Summary: 2025/05/02 18:03

First reported date: 2009/07/08
Inquiry period : 2025/04/02 18:03 ~ 2025/05/02 18:03 (1 months), 21 search results

전 기간대비 43% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
Korea North Korea North South Korea Kaspersky 입니다.
공격자 Lazarus Kimsuky 도 새롭게 확인됩니다.
공격기술 ClickFix Social Engineering ClearFake Phishing 도 새롭게 확인됩니다.
기관 및 기업 Iran Proofpoint Italy Mandiant 도 새롭게 확인됩니다.
기타 target statesponsored March Looks socialengineering 등 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/26 South Korea: Unauthorized user data transfer conducted by DeepSeek
    ㆍ 2025/04/24 Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Zero-Day and ThreatNeedle Malware
    ㆍ 2025/04/10 March 2025 APT Group Trends (South Korea)

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1Korea 21 ▲ 9 (43%)
2North Korea 14 ▲ 7 (50%)
3North 12 ▲ 5 (42%)
4South Korea 7 ▲ 2 (29%)
5Malware 6 - 0 (0%)
6Kaspersky 6 ▲ 5 (83%)
7ClickFix 6 ▲ new
8Report 6 ▲ 1 (17%)
9Campaign 6 ▲ 2 (33%)
10South 6 ▲ 3 (50%)
11Iran 5 ▲ new
12Russia 5 ▲ 4 (80%)
13attack 3 ▼ -1 (-33%)
14APT 3 ▲ 1 (33%)
15Operation 3 ▲ 2 (67%)
16target 3 ▲ new
17Proofpoint 3 ▲ new
18hacking 2 - 0 (0%)
19dprk 2 ▲ 1 (50%)
20China 2 ▲ 1 (50%)
21statesponsored 2 ▲ new
22intelligence 2 ▲ 1 (50%)
23Europe 2 ▲ 1 (50%)
24Google 2 ▲ 1 (50%)
25AhnLab 2 - 0 (0%)
26Social Engineering 2 ▲ new
27March 2 ▲ new
28Group 2 ▼ -1 (-50%)
29Looks 2 ▲ new
30socialengineering 2 ▲ new
31Alleged 1 ▲ new
32user 1 ▲ new
33ZeroDay 1 ▲ new
34Unauthorized 1 ▲ new
35DeepSeek 1 ▲ new
36Lazarus 1 ▲ new
37Firms 1 ▲ new
38Software 1 ▲ new
39Korean 1 ▲ new
40Italy 1 ▲ new
41Sale 1 ▲ new
42Mr 1 ▲ new
43Job 1 ▲ new
44Stole 1 ▲ new
45Government 1 - 0 (0%)
46Admin 1 ▲ new
47Station 1 ▲ new
48Charging 1 ▲ new
49Eurojust 1 ▲ new
50KSJOB 1 ▲ new
51Arrangement 1 ▲ new
52Republic 1 ▲ new
53Web 1 ▲ new
54c39ecc7d9f1e225a37304345731fffe72cdb95b21aeb06aa6022f6d338777012 1 ▲ new
55cachedatexe 1 ▲ new
56Email 1 ▲ new
57Employee 1 ▲ new
58ClearFake 1 ▲ new
59powershell 1 ▲ new
60Mandiant 1 ▲ new
61look 1 ▲ new
62Workers 1 ▲ new
63BYD 1 ▲ new
64Hyundai 1 ▲ new
65Co 1 ▲ new
66Double 1 ▲ new
67Kimsuky 1 ▲ new
68lnk 1 ▲ new
69cti 1 - 0 (0%)
70Targets 1 ▲ new
71appexe 1 ▲ new
72c0682c72db57aae7c05d08e79f2d82825be2c2cdcb162c19e4c8bf5a737dcb20 1 ▲ new
73boring 1 ▲ new
74sample 1 ▲ new
75Cryptocurrency 1 ▲ new
76Update 1 ▼ -1 (-100%)
77threat 1 ▲ new
78State 1 ▲ new
79TA427 1 ▲ new
80think 1 ▲ new
81Copy 1 ▲ new
82Paste 1 ▲ new
83Get 1 ▲ new
84Criminal 1 ▲ new
85threatinsight 1 ▲ new
86Phishing 1 ▲ new
87young 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


No data.

Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Lazarus
1 (50%)
Kimsuky
1 (50%)
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
ClickFix
6 (28.6%)
Campaign
6 (28.6%)
APT
3 (14.3%)
hacking
2 (9.5%)
Social Engineering
2 (9.5%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
North Korea
14 (26.4%)
South Korea
7 (13.2%)
Kaspersky
6 (11.3%)
Iran
5 (9.4%)
Russia
5 (9.4%)
Threat info
Last 5

SNS

(Total : 12)
  Total keyword

North Korea ClickFix Iran Russia Kaspersky Campaign Proofpoint South Korea Social Engineering hacking Malware ClearFake Report Criminal Kimsuky Email Italy dprk APT Update powershell target Attacker Government

No Title Date
1Dark Web Informer - Cyber Threat Intelligence @DarkWebInformer
???????????? South Korea Charging Station Admin Access, Nationwide Coverage Full admin access to mobile phone charging/storage units across South Korea. ????️ Locations Covered: • Seoul, Busan, Airports, Train/Subway Stations, Lotte Buildings, Hospitals, Government Offices ????️ Features & ht
2025.04.30
2MalwareHunterTeam @malwrhunterteam
"cache.dat.exe": c39ecc7d9f1e225a37304345731fffe72cdb95b21aeb06aa6022f6d338777012 Looks some North Korea related shit, seen from Italy... ????‍♂️ https://t.co/dNiAMesiHe
2025.04.29
3Dark Web Informer - Cyber Threat Intelligence @DarkWebInformer
???????????? Alleged Sale of KSJOB Korea Employee Database A threat actor is offering a database allegedly containing sensitive employee information from a Korean organization. ???? Records: 35K employees ???? Price: $8,000 ???? Data Includes: ???? Name, Address, Zip Code, SSN, Phone, Email https
2025.04.27
4Virus Bulletin @virusbtn
Proofpoint researchers discovered state-sponsored actors from North Korea, Iran and Russia experimenting in multiple campaigns with the ClickFix social engineering technique as a stage in their infection chains. https://t.co/3ZswvWTX7u https://t.co/8OWQnTUthJ
2025.04.24
5Cyber_OSINT @Cyber_O51NT
Proofpoint researchers found that state-sponsored actors from North Korea, Iran, and Russia have begun using the ClickFix social engineering technique, previously linked to cybercriminals, in their espionage campaigns from late 2024 to early 2025. #Cyber… https://t.co/iEvIvXq9m8
2025.04.18

Additional information

No data
No data
No data
No data
Beta Service, If you select keyword, you can check detailed information.