Summary: 2025/04/19 12:36
First reported date: 2014/10/21
Inquiry period : 2025/03/20 12:36 ~ 2025/04/19 12:36 (1 months), 5 search results
전 기간대비 -20% 낮은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 Malware GlobalProtect c&c Report 입니다.
악성코드 유형 Ransomware Entropy NetWireRC DYEPACK SnatchCrypto RATel GameoverP2P 도 새롭게 확인됩니다.
공격자 Silent Chollima Kimsuky 도 새롭게 확인됩니다.
공격기술 RCE Social Engineering Phishing 도 새롭게 확인됩니다.
기관 및 기업 Government Recorded Future Microsoft Japan CrowdStrike Kaspersky Ucraina Russia Australia 도 새롭게 확인됩니다.
기타 Victim Checker Schwachstelle Privilegieneskalation vendor 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/15 Modernizing Federal Security with Prisma Access
ㆍ 2025/04/10 [NEU] [mittel] PaloAlto Networks GlobalProtect: Schwachstelle ermöglicht Privilegieneskalation
ㆍ 2025/04/02 Fast Flux: A National Security Threat
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Paloalto | 7 | ▼ -3 (-43%) |
2 | Palo Alto | 5 | ▼ -1 (-20%) |
3 | 팔로알토 | 5 | ▼ -1 (-20%) |
4 | Malware | 3 | ▲ 1 (33%) |
5 | Campaign | 2 | - 0 (0%) |
6 | Victim | 2 | ▲ new |
7 | GlobalProtect | 2 | ▲ 1 (50%) |
8 | c&c | 2 | ▲ 1 (50%) |
9 | Ransomware | 2 | ▲ new |
10 | Report | 2 | ▲ 1 (50%) |
11 | Windows | 1 | - 0 (0%) |
12 | Exploit | 1 | - 0 (0%) |
13 | Update | 1 | ▼ -3 (-300%) |
14 | Stealer | 1 | - 0 (0%) |
15 | Checker | 1 | ▲ new |
16 | Remote Code Execution | 1 | - 0 (0%) |
17 | Networks | 1 | ▼ -3 (-300%) |
18 | Schwachstelle | 1 | ▲ new |
19 | Privilegieneskalation | 1 | ▲ new |
20 | Entropy | 1 | ▲ new |
21 | vendor | 1 | ▲ new |
22 | NetWireRC | 1 | ▲ new |
23 | Palo Alto Networks | 1 | ▼ -1 (-100%) |
24 | DYEPACK | 1 | ▲ new |
25 | Zero Trust | 1 | ▲ new |
26 | VPN | 1 | ▲ new |
27 | Government | 1 | ▲ new |
28 | Data Center | 1 | ▲ new |
29 | RCE | 1 | ▲ new |
30 | DLP | 1 | ▲ new |
31 | Software | 1 | ▲ new |
32 | attack | 1 | ▼ -1 (-100%) |
33 | Operation | 1 | - 0 (0%) |
34 | Access | 1 | ▲ new |
35 | Prisma | 1 | ▲ new |
36 | Criminal | 1 | ▲ new |
37 | United States | 1 | - 0 (0%) |
38 | Recorded Future | 1 | ▲ new |
39 | SnatchCrypto | 1 | ▲ new |
40 | Silent Chollima | 1 | ▲ new |
41 | STARDUST CHOLLIMA | 1 | ▲ new |
42 | Vulnerability | 1 | - 0 (0%) |
43 | Lazarus | 1 | - 0 (0%) |
44 | UNC4736 | 1 | ▲ new |
45 | IoC | 1 | - 0 (0%) |
46 | Cryptocurrency | 1 | ▲ new |
47 | Microsoft | 1 | ▲ new |
48 | North Korea | 1 | - 0 (0%) |
49 | Japan | 1 | ▲ new |
50 | RATel | 1 | ▲ new |
51 | DarkWeb | 1 | - 0 (0%) |
52 | CrowdStrike | 1 | ▲ new |
53 | GameoverP2P | 1 | ▲ new |
54 | Social Engineering | 1 | ▲ new |
55 | Kaspersky | 1 | ▲ new |
56 | Phishing | 1 | ▲ new |
57 | RSA Conference | 1 | ▲ new |
58 | Ucraina | 1 | ▲ new |
59 | Russia | 1 | ▲ new |
60 | Kimsuky | 1 | ▲ new |
61 | Malicious Traffic | 1 | ▲ new |
62 | Australia | 1 | ▲ new |
63 | federal | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Ransomware |
