Summary: 2025/04/25 11:40

First reported date: 2014/11/28
Inquiry period : 2025/03/26 11:40 ~ 2025/04/25 11:40 (1 months), 18 search results

전 기간대비 22% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
Active attack Vulnerability Report Ransomware 입니다.
악성코드 유형 LockBit 도 새롭게 확인됩니다.
공격기술 RCE Remote Code Execution 도 새롭게 확인됩니다.
기관 및 기업 Japan US S2W 도 새롭게 확인됩니다.
기타 MWNEWS Mail NTLM Groups Scan 등 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/18 CVE-2025-24054 Under Active Attack—Steals NTLM Credentials on File Download
    ㆍ 2025/04/15 Gladinet’s Triofox and CentreStack Under Active Exploitation via Critical RCE Vulnerability
    ㆍ 2025/04/12 Threat Actors Launch Active Attacks on Semiconductor Firms Using Zero-Day Exploits

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1Active 18 ▲ 4 (22%)
2Exploit 6 - 0 (0%)
3attack 6 ▲ 3 (50%)
4Malware 5 ▼ -1 (-20%)
5Vulnerability 4 ▲ 1 (25%)
6RCE 3 ▲ new
7Password 3 - 0 (0%)
8Report 3 ▲ 1 (33%)
9Ransomware 3 ▲ 2 (67%)
10MWNEWS 2 ▲ new
11Windows 2 ▲ 1 (50%)
12Microsoft 2 ▲ 1 (50%)
13Directory 2 ▼ -1 (-50%)
14sponsored 2 ▲ 1 (50%)
15CVE 2 ▲ 1 (50%)
16ZeroDay 2 - 0 (0%)
17Mail 2 ▲ new
18exploitation 2 ▼ -2 (-100%)
19United States 2 ▲ 1 (50%)
20Japan 2 ▲ new
21CVSS 2 ▲ 1 (50%)
22CISA 2 ▼ -1 (-50%)
23Software 1 - 0 (0%)
24NTLM 1 ▲ new
25Groups 1 ▲ new
26Scan 1 ▲ new
27half 1 ▲ new
28Credentialbased 1 ▲ new
29BirukS 1 ▲ new
30httpstcozFyV 1 ▲ new
31httpstcojBzqGmKiib 1 ▲ new
32Mac 1 ▲ new
33such 1 ▲ new
34ESET 1 - 0 (0%)
35Email 1 - 0 (0%)
36flaw 1 - 0 (0%)
37Japanese 1 ▲ new
38Alert 1 ▲ new
39Unit 1 ▲ new
40Q1 1 - 0 (0%)
41extortion 1 ▲ new
42target 1 ▲ new
43free 1 ▲ new
44Are 1 ▲ new
45break 1 ▲ new
46Threat 1 ▲ new
47course 1 ▲ new
48affected 1 ▲ new
49Java 1 ▲ new
50Remote Code Execution 1 ▲ new
51Sitecore 1 ▲ new
52Next 1 ▲ new
53js 1 ▲ new
54DrayTek 1 ▲ new
55Tripwire 1 ▲ new
56Passes 1 ▲ new
57Sophos 1 ▲ new
58Adversary 1 ▲ new
59H2 1 ▲ new
60US 1 ▲ new
61S2W 1 ▲ new
62Critical 1 - 0 (0%)
63LockBit 1 ▲ new
64bro 1 ▲ new
65elevation 1 ▲ new
66Pentest 1 ▲ new
67Mindmap 1 ▲ new
68Full 1 ▲ new
69Criminal 1 - 0 (0%)
70Semiconductor 1 ▲ new
71Launch 1 ▲ new
72Attacks 1 ▲ new
73Cryptographic key 1 ▲ new
74Triofox 1 ▲ new
75CentreStack 1 ▲ new
76safe 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
Ransomware
3 (75%)
LockBit
1 (25%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Exploit
6 (60%)
RCE
3 (30%)
Remote Code Execution
1 (10%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
Microsoft
2 (18.2%)
United States
2 (18.2%)
Japan
2 (18.2%)
CISA
2 (18.2%)
ESET
1 (9.1%)
Threat info
Last 5

SNS

(Total : 12)
  Total keyword

Ransomware Password attack Japan RCE Malware ESET Email Exploit CVE ZeroDay Vulnerability target Software US S2W Report United States LockBit Attacker

No Title Date
1Cyber_OSINT @Cyber_O51NT
New insights from Unit 42 highlight Q1 2025's extortion and ransomware trends, showcasing the most active groups, targeted industries, and evolving tactics. #Ransomware #CyberSecurity https://t.co/x1n0tVvoMq
2025.04.24
2BleepingComputer @BleepinComputer
Are your Active Directory credentials safe? ???? Specops Password Auditor is a free, no-install tool that scans your AD for: ✴️Compromised passwords ✴️Shared or weak credentials ✴️Dormant accounts ✴️Password policy gaps ???? Get your free audit: https://t.co/S0mjdWZveh #sponsored
2025.04.24
3Hunter @HunterMapping
????Alert???? CVE-2025-42599 : An Active! Mail Zero-Day Remote Code Execution https://t.co/7pTkYIsKnC affects Active! mail 6 BuildInfo: 6.60.05008561 and earlier versions. ????1.3K+ Services are found on the https://t.co/ysWb28Crld yearly. ????Hunter Link:https://t.co/KdE7rJFb5z ????Query https://t.
2025.04.23
4BleepingComputer @BleepinComputer
Active! Mail RCE flaw exploited in attacks on Japanese orgs - @billtoulas https://t.co/CmCtTlUZpy https://t.co/CmCtTlUZpy
2025.04.22
5MalwareHunterTeam @malwrhunterteam
@BirukS0NOfYayo If you opened their Mac malware, you should change passwords, fully reset active sessions + verify on sites where such thing can be done that nothing got changed/added (like secondary email address added, etc).
2025.04.21

Additional information

No data
No data
No data
No data
Beta Service, If you select keyword, you can check detailed information.