Summary: 2025/04/19 11:30

First reported date: 2014/12/12
Inquiry period : 2025/03/20 11:30 ~ 2025/04/19 11:30 (1 months), 4 search results

전 기간대비 25% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
RevengeRAT Operation Malware Campaign Victim 입니다.
악성코드 유형 Ransomware DYEPACK NetWireRC RATel 도 새롭게 확인됩니다.
공격자 Volt Typhoon 도 새롭게 확인됩니다.
공격기술 Remote Code Execution Stealer Deface Social Engineering RCE Phishing Backdoor DDoS 도 새롭게 확인됩니다.
기관 및 기업 Kaspersky Russia Government Microsoft Taiwan FBI VirusTotal North Korea SentinelOne NSA CISA Europe Iran Proofpoint McAfee Türkiye 도 새롭게 확인됩니다.
기타 Advertising t DarkWeb RaaS Twitter 등 신규 키워드도 확인됩니다.

Revenge was one of the most popular remote access trojans to be used in 2019 when it was featured in a huge malicious campaign named “Aggah”. This malware can take remote control of infected machines and spy after the victims.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/15 Trump Revenge Tour Targets Cyber Leaders, Elections
    ㆍ 2025/04/11 The Importance of Monitoring Threat Actors in an Era of Blurring Boundaries
    ㆍ 2025/04/03 Indictments and Leaks: Different but Complementary Sources


참고로 동일한 그룹의 악성코드 타입은 Remcos njRAT QuasarRAT 등 110개 종이 확인됩니다.

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1RevengeRAT 4 ▲ 1 (25%)
2Operation 4 ▲ 3 (75%)
3Malware 4 ▲ 3 (75%)
4Campaign 4 ▲ 3 (75%)
5Victim 4 ▲ 3 (75%)
6intelligence 4 ▲ 3 (75%)
7China 3 ▲ 2 (67%)
8Kaspersky 3 ▲ new
9Report 3 ▲ 2 (67%)
10Russia 3 ▲ new
11Government 3 ▲ new
12Microsoft 3 ▲ new
13target 3 ▲ 2 (67%)
14United States 3 ▲ 2 (67%)
15Taiwan 2 ▲ new
16attack 2 ▲ 1 (50%)
17FBI 2 ▲ new
18Remote Code Execution 2 ▲ new
19hacking 2 ▲ 1 (50%)
20Update 2 ▼ -1 (-50%)
21Advertising 2 ▲ new
22Stealer 2 ▲ new
23t 1 ▲ new
24Ransomware 1 ▲ new
25DarkWeb 1 ▲ new
26DYEPACK 1 ▲ new
27Criminal 1 - 0 (0%)
28Deface 1 ▲ new
29Exploit 1 - 0 (0%)
30Social Engineering 1 ▲ new
31RaaS 1 ▲ new
32VirusTotal 1 ▲ new
33Volt Typhoon 1 ▲ new
34NetWireRC 1 ▲ new
35North Korea 1 ▲ new
36Cisco 1 - 0 (0%)
37SentinelOne 1 ▲ new
38Twitter 1 ▲ new
39NSA 1 ▲ new
40CISA 1 ▲ new
41RCE 1 ▲ new
42Europe 1 ▲ new
43election 1 ▲ new
44Trump 1 ▲ new
45Iran 1 ▲ new
46Phishing 1 ▲ new
47Telegram 1 ▲ new
48RATel 1 ▲ new
49Browser 1 ▲ new
50Proofpoint 1 ▲ new
51Cl 1 ▲ new
52Cobalt Strike 1 ▲ new
53APT41 1 ▲ new
54Java 1 ▲ new
55Windows 1 ▲ new
56IoC 1 ▲ new
57McAfee 1 ▲ new
58Türkiye 1 ▲ new
59Software 1 - 0 (0%)
60The Shadow Brokers 1 ▲ new
61Education 1 ▲ new
62Email 1 ▲ new
63powershell 1 ▲ new
64Backdoor 1 ▲ new
65c&c 1 ▲ new
66Password 1 ▲ new
67iSOO 1 ▲ new
68Vulnerability 1 - 0 (0%)
69DDoS 1 ▲ new
70Krebs 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
RevengeRAT
4 (50%)
Ransomware
1 (12.5%)
DYEPACK
1 (12.5%)
NetWireRC
1 (12.5%)
RATel
1 (12.5%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Volt Typhoon
1 (100%)
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Campaign
4 (23.5%)
Remote Code Execution
2 (11.8%)
hacking
2 (11.8%)
Stealer
2 (11.8%)
Deface
1 (5.9%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
China
3 (9.1%)
Kaspersky
3 (9.1%)
Russia
3 (9.1%)
Government
3 (9.1%)
Microsoft
3 (9.1%)
Malware Family
Top 5

A malware family is a group of applications with similar attack techniques.
In this trend, it is classified into Ransomware, Stealer, RAT or Backdoor, Loader, Botnet, Cryptocurrency Miner.

Additional information

No data
No data
No Category URL CC ASN Co Date
1c2http://february-warnings.gl.at.ply.gg/US US2023.10.10
2c2http://marcelotatuape.ddns.net/FR FRIelo-liazo Services SAS2023.09.24
No URL CC ASN Co Reporter Date
1https://dc708.4sync.com/download/HTECcE8I/teste.jpg?dsid=iLgBhr5m.e6fdc68815f2d2b1fee7da84fdc10bdc&s...
rat RevengeRAT
US USWZCOMabuse_ch2024.10.10
2https://paste.ee/d/On072/0
ascii rat RevengeRAT
US USCLOUDFLARENETabuse_ch2024.09.24
3https://paste.ee/d/b7zf5/0
ascii rat RevengeRAT
US USabuse_ch2024.09.24
4https://www.4sync.com/web/directDownload/CE3CTlT9/DlRvs8N_.dc5ccedf8d8817fc5fe4f69239307383
rat RevengeRAT
US USWZCOMabuse_ch2024.09.24
5https://paste.ee/d/zzhCc/0
ascii rat RevengeRAT
US USCLOUDFLARENETabuse_ch2024.09.24
View only the last 5
Beta Service, If you select keyword, you can check detailed information.