|
2 (25%) |
Entropy |
|
1 (12.5%) |
NetWireRC |
|
1 (12.5%) |
DYEPACK |
|
1 (12.5%) |
SnatchCrypto |
|
1 (12.5%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|---|---|
Silent Chollima |
|
1 (33.3%) |
Lazarus |
|
1 (33.3%) |
Kimsuky |
|
1 (33.3%) |

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Campaign |
|
2 (25%) |
Exploit |
|
1 (12.5%) |
Stealer |
|
1 (12.5%) |
Remote Code Execution |
|
1 (12.5%) |
RCE |
|
1 (12.5%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
Paloalto |
|
7 (36.8%) |
Palo Alto Networks |
|
1 (5.3%) |
Government |
|
1 (5.3%) |
United States |
|
1 (5.3%) |
Recorded Future |
|
1 (5.3%) |
Threat info
Last 5SNS
(Total : 1)PaloAlto Windows Remote Code Execution
News
(Total : 4)Paloalto Malware Victim Ransomware Report Campaign c&c NetWireRC Update Stealer Entropy Criminal DYEPACK Exploit Zero Trust Palo Alto Networks DarkWeb VPN Government Data Center RCE DLP Software attack Operation Recorded Future Ucraina Australia Japan Silent Chollima STARDUST CHOLLIMA Vulnerability Lazarus UNC4736 IoC Cryptocurrency Attacker Microsoft North Korea SnatchCrypto Malicious Traffic RATel CrowdStrike GameoverP2P Social Engineering Kaspersky Phishing RSA Conference Kimsuky Russia United States
No | Title | Date |
---|---|---|
1 | Modernizing Federal Security with Prisma Access - Malware.News | 2025.04.15 |
2 | [NEU] [mittel] PaloAlto Networks GlobalProtect: Schwachstelle ermöglicht Privilegieneskalation - IT Sicherheitsnews | 2025.04.10 |
3 | Fast Flux: A National Security Threat - CISA Alerts | 2025.04.02 |
4 | Tempted to Classifying APT Actors: Practical Challenges of Attribution in the Case of Lazarus’s Subgroup - Malware.News | 2025.03.25 |
Additional information
No | Title | Date |
---|---|---|
1 | Tesla to Delay Production of Cheaper EVs, Reuters Reports - Bloomberg Technology | 2025.04.19 |
2 | When Vulnerability Information Flows are Vulnerable Themselves - Malware.News | 2025.04.19 |
3 | CISA warns threat hunting staff of end to Google, Censys contracts as agency cuts set in - Malware.News | 2025.04.19 |
4 | Radiology practice reportedly working with FBI after ‘data security incident’ - Malware.News | 2025.04.19 |
5 | Text scams grow to steal hundreds of millions of dollars - Malware.News | 2025.04.19 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Modernizing Federal Security with Prisma Access - Malware.News | 2025.04.15 |
2 | Fast Flux: A National Security Threat - CISA Alerts | 2025.04.02 |
3 | Fast Flux: A National Security Threat - CISA Alerts | 2025.04.02 |
4 | Tempted to Classifying APT Actors: Practical Challenges of Attribution in the Case of Lazarus’s Subgroup - Malware.News | 2025.03.25 |
5 | Tempted to Classifying APT Actors: Practical Challenges of Attribution in the Case of Lazarus’s Subgroup - Malware.News | 2025.03.25 |
View only the last 5 |