Summary: 2025/04/17 10:37
First reported date: 2022/10/24
Inquiry period : 2025/03/18 10:37 ~ 2025/04/17 10:37 (1 months), 1 search results
전 기간대비 -200% 낮은 트렌드를 보이고 있습니다.
악성코드 유형 Botnet Trojan 도 새롭게 확인됩니다.
공격기술 Spear Phishing Stealer 도 새롭게 확인됩니다.
기관 및 기업 Google Microsoft 도 새롭게 확인됩니다.
기타 Cobalt Strike Microsoft Edge Operation Software Email 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/03/21 SVC New Stealer on the Horizon
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Cobalt Strike | 1 | ▲ new |
2 | Microsoft Edge | 1 | ▲ new |
3 | Spear Phishing | 1 | ▲ new |
4 | Operation | 1 | ▲ new |
5 | Botnet | 1 | ▲ new |
6 | attack | 1 | - 0 (0%) |
7 | target | 1 | - 0 (0%) |
8 | Software | 1 | ▲ new |
9 | Trojan | 1 | ▲ new |
10 | 1 | ▲ new | |
11 | 1 | ▲ new | |
12 | Advertising | 1 | ▲ new |
13 | Browser | 1 | ▲ new |
14 | Opera | 1 | ▲ new |
15 | Chrome | 1 | ▲ new |
16 | PIZZO SPIDER | 1 | ▲ new |
17 | Discord | 1 | ▲ new |
18 | Stealer | 1 | ▲ new |
19 | Criminal | 1 | ▲ new |
20 | Telegram | 1 | ▲ new |
21 | Microsoft | 1 | ▲ new |
22 | Victim | 1 | ▲ new |
23 | Cryptocurrency | 1 | ▲ new |
24 | c&c | 1 | ▲ new |
25 | IoC | 1 | ▲ new |
26 | Campaign | 1 | - 0 (0%) |
27 | Phishing | 1 | - 0 (0%) |
28 | Malware | 1 | ▲ new |
29 | C | 1 | ▼ -2 (-200%) |
Special keyword group
Top 5
Attacker & Actors
The status of the attacker or attack group being issued.
No data.

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Spear Phishing |
|
1 (25%) |
Stealer |
|
1 (25%) |
Campaign |
|
1 (25%) |
Phishing |
|
1 (25%) |
Threat info
Last 5SNS
(Total : 0)No data.
News
(Total : 1)Cobalt Strike Microsoft Edge Spear Phishing Operation Botnet attack target Software Trojan Email Google Advertising Browser Opera Chrome PIZZO SPIDER Discord Stealer Criminal Telegram Microsoft Victim Cryptocurrency c&c IoC Campaign Phishing Malware
No | Title | Date |
---|---|---|
1 | SVC New Stealer on the Horizon - Malware.News | 2025.03.21 |
Additional information
No | Title | Date |
---|---|---|
1 | Hi, robot: Half of all internet traffic now automated - Malware.News | 2025.04.17 |
2 | Zoom Sees Outage With 50,000 Users Reporting Availability Issues - Bloomberg Technology | 2025.04.17 |
3 | Nude photos and names: KU Health and Kansas hospital sued for data breach - Malware.News | 2025.04.17 |
4 | DeepSeek Poses ‘Profound’ Security Threat, US House Panel Claims - Bloomberg Technology | 2025.04.17 |
5 | 6,000 WordPress Sites Affected by Arbitrary File Move Vulnerability in Drag and Drop Multiple File Upload for WooCommerce WordPress Plugin - Malware.News | 2025.04.17 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | SVC New Stealer on the Horizon - Malware.News | 2025.03.21 |
2 | SVC New Stealer on the Horizon - Malware.News | 2025.03.21 |
3 | Top 10 Cyber Threats of 2024 - Malware.News | 2024.12.09 |
4 | Top 10 Cyber Threats of 2024 - Malware.News | 2024.12.09 |
5 | Top 10 Cyber Threats of 2024 - Malware.News | 2024.12.09 |
View only the last 5 |
Level | Description |
---|---|
danger | File has been identified by 38 AntiVirus engines on VirusTotal as malicious |
watch | Connects to an IRC server |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Creates executable files on the filesystem |
notice | Drops a binary and executes it |
notice | Drops an executable to the user AppData folder |
notice | One or more potentially interesting buffers were extracted |
notice | Uses Windows utilities for basic Windows functionality |
notice | Yara rule detected in process memory |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | Command line console output was observed |
info | Queries for the computername |
info | This executable has a PDB path |
No | URL | CC | ASN Co | Reporter | Date |
---|---|---|---|---|---|
1 | http://196.251.71.193/PwnKit/PwnKit.c c cve-2021-4034 opendir | GH ![]() | Web4Africa | NDA0E | 2025.02.27 |
2 | http://ydl-v2.mhdy.site/c.arm botnetdomain c elf | RU ![]() | Metroset | NDA0E | 2024.09.05 |
3 | http://cnc.ghty.online/c.arm6 botnetdomain c elf | RU ![]() | Metroset | NDA0E | 2024.09.05 |
4 | http://cnc.ghty.online/c.arm7 botnetdomain c elf | RU ![]() | Metroset | NDA0E | 2024.09.05 |
5 | http://cnc.ghty.online/c.arm5 botnetdomain c elf | RU ![]() | Metroset | NDA0E | 2024.09.05 |
View only the last 5 |