Summary: 2025/04/19 12:26

First reported date: 2010/11/16
Inquiry period : 2025/03/20 12:26 ~ 2025/04/19 12:26 (1 months), 24 search results

전 기간대비 21% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
device attack Ransomware Report target 입니다.
악성코드 유형 GameoverP2P Vawtrak RATel 도 새롭게 확인됩니다.
공격기술 Campaign Remote Code Execution RCE 도 새롭게 확인됩니다.
기관 및 기업 Microsoft Canada United Kingdom Australia Germany Apple Kaspersky Ucraina Russia Singapore France Japan Italy 도 새롭게 확인됩니다.
기타 Locker digitalsecurity onlinesafety doesnt entire 등 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/14 Advanced device code phishing leveraged by Russian APT
    ㆍ 2025/04/10 How cyberattackers exploit domain controllers using ransomware
    ㆍ 2025/04/08 Google fixes two actively exploited zero-day vulnerabilities in Android

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1device 24 ▲ 5 (21%)
2Malware 9 - 0 (0%)
3attack 8 ▲ 5 (63%)
4Ransomware 7 ▲ 6 (86%)
5Report 6 ▲ 1 (17%)
6target 6 ▲ 4 (67%)
7Locker 5 ▲ new
8Android 5 ▲ 2 (40%)
9digitalsecurity 5 ▲ new
10onlinesafety 5 ▲ new
11doesnt 5 ▲ new
12entire 5 ▲ new
13Password 4 ▲ 1 (25%)
14Google 4 ▲ 1 (25%)
15Exploit 4 ▲ 2 (50%)
16Update 4 ▲ 3 (75%)
17Custom 4 ▲ new
18Plugin 4 ▲ new
19Defender 4 ▲ new
20Campaign 4 ▲ new
21Software 3 - 0 (0%)
22Microsoft 3 ▲ new
23United States 3 - 0 (0%)
24Phishing 3 ▲ 1 (33%)
25code 2 ▲ new
26Crocodilus 2 ▲ new
27Victim 2 - 0 (0%)
28Banking 2 ▲ 1 (50%)
29domain 2 ▲ new
30threat 2 ▲ new
31Operation 2 ▲ 1 (50%)
32Criminal 2 ▲ 1 (50%)
33MWNEWS 2 ▲ 1 (50%)
34Vulnerability 2 - 0 (0%)
35Canada 2 ▲ new
36United Kingdom 2 ▲ new
37Linux 2 ▲ 1 (50%)
38Australia 2 ▲ new
39Germany 2 ▲ new
40GameoverP2P 2 ▲ new
41ZeroDay 1 - 0 (0%)
42Remote Code Execution 1 ▲ new
43link 1 ▲ new
44primary 1 ▲ new
45MacOS 1 ▲ new
46QR 1 ▲ new
47Apple 1 ▲ new
48DocuSign 1 ▲ new
49Vawtrak 1 ▲ new
50Investigation 1 ▲ new
51Copilot 1 ▲ new
52level 1 ▲ new
53LinkedIn 1 ▲ new
54spreader 1 ▲ new
55Advertising 1 - 0 (0%)
56VPN 1 ▲ new
57RCE 1 ▲ new
58RATel 1 ▲ new
59network 1 - 0 (0%)
60challenge 1 ▲ new
61contain 1 ▲ new
62capability 1 ▲ new
63Kaspersky 1 ▲ new
64Ucraina 1 ▲ new
65Russia 1 ▲ new
66Government 1 ▼ -1 (-100%)
67Russian 1 ▲ new
68Email 1 ▼ -2 (-200%)
69Scam 1 ▲ new
70intelligence 1 - 0 (0%)
71rooting 1 ▲ new
72Singapore 1 ▲ new
73Spain 1 - 0 (0%)
74France 1 ▲ new
75Titan 1 ▲ new
76Keys 1 ▲ new
77available 1 - 0 (0%)
78Trojan 1 - 0 (0%)
79Japan 1 ▲ new
80Gaming 1 ▲ new
81Handheld 1 ▲ new
82Cute 1 ▲ new
83Altoids 1 ▲ new
84detection 1 ▲ new
85Takeover 1 ▲ new
86iPhone 1 ▲ new
87machine 1 ▲ new
88iyahyakhan 1 ▲ new
89internet 1 ▲ new
90Go 1 ▲ new
91Cryptocurrency 1 ▲ new
92physical 1 ▲ new
93access 1 - 0 (0%)
94Uboot 1 ▲ new
95medical 1 - 0 (0%)
96Firmware 1 ▲ new
97impact 1 ▲ new
98ultrasonic 1 ▲ new
99Teardown 1 ▲ new
100Italy 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
Ransomware
7 (58.3%)
GameoverP2P
2 (16.7%)
Vawtrak
1 (8.3%)
RATel
1 (8.3%)
Trojan
1 (8.3%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Exploit
4 (30.8%)
Campaign
4 (30.8%)
Phishing
3 (23.1%)
Remote Code Execution
1 (7.7%)
RCE
1 (7.7%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
Google
4 (13.3%)
Microsoft
3 (10%)
United States
3 (10%)
Banking
2 (6.7%)
Canada
2 (6.7%)
Threat info
Last 5

SNS

(Total : 13)
  Total keyword

Ransomware Plugin attack Microsoft Attacker Exploit Password Cryptocurrency

No Title Date
1Kaspersky @kaspersky
Locker ransomware doesn’t steal your data—it steals your entire device. Once it strikes, you’re locked out for good. Here’s how to stop it. ⚠️ #CyberSecurity #Ransomware #DigitalSecurity #OnlineSafety https://t.co/90EIlqNxYV
2025.04.16
2Microsoft Threat Intelligence @MsftSecIntel
To address this challenge, we have expanded our contain device capability in Defender for Endpoint to include granular containment of critical assets such as domain controllers through automatic attack disruption. https://t.co/4MFSoY993w
2025.04.10
3Microsoft Threat Intelligence @MsftSecIntel
Human-operated ransomware attacks frequently involve compromising domain controllers, which attackers then use as the primary spreader device — the system responsible for distributing ransomware at scale within a compromised environment. https://t.co/DKbLEvrhEj
2025.04.10
4Microsoft Threat Intelligence @MsftSecIntel
The “Custom Plugin Defender Device Info” plugin, on the other hand, offers specific device information often needed during an investigation such as current and past IPs assigned to the device, list of users signed in to a device, alerts observed, and others.
2025.04.10
5Microsoft Threat Intelligence @MsftSecIntel
The “Custom Plugin Defender Device Investigation” plugin features skills that can provide information on files and processes on the device, lateral movement events, and other suspicious activities.
2025.04.10

Additional information

No data
No data
No data
No data
Beta Service, If you select keyword, you can check detailed information.