Summary: 2025/04/17 10:48
First reported date: 2015/12/01
Inquiry period : 2025/03/18 10:48 ~ 2025/04/17 10:48 (1 months), 138 search results
전 기간대비 95% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 RCE Malware Exploit Update Vulnerability 입니다.
악성코드 유형 Ransomware GameoverP2P Trojan Vawtrak 도 새롭게 확인됩니다.
공격기술 Phishing hijack Social Engineering Hijacking hacking Backdoor Downloader 도 새롭게 확인됩니다.
기관 및 기업 United States China Government CISA Kaspersky Google Palo Alto Networks Ucraina Russia Chinese Europe VirusTotal NSA 도 새롭게 확인됩니다.
기타 Report Remote Software Code Advertising 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/17 Hi, robot: Half of all internet traffic now automated
ㆍ 2025/04/17 Exploiting SMS: Threat Actors Use Social Engineering to Target Companies
ㆍ 2025/04/17 6,000 WordPress Sites Affected by Arbitrary File Move Vulnerability in Drag and Drop Multiple File Upload for WooCommerce WordPress Plugin
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | RCE | 138 | ▲ 131 (95%) |
2 | Malware | 61 | ▲ 58 (95%) |
3 | Report | 39 | ▲ new |
4 | Exploit | 38 | ▲ 33 (87%) |
5 | Update | 37 | ▲ 36 (97%) |
6 | Vulnerability | 37 | ▲ 32 (86%) |
7 | attack | 35 | ▲ 33 (94%) |
8 | target | 33 | ▲ 30 (91%) |
9 | Operation | 29 | ▲ 28 (97%) |
10 | Campaign | 27 | ▲ 26 (96%) |
11 | Remote | 23 | ▲ new |
12 | United States | 22 | ▲ new |
13 | Software | 20 | ▲ new |
14 | Code | 19 | ▲ new |
15 | Advertising | 18 | ▲ new |
16 | intelligence | 17 | ▲ new |
17 | Microsoft | 17 | ▲ 16 (94%) |
18 | Victim | 16 | ▲ 15 (94%) |
19 | China | 14 | ▲ new |
20 | Windows | 13 | ▲ 10 (77%) |
21 | 13 | ▲ new | |
22 | Execution | 13 | ▲ new |
23 | Government | 12 | ▲ new |
24 | CISA | 12 | ▲ new |
25 | Ransomware | 11 | ▲ new |
26 | CVE | 11 | ▲ 8 (73%) |
27 | Remote Code Execution | 10 | ▲ 3 (30%) |
28 | Phishing | 9 | ▲ new |
29 | CVSS | 9 | ▲ 7 (78%) |
30 | Criminal | 9 | ▲ new |
31 | ZeroDay | 9 | ▲ new |
32 | Education | 9 | ▲ new |
33 | MWNEWS | 8 | ▲ new |
34 | Access | 7 | ▲ new |
35 | Password | 7 | ▲ new |
36 | hijack | 7 | ▲ new |
37 | Linux | 7 | ▲ 6 (86%) |
38 | GitHub | 7 | ▲ new |
39 | Critical | 7 | ▲ 5 (71%) |
40 | Alert | 7 | ▲ 6 (86%) |
41 | Browser | 6 | ▲ new |
42 | Supply chain | 6 | ▲ new |
43 | MFA | 6 | ▲ new |
44 | Takedown | 6 | ▲ new |
45 | threat | 6 | ▲ 5 (83%) |
46 | c&c | 6 | ▲ new |
47 | VPN | 6 | ▲ new |
48 | source | 5 | ▲ new |
49 | Social Engineering | 5 | ▲ new |
50 | Distribution | 5 | ▲ new |
51 | Kaspersky | 5 | ▲ new |
52 | Telegram | 5 | ▲ new |
53 | GameoverP2P | 5 | ▲ new |
54 | Palo | 5 | ▲ new |
55 | Alto | 5 | ▲ new |
56 | file | 5 | ▲ new |
57 | Java | 5 | ▲ new |
58 | apache | 5 | ▲ new |
59 | 5 | ▲ new | |
60 | ABB | 5 | ▲ new |
61 | Cylon | 5 | ▲ new |
62 | AI | 5 | ▲ new |
63 | Cryptocurrency | 5 | ▲ new |
64 | payment | 5 | ▲ new |
65 | Sale | 5 | ▲ new |
66 | DNS | 5 | ▲ 4 (80%) |
67 | IoC | 5 | ▲ new |
68 | Ivanti | 4 | ▲ new |
69 | Palo Alto Networks | 4 | ▲ new |
70 | Trojan | 4 | ▲ new |
71 | Hijacking | 4 | ▲ new |
72 | Command | 4 | ▲ new |
73 | Android | 4 | ▲ new |
74 | ChatGPT | 4 | ▲ new |
75 | DarkWeb | 4 | ▲ new |
76 | Cisco | 4 | ▲ 2 (50%) |
77 | WooCommerce | 4 | ▲ new |
78 | hacking | 4 | ▲ new |
79 | Ucraina | 4 | ▲ new |
80 | Flaw | 4 | ▲ 3 (75%) |
81 | Russia | 4 | ▲ new |
82 | Group | 4 | ▲ new |
83 | Chinese | 4 | ▲ new |
84 | Europe | 4 | ▲ new |
85 | Backdoor | 4 | ▲ new |
86 | Kubernetes | 4 | ▲ new |
87 | ltpgt | 3 | ▲ new |
88 | actor | 3 | ▲ new |
89 | WordPress | 3 | ▲ new |
90 | Program | 3 | ▲ new |
91 | plugin | 3 | ▲ new |
92 | Downloader | 3 | ▲ new |
93 | href | 3 | ▲ new |
94 | VirusTotal | 3 | ▲ new |
95 | Zero Trust | 3 | ▲ new |
96 | Vawtrak | 3 | ▲ new |
97 | Networks | 3 | ▲ new |
98 | dark | 3 | ▲ new |
99 | NSA | 3 | ▲ new |
100 | powershell | 3 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Ransomware |
|
11 (36.7%) |
GameoverP2P |
|
5 (16.7%) |
Trojan |
|
4 (13.3%) |
Vawtrak |
|
3 (10%) |
RATel |
|
3 (10%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
RCE |
|
138 (54.5%) |
Exploit |
|
38 (15%) |
Campaign |
|
27 (10.7%) |
Remote Code Execution |
|
10 (4%) |
Phishing |
|
9 (3.6%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
United States |
|
22 (16.7%) |
Microsoft |
|
17 (12.9%) |
China |
|
14 (10.6%) |
Government |
|
12 (9.1%) |
CISA |
|
12 (9.1%) |
Threat info
Last 5SNS
(Total : 34)RCE Vulnerability Exploit attack CVE Remote Code Execution Update Report Ransomware ZeroDay DarkWeb target Victim Palo Alto Networks United States payment UK United Kingdom hacking China plugin Spain Windows RAT CVSS Supply chain powershell Attacker MacOS Microsoft Linux Cloudflare Malware Fortinet Ucraina DDoS Magento Android Telegram Gmail ...
