Summary: 2025/05/04 02:26
First reported date: 2012/08/27
Inquiry period : 2025/04/04 02:26 ~ 2025/05/04 02:26 (1 months), 5 search results
전 기간대비 신규 트렌드를 보이고 있습니다.
악성코드 유형 LummaStealer Lumma 도 새롭게 확인됩니다.
공격기술 Backdoor hijack Stealer Exploit 도 새롭게 확인됩니다.
기타 Spotlight Hidden Malware RSAC Vulnerability 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/26 RSAC 2025: Securing AI agents, non-human identities in the spotlight
ㆍ 2025/04/12 From Shadow to Spotlight: The Evolution of LummaStealer and Its Hidden Secrets
ㆍ 2025/04/11 Threat Spotlight: Hijacked and Hidden: New Backdoor and Persistence Technique
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Spotlight | 5 | ▲ new |
2 | Hidden | 2 | ▲ new |
3 | Malware | 2 | ▲ new |
4 | Backdoor | 1 | ▲ new |
5 | RSAC | 1 | ▲ new |
6 | Vulnerability | 1 | ▲ new |
7 | Actor | 1 | ▲ new |
8 | Unidentified | 1 | ▲ new |
9 | ZeroDay | 1 | ▲ new |
10 | CVE | 1 | ▲ new |
11 | AI | 1 | ▲ new |
12 | MWNEWS | 1 | ▲ new |
13 | topic | 1 | ▲ new |
14 | Shopify | 1 | ▲ new |
15 | privacy | 1 | ▲ new |
16 | legal | 1 | ▲ new |
17 | hijack | 1 | ▲ new |
18 | Evolution | 1 | ▲ new |
19 | Shadow | 1 | ▲ new |
20 | LummaStealer | 1 | ▲ new |
21 | Stealer | 1 | ▲ new |
22 | Lumma | 1 | ▲ new |
23 | Hijacked | 1 | ▲ new |
24 | Threat | 1 | ▲ new |
25 | Exploit | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
LummaStealer |
|
1 (50%) |
Lumma |
|
1 (50%) |

Attacker & Actors
The status of the attacker or attack group being issued.
No data.

Country & Company
This is a country or company that is an issue.
No data.
Threat info
Last 5SNS
(Total : 2)CVE ZeroDay Vulnerability Exploit
News
(Total : 3)Malware Backdoor hijack Lumma Stealer LummaStealer
No | Title | Date |
---|---|---|
1 | RSAC 2025: Securing AI agents, non-human identities in the spotlight - Malware.News | 2025.04.26 |
2 | From Shadow to Spotlight: The Evolution of LummaStealer and Its Hidden Secrets - Cybereason | 2025.04.12 |
3 | Threat Spotlight: Hijacked and Hidden: New Backdoor and Persistence Technique - Reliaquest / RELIAQUEST THREAT RESEARCH TEAM / malpedia | 2025.04.11 |
Additional information
No | Title | Date |
---|---|---|
1 | 틱톡, 유럽 사용자 데이터 중국 전송.. 8000억대 벌금 - 시큐리티팩트 | 2025.05.03 |
2 | Saskatoon children’s hospital nurse unlawfully snooped on records of 314 patients: privacy report - Malware.News | 2025.05.03 |
3 | Dating app Raw exposed users’ location data and personal information - Malware.News | 2025.05.03 |
4 | Hacker hired Telangana man to courier threats to Star Health Insurance MD - Malware.News | 2025.05.03 |
5 | Acadian Ambulance Seeks Dismissal of Data Breach Lawsuit - Malware.News | 2025.05.03 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Unauthorized tactic spotlight: Initial access through a third-party identity provider - AWS Security Blog | 2024.11.04 |
2 | Google’s Nobel Haul Puts Spotlight on Changing Focus of Scientific Research - Bloomberg Technolo... | 2024.10.11 |
3 | Mandiant Shines Spotlight on APT45 Behind North Korea’s Digital Military Machine - Securityweek | 2024.07.25 |
4 | Detecting Volt Typhoon TTPs – Security Spotlight - Security Boulevard | 2024.02.13 |
5 | Publisher’s Spotlight: AT&T Cybersecurity: Edge Ecosystem - Cyber Defense Maga... | 2023.10.14 |
View only the last 5 |