Summary: 2025/04/17 15:43

First reported date: 2012/12/19
Inquiry period : 2025/03/18 15:43 ~ 2025/04/17 15:43 (1 months), 93 search results

전 기간대비 15% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
Ucraina target Russia Campaign Malware 입니다.
악성코드 유형 LockBit 도 새롭게 확인됩니다.
공격자 Gamaredon Shuckworm 도 새롭게 확인됩니다.
공격기술 Backdoor RCE Downloader 도 새롭게 확인됩니다.
기관 및 기업 Türkiye 도 새롭게 확인됩니다.
기타 mission NortonLifeLock Targets Western WRECKSTEEL 등 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/17 어나니머스, 러시아 해킹.. 국가 DB '전체 분량' 털렸다
    ㆍ 2025/04/16 CVE-2025-24054, NTLM Exploit in the Wild
    ㆍ 2025/04/16 Monthly Threat Actor Group Intelligence Report, February 2025 (ENG)

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1Ucraina 93 ▲ 14 (15%)
2target 44 ▲ 23 (52%)
3Russia 36 ▲ 10 (28%)
4Campaign 32 ▲ 20 (63%)
5Malware 32 ▲ 8 (25%)
6Ukraine 30 ▲ 3 (10%)
7Kaspersky 29 ▲ 4 (14%)
8Report 26 ▲ 10 (38%)
9Phishing 22 ▲ 17 (77%)
10United States 20 ▲ 4 (20%)
11attack 19 ▲ 6 (32%)
12DDoS 15 ▲ 1 (7%)
13Alert 15 ▲ 3 (20%)
14United Kingdom 14 ▲ 6 (43%)
15Government 14 ▲ 5 (36%)
16NoName 13 ▲ 10 (77%)
17Victim 13 ▲ 5 (38%)
18China 13 ▲ 9 (69%)
19Update 12 ▲ 11 (92%)
20Gamaredon 11 ▲ new
21hacking 11 - 0 (0%)
22Operation 11 ▼ -4 (-36%)
23Australia 9 ▲ 5 (56%)
24Germany 9 - 0 (0%)
25powershell 9 ▲ 8 (89%)
26Telegram 9 ▲ 2 (22%)
27intelligence 9 ▲ 2 (22%)
28Remote Code Execution 8 ▲ 3 (38%)
29Vulnerability 8 ▲ 2 (25%)
30Microsoft 7 ▲ 2 (29%)
31Exploit 7 ▲ 5 (71%)
32Email 7 ▲ 4 (57%)
33Cloudflare 7 ▲ 5 (71%)
34Google 7 ▲ 4 (57%)
35Military 7 ▲ 6 (86%)
36Recorded Future 6 ▲ 3 (50%)
37c&c 6 ▲ 1 (17%)
38Europe 6 ▼ -1 (-17%)
39Japan 6 ▲ 4 (67%)
40Israel 6 ▼ -2 (-33%)
41multiple 6 ▲ 3 (50%)
42Russian 6 ▲ 3 (50%)
43Shuckworm 6 ▲ new
44Remcos 6 ▲ 5 (83%)
45Ransomware 6 ▼ -6 (-100%)
46Twitter 6 ▲ 1 (17%)
47Alliance 5 ▼ -1 (-20%)
48Backdoor 5 ▲ new
49Hacktivist 5 ▼ -2 (-40%)
50South Korea 5 ▲ 3 (60%)
51CERTUA 5 ▲ 2 (40%)
52Italy 5 ▼ -5 (-100%)
53Software 5 ▲ 3 (60%)
54mission 5 ▲ new
55RAT 5 ▲ 2 (40%)
56NortonLifeLock 5 ▲ new
57Advertising 4 ▲ 1 (25%)
58North Korea 4 ▲ 1 (25%)
59IoC 4 ▲ 1 (25%)
60securityaffairs 4 ▲ 1 (25%)
61Criminal 4 ▼ -8 (-200%)
62ZeroDay 4 ▲ 3 (75%)
63DarkWeb 4 - 0 (0%)
64Distribution 4 ▼ -2 (-50%)
65NetWireRC 4 ▼ -2 (-50%)
66France 4 ▼ -5 (-125%)
67Cisco 4 ▲ 3 (75%)
68Targets 4 ▲ new
69Western 4 ▲ new
70Spain 4 ▲ 1 (25%)
71RCE 4 ▲ new
72Canada 4 ▲ 2 (50%)
73CISA 3 - 0 (0%)
74India 3 ▼ -6 (-200%)
75Downloader 3 ▲ new
76Windows 3 - 0 (0%)
77WRECKSTEEL 3 ▲ new
78GitHub 3 ▲ 2 (67%)
79Future 3 ▲ 2 (67%)
80amp 3 ▲ new
81Taiwan 3 ▲ 1 (33%)
82Türkiye 3 ▲ new
83VBScript 3 - 0 (0%)
84Defense 3 ▲ new
85Recorded 3 ▲ 2 (67%)
86Record 3 ▲ 1 (33%)
87Stealer 3 ▲ 1 (33%)
88Check Point 3 ▼ -1 (-33%)
89Foreign 3 ▲ 1 (33%)
90NATO 3 ▲ 2 (67%)
91Ukrainian 3 ▲ 2 (67%)
92arrest 3 - 0 (0%)
93Android 3 - 0 (0%)
94Insurance 2 ▲ new
95있다 2 ▲ new
96MWNEWS 2 ▲ 1 (50%)
97LockBit 2 ▲ new
98Putin 2 ▲ new
99WhatsApp 2 ▲ new
100Cryptocurrency 2 ▼ -3 (-150%)
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
Remcos
6 (20.7%)
Ransomware
6 (20.7%)
RAT
5 (17.2%)
NetWireRC
4 (13.8%)
LockBit
2 (6.9%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Gamaredon
11 (57.9%)
Shuckworm
6 (31.6%)
Anonymous
2 (10.5%)
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Campaign
32 (27.8%)
Phishing
22 (19.1%)
DDoS
15 (13%)
hacking
11 (9.6%)
Remote Code Execution
8 (7%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
Ucraina
93 (25.3%)
Russia
36 (9.8%)
Ukraine
30 (8.2%)
Kaspersky
29 (7.9%)
United States
20 (5.4%)
Threat info
Last 5