News
(Total : 104)RCE Malware Report Update target Exploit attack Operation Vulnerability Campaign Attacker Software United States Advertising intelligence Microsoft Victim China Government Windows Email CISA Phishing Criminal Education CVSS Password hijack Ransomware GitHub c&c Takedown Linux CVE VPN Browser Java Supply chain Google Cryptocurrency MFA GameoverP2P Kaspersky Distribution IoC DNS Remote Code Execution ZeroDay Backdoor Russia Chinese Hijacking Social Engineering Europe Cisco Telegram Kubernetes ChatGPT Smishing VirusTotal Downloader Red Team Docker Vawtrak Android LinkedIn YouTube NSA Ucraina RATel payment Banking Chrome Zero Trust IoT Cryptographic key Cryptocurrency Miner Trojan plugin ...
No | Title | Date |
---|---|---|
1 | Hi, robot: Half of all internet traffic now automated - Malware.News | 2025.04.17 |
2 | Exploiting SMS: Threat Actors Use Social Engineering to Target Companies - Malware.News | 2025.04.17 |
3 | 6,000 WordPress Sites Affected by Arbitrary File Move Vulnerability in Drag and Drop Multiple File Upload for WooCommerce WordPress Plugin - Malware.News | 2025.04.17 |
4 | Advanced KQL Deep Dive: User State Change Tracking - Malware.News | 2025.04.17 |
5 | Threat Intelligence Snapshot: Week 14, 2025 - Malware.News | 2025.04.16 |
Additional information
No | Title | Date |
---|---|---|
1 | 엔디비아 'AI 심장부' GPU에 보안 구멍.. '즉시 패치' 비상 - 시큐리티팩트 | 2025.04.17 |
2 | Hi, robot: Half of all internet traffic now automated - Malware.News | 2025.04.17 |
3 | Zoom Sees Outage With 50,000 Users Reporting Availability Issues - Bloomberg Technology | 2025.04.17 |
4 | Nude photos and names: KU Health and Kansas hospital sued for data breach - Malware.News | 2025.04.17 |
5 | DeepSeek Poses ‘Profound’ Security Threat, US House Panel Claims - Bloomberg Technology | 2025.04.17 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Exploiting SMS: Threat Actors Use Social Engineering to Target Companies - Malware.News | 2025.04.17 |
2 | Advanced KQL Deep Dive: User State Change Tracking - Malware.News | 2025.04.17 |
3 | Advanced KQL Deep Dive: User State Change Tracking - Malware.News | 2025.04.17 |
4 | Threat Intelligence Snapshot: Week 14, 2025 - Malware.News | 2025.04.16 |
5 | Threat Intelligence Snapshot: Week 14, 2025 - Malware.News | 2025.04.16 |
View only the last 5 |
No | URL | CC | ASN Co | Reporter | Date |
---|---|---|---|---|---|
1 | http://blooming.s3.amazonaws.com/Ea7fbW98CyM5O CoinMiner elf Ivanti RCE | US ![]() | AMAZON-02 | abuse_ch | 2024.01.19 |
2 | http://shapefiles.fews.net.s3.amazonaws.com/g6cYGAxHt4JC1 CoinMiner elf Ivanti RCE | US ![]() | abuse_ch | 2024.01.19 | |
3 | http://archivevalley-media.s3.amazonaws.com/bbU5Yn3yayTtV CoinMiner elf Ivanti RCE | US ![]() | abuse_ch | 2024.01.19 | |
4 | http://abode-dashboard-media.s3.ap-south-1.amazonaws.com/kaffMm40RNtkg CoinMiner elf Ivanti RCE | US ![]() | abuse_ch | 2024.01.19 | |
5 | http://192.252.183.116:8089/u/123/100123/202401/sshd CoinMiner Ivanti RCE | US ![]() | BGPNET Global ASN | abuse_ch | 2024.01.19 |
View only the last 5 |