ▲ 3 (27%) |
57 | ESET | 11 | ▲ 3 (27%) |
58 | Android | 11 | ▲ 5 (45%) |
59 | actor | 10 | ▲ 2 (20%) |
60 | VPN | 10 | ▼ -2 (-20%) |
61 | MWNEWS | 10 | ▲ 2 (20%) |
62 | Backdoor | 9 | ▼ -3 (-33%) |
63 | US | 9 | ▲ 7 (78%) |
64 | Banking | 9 | ▲ 2 (22%) |
65 | information | 9 | ▼ -1 (-11%) |
66 | Linux | 9 | ▲ 2 (22%) |
67 | Cisco | 9 | ▲ 3 (33%) |
68 | Fake | 9 | ▲ 7 (78%) |
69 | Gmail | 9 | ▲ 1 (11%) |
70 | Emails | 8 | ▲ 3 (38%) |
71 | payment | 8 | ▼ -10 (-125%) |
72 | Vawtrak | 7 | ▲ 4 (57%) |
73 | RAT | 7 | - 0 (0%) |
74 | Ucraina | 7 | ▲ 4 (57%) |
75 | ChatGPT | 7 | ▼ -2 (-29%) |
76 | Zero Trust | 7 | ▲ 3 (43%) |
77 | Europe | 7 | ▲ 2 (29%) |
78 | DNS | 7 | ▲ 6 (86%) |
79 | Takedown | 7 | ▼ -2 (-29%) |
80 | EDR | 7 | ▲ 3 (43%) |
81 | Bank | 6 | ▲ 5 (83%) |
82 | malicious | 6 | ▼ -2 (-33%) |
83 | Germany | 6 | ▲ 1 (17%) |
84 | AhnLab | 6 | - 0 (0%) |
85 | database | 6 | ▲ 2 (33%) |
86 | DYEPACK | 6 | ▼ -1 (-17%) |
87 | AI | 6 | ▼ -7 (-117%) |
88 | hijack | 6 | ▲ 4 (67%) |
89 | user | 6 | ▲ 2 (33%) |
90 | PoisonSeed | 6 | ▲ new |
91 | YouTube | 5 | ▲ 3 (60%) |
92 | CISA | 5 | ▲ 1 (20%) |
93 | RATel | 5 | ▼ -3 (-60%) |
94 | Check Point | 5 | ▲ 2 (40%) |
95 | Amazon | 5 | ▲ 4 (80%) |
96 | arrest | 5 | ▲ 1 (20%) |
97 | United Kingdom | 5 | ▲ 3 (60%) |
98 | Anonymous | 5 | ▲ 3 (60%) |
99 | India | 5 | ▼ -4 (-80%) |
100 | MalSpam | 5 | ▼ -3 (-60%) |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Ransomware |
|
22 (22.4%) |
Trojan |
|
14 (14.3%) |
NetWireRC |
|
13 (13.3%) |
GameoverP2P |
|
12 (12.2%) |
Vawtrak |
|
7 (7.1%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|---|---|
Anonymous |
|
5 (100%) |

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Phishing |
|
91 (27.5%) |
Campaign |
|
72 (21.8%) |
Exploit |
|
45 (13.6%) |
Remote Code Execution |
|
33 (10%) |
Stealer |
|
19 (5.7%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
United States |
|
64 (19.5%) |
Microsoft |
|
37 (11.3%) |
|
29 (8.8%) | |
Government |
|
26 (7.9%) |
Kaspersky |
|
23 (7%) |
Threat info
Last 5SNS
(Total : 114)Email Phishing Report Campaign attack target United States Malware Password DarkWeb Attacker Exploit Proofpoint US Police Advertising Telegram Twitter Remote Code Execution Java GitHub hacking Gmail Cryptocurrency Government Stealer Browser Victim Vulnerability Kaspersky GootLoader Microsoft Criminal AhnLab Operation PoC ZeroDay North Korea Germany MalSpam USA Education Binance powershell SnakeKeylogger keylogger ...
News
(Total : 145)Email Malware Report Phishing attack Campaign Update target United States Victim Attacker intelligence Advertising Exploit Criminal Microsoft Operation Password Remote Code Execution Windows Google Software Government Vulnerability IoC Ransomware Kaspersky Browser Education Russia Stealer c&c MFA ZeroDay DarkWeb China Trojan LinkedIn NetWireRC Chrome Twitter hacking Social Engineering GitHub RCE Distribution GameoverP2P ESET Android VPN Java Telegram powershell Cryptocurrency Backdoor Linux Banking Cisco payment RAT Ucraina ChatGPT Takedown Vawtrak Zero Trust EDR Europe DNS DYEPACK Gmail US CISA Booking hijack United Kingdom arrest DDoS Smishing Amazon RATel Anonymous YouTube Microsoft Edge India Cobalt Strike Lumma Check Point Cryptocurrency Miner RSA Conference Spain Cloudflare ...
No | Title | Date |
---|---|---|
1 | Former cyber official Chris Krebs to leave SentinelOne in bid to fight Trump pressure - Malware.News | 2025.04.17 |
2 | Hi, robot: Half of all internet traffic now automated - Malware.News | 2025.04.17 |
3 | Exploiting SMS: Threat Actors Use Social Engineering to Target Companies - Malware.News | 2025.04.17 |
4 | “I sent you an email from your email account,” sextortion scam claims - Malware.News | 2025.04.17 |
5 | “I sent you an email from your email account,” sextortion scam claims - Malwarebytes Labs | 2025.04.16 |
Additional information
No | Title | Date |
---|---|---|
1 | 엔디비아 'AI 심장부' GPU에 보안 구멍.. '즉시 패치' 비상 - 시큐리티팩트 | 2025.04.17 |
2 | Hi, robot: Half of all internet traffic now automated - Malware.News | 2025.04.17 |
3 | Zoom Sees Outage With 50,000 Users Reporting Availability Issues - Bloomberg Technology | 2025.04.17 |
4 | Nude photos and names: KU Health and Kansas hospital sued for data breach - Malware.News | 2025.04.17 |
5 | DeepSeek Poses ‘Profound’ Security Threat, US House Panel Claims - Bloomberg Technology | 2025.04.17 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Former cyber official Chris Krebs to leave SentinelOne in bid to fight Trump pressure - Malware.News | 2025.04.17 |
2 | Former cyber official Chris Krebs to leave SentinelOne in bid to fight Trump pressure - Malware.News | 2025.04.17 |
3 | Former cyber official Chris Krebs to leave SentinelOne in bid to fight Trump pressure - Malware.News | 2025.04.17 |
4 | Exploiting SMS: Threat Actors Use Social Engineering to Target Companies - Malware.News | 2025.04.17 |
5 | CVE-2025-24054, NTLM Exploit in the Wild - Malware.News | 2025.04.16 |
View only the last 5 |
Level | Description |
---|---|
danger | File has been identified by 59 AntiVirus engines on VirusTotal as malicious |
danger | Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually) |
danger | Executed a process and injected code into it |
watch | Allocates execute permission to another process indicative of possible code injection |
watch | Attempts to remove evidence of file being downloaded from the Internet |
watch | Communicates with host for which no DNS query was performed |
watch | Potential code injection by writing to the memory of another process |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
watch | Used NtSetContextThread to modify a thread in a remote process indicative of process injection |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | One or more potentially interesting buffers were extracted |
notice | Potentially malicious URLs were found in the process memory dump |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
notice | Yara rule detected in process memory |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | This executable has a PDB path |