SNS

(Total : 51)
  Total keyword

Ucraina target Ukraine DDoS Russia Kaspersky Campaign Gamaredon attack Phishing Israel Malware United Kingdom Remcos hacking Report Shuckworm Cloudflare Spain RAT Recorded Future powershell APT India Symantec Google Government Criminal Operation RCE Distribution UN Spear Phishing ...

No Title Date
1Microsoft Threat Intelligence @MsftSecIntel
@sherrod_im Star Blizzard sent their targets spear-phishing messages that included a quick response (QR) code purporting to direct users to join a WhatsApp group on “the latest non-governmental initiatives aimed at supporting Ukraine NGOs.”
2025.04.16
2FalconFeeds.io @FalconFeedsio
???? DDoS Alert ???? Al Ahad claims to have targeted multiple websites in Ukraine. -Kyiv Sikorsky International Airport (Zhuliany) -Odesa International Airport -Kharkiv International Airport -Dnipro International Airport https://t.co/dNtpaHChAF
2025.04.15
3MalwareHunterTeam @malwrhunterteam
@h4rmsw4yX Sorry, I not have much access (nor think I ever will as it would be too damaging for some it seems... ????‍♂️) to do limitless testings, so can't really tell. Maybe just start from all .hta files seen from Ukraine and if that gives too much FPs, try to filter more based on what easily
2025.04.15
4MalwareHunterTeam @malwrhunterteam
The SSL cert for the ms-coauth.com domain that has the next stage has been given by "Google Trust Services"... ???????????? Google as a trash criminal gang is surely proud of that they are supporting actors doing targeting in Ukraine, especially if it's a Russian APT, right? ????‍♂️ https://t.co/GF9
2025.04.15
5MalwareHunterTeam @malwrhunterteam
"728-3512-19.rar": ad906427ef88f5d55b9ff8d363b6c3bdb34aaef2b1b980f3950e424370893cff -> "728-3512-19.hta": 44cb60c9bb448b33549b2002a84fd56483bbb17fab3f1d861a7f4256a063bbb5 ms-coauth.com Supposedly Russian APT targeting in Ukraine, but for me this is more boring ???? shit than https://t.co/bNUPYndQ
2025.04.15

Additional information

No data
No data
No data
No data
Beta Service, If you select keyword, you can check detailed information.