Summary: 2025/05/03 03:12

First reported date: 2018/12/21
Inquiry period : 2025/04/03 03:12 ~ 2025/05/03 03:12 (1 months), 14 search results

전 기간대비 57% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
archive 입니다.
악성코드 유형 Ransomware Clipbanker Trojan 도 새롭게 확인됩니다.
공격기술 Exploit RCE Campaign 도 새롭게 확인됩니다.
기관 및 기업 Cloudflare Microsoft Russia Kaspersky 도 새롭게 확인됩니다.
기타 Malware attack Advertising Criminal detection 등 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/08 Attackers distributing a miner and the ClipBanker Trojan via SourceForge

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1archive 14 ▲ 8 (57%)
2Malware 5 ▲ new
3Exploit 5 ▲ new
4Cloudflare 5 ▲ new
5attack 5 ▲ new
6Advertising 5 ▲ new
7Criminal 4 ▲ new
8Ransomware 4 ▲ new
9detection 4 ▲ new
10theyre 4 ▲ new
11Ucraina 3 - 0 (0%)
12Ukraine 3 - 0 (0%)
13Password 2 ▲ new
14Next 2 ▼ -2 (-100%)
15stage 2 ▼ -2 (-100%)
16b879d04603999532c7b52132f42db7f3dd1b8d41626c3aa8156bb31d0823f06f 1 ▲ new
17L0Psec 1 ▲ new
18course 1 ▲ new
19IP 1 ▲ new
20httpstcosO 1 ▲ new
21httpsuncledrivesaccommodatepackagingtrycloudflarecomNPUimportancepq 1 ▲ new
22http 1 ▼ -1 (-100%)
23Microsoft 1 ▲ new
24httpspleaseclintonmissedingtrycloudflarecomGukrflintYLSmedicinejOEpptx 1 ▲ new
25httpsmessagescolumnistsreleasescosttrycloudflarecomNPUmattressQC 1 ▲ new
26f2acb746e75f73e1ae77c671af7725abcdf41d69f4e22c3bee63c3746f13f6e4 1 ▲ new
27httpsbellythrillerchiefyourtrycloudflarecomODeducationOy 1 ▲ new
28How 1 ▲ new
29Education 1 ▲ new
30case 1 ▲ new
31anyone 1 ▲ new
32source 1 ▲ new
33link 1 ▲ new
34RCE 1 ▲ new
35httpspostprocessercomwellknownpkivalidationgopython 1 ▲ new
36Russia 1 ▲ new
37httpstcoV 1 ▲ new
38e21c775f976b5d208de1101d2bc5e9b0be5b5e40043fa1fc9f24d9cfb0857d6b 1 ▲ new
39powershell 1 ▲ new
40Windows 1 ▲ new
41GitHub 1 ▲ new
42Update 1 ▲ new
43SMB 1 ▲ new
44Browser 1 ▲ new
45Clipbanker 1 ▲ new
46Distribution 1 ▲ new
47Takedown 1 ▲ new
48Trojan 1 ▲ new
49Software 1 ▲ new
50file 1 ▲ new
51Telegram 1 ▲ new
52Victim 1 ▲ new
53script 1 ▲ new
54exe 1 ▲ new
55batch 1 ▲ new
56Cryptocurrency 1 ▲ new
57c&c 1 ▲ new
58Kaspersky 1 ▲ new
59Campaign 1 ▲ new
60biliSetups 1 ▲ new
61wwwtuiguang 1 ▲ new
62mlcrosoftbond 1 ▲ new
63execpy 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
Ransomware
4 (66.7%)
Clipbanker
1 (16.7%)
Trojan
1 (16.7%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Exploit
5 (71.4%)
RCE
1 (14.3%)
Campaign
1 (14.3%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
Cloudflare
5 (35.7%)
Ucraina
3 (21.4%)
Ukraine
3 (21.4%)
Microsoft
1 (7.1%)
Russia
1 (7.1%)
Threat info
Last 5

SNS

(Total : 13)
  Total keyword

Cloudflare Criminal Attacker Exploit Malware Advertising Ransomware attack Ucraina Ukraine Education RCE Password

No Title Date
1MalwareHunterTeam @malwrhunterteam
Next stage archive: https://postprocesser.com/.well-known/pki-validation/go/python3.zip The "exec\.py" inside the archive is Pyarmor protected... ????‍♂️ https://t.co/5K8vejvifz
2025.04.30
2MalwareHunterTeam @malwrhunterteam
Oh, and in case anyone would gaf, the source link for the archive is this: https://director-cu-papua-our.trycloudflare.com/2-1180-25_29.04.2025.rar
2025.04.29
3MalwareHunterTeam @malwrhunterteam
Inside the archive is this "2-1180-25_29.04.2025.HTA": f2acb746e75f73e1ae77c671af7725abcdf41d69f4e22c3bee63c3746f13f6e4 https://belly-thriller-chief-your.trycloudflare.com/OD/educationOy0/offendQzB.pptx Ukraine... How the fuck these actors are not have enough of doing the same
2025.04.29
4MalwareHunterTeam @malwrhunterteam
Inside the archive is this "6-1179-25_28.04.2025.HTA": b879d04603999532c7b52132f42db7f3dd1b8d41626c3aa8156bb31d0823f06f https://messages-columnists-releases-cost.trycloudflare.com/NPU/mattressQC3/stolentG3.pptx Ukraine... so fucking boring... ????‍♂️
2025.04.28
5Kaspersky @kaspersky
Attackers often hide malware in archive files to evade detection and deliver payloads like ransomware. Since these files are widely trusted, they’re a common attack vector. Here’s how cybercriminals exploit archives - and how to secure your systems against them ???? https://t.co/BCoxBwPBEe
2025.04.25

Additional information

No data
No data
No data
No URL CC ASN Co Reporter Date
1https://nopar.b-cdn.net/%F0%9F%9F%86Updated%F0%9F%9F%86Set-Up%F0%9F%9F%86%F0%9F%9F%862025%F0%9F%9F%8...
archive exe pw-2025
JP JPDaveLikesMalwre2024.12.30
2https://bitbucket.org/trabajo21/trabajoc/src/main/DEMANDA%20EMITIDA%20EL%20DIA%2022%20DEL%20MES%20EN...
archive bitbucket tar
US USATLASSIAN PTY LTDDaveLikesMalwre2024.11.23
3https://bitbucket.org/trabajo21/trabajoc/src/main/2024-96630-ACTA%20DE%20CITACION%20JUDICIAL%20CON%2...
archive bitbucket tar
US USATLASSIAN PTY LTDDaveLikesMalwre2024.11.23
4https://www.mediafire.com/file/7os5cx2x4rp70nm/UPL0ADER.7z/file
archive contains-exe mediafire via-youtube zip
US USCLOUDFLARENETiam_py_test2024.04.28
Beta Service, If you select keyword, you can check detailed information.