Summary: 2025/04/29 18:50
First reported date: 2021/07/28
Inquiry period : 2025/03/30 18:50 ~ 2025/04/29 18:50 (1 months), 1 search results
전 기간대비 -300% 낮은 트렌드를 보이고 있습니다.
공격자 Kimsuky 도 새롭게 확인됩니다.
기관 및 기업 Naver South Korea 도 새롭게 확인됩니다.
기타 payment DDNS Advertising Firefox Distribution 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/04 Kimsuky: A Continuous Threat to South Korea with Deceptive Tactics
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Kimsuky | 1 | ▲ new |
2 | Chrome | 1 | - 0 (0%) |
3 | payment | 1 | ▲ new |
4 | Operation | 1 | ▼ -1 (-100%) |
5 | attack | 1 | ▼ -1 (-100%) |
6 | target | 1 | ▼ -1 (-100%) |
7 | DDNS | 1 | ▲ new |
8 | Trojan | 1 | - 0 (0%) |
9 | intelligence | 1 | ▼ -1 (-100%) |
10 | Government | 1 | - 0 (0%) |
11 | 1 | ▼ -2 (-200%) | |
12 | Advertising | 1 | ▲ new |
13 | Browser | 1 | - 0 (0%) |
14 | Firefox | 1 | ▲ new |
15 | Exploit | 1 | ▼ -1 (-100%) |
16 | Malware | 1 | ▼ -3 (-300%) |
17 | Naver | 1 | ▲ new |
18 | Windows | 1 | - 0 (0%) |
19 | Stealer | 1 | - 0 (0%) |
20 | Criminal | 1 | ▼ -1 (-100%) |
21 | South Korea | 1 | ▲ new |
22 | Distribution | 1 | ▲ new |
23 | powershell | 1 | ▲ new |
24 | Cryptocurrency | 1 | - 0 (0%) |
25 | VBScript | 1 | ▲ new |
26 | c&c | 1 | - 0 (0%) |
27 | IoC | 1 | - 0 (0%) |
28 | Campaign | 1 | ▼ -1 (-100%) |
29 | Phishing | 1 | ▼ -1 (-100%) |
30 | P | 1 | ▼ -3 (-300%) |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Trojan |
|
1 (100%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|---|---|
Kimsuky |
|
1 (100%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
Government |
|
1 (33.3%) |
Naver |
|
1 (33.3%) |
South Korea |
|
1 (33.3%) |
Threat info
Last 5SNS
(Total : 0)No data.
News
(Total : 1)Kimsuky Chrome payment Operation attack target DDNS Trojan intelligence Government Email Advertising Browser Firefox Exploit Malware Naver Windows Stealer Criminal South Korea Distribution powershell Cryptocurrency VBScript c&c IoC Campaign Phishing
No | Title | Date |
---|---|---|
1 | Kimsuky: A Continuous Threat to South Korea with Deceptive Tactics - Malware.News | 2025.04.04 |
Additional information
No | Title | Date |
---|---|---|
1 | Release 4.7: Silent Push Unveils New Feed Scanner Interface That Makes it Easier to Preemptively Identify Emerging Threats - Malware.News | 2025.04.29 |
2 | Transforming Malware Defense for the AI Era - Malware.News | 2025.04.29 |
3 | People should be ‘outraged’ by efforts to shrink federal cyber teams, former CISA head says - Malware.News | 2025.04.29 |
4 | NXP Announces New CEO, Warns of ‘Very Uncertain Environment’ - Bloomberg Technology | 2025.04.29 |
5 | FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023 - Malware.News | 2025.04.29 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Kimsuky: A Continuous Threat to South Korea with Deceptive Tactics - Malware.News | 2025.04.04 |
2 | Money Laundering 101, and why Joe is worried - Malware.News | 2025.03.28 |
3 | Money Laundering 101, and why Joe is worried - Malware.News | 2025.03.28 |
4 | Money Laundering 101, and why Joe is worried - Malware.News | 2025.03.28 |
5 | Money Laundering 101, and why Joe is worried - Malware.News | 2025.03.28 |
View only the last 5 |
Level | Description |
---|---|
danger | File has been identified by 33 AntiVirus engines on VirusTotal as malicious |
watch | Attempts to stop active services |
watch | Creates known SpyNet files |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Checks for the Locally Unique Identifier on the system for a suspicious privilege |
notice | Creates a suspicious process |
notice | Creates executable files on the filesystem |
notice | Drops a binary and executes it |
notice | Drops an executable to the user AppData folder |
notice | Executes one or more WMI queries |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
notice | Uses Windows utilities for basic Windows functionality |
notice | Yara rule detected in process memory |
info | Checks amount of memory in system |
info | Command line console output was observed |
info | One or more processes crashed |
info | Queries for the computername |
info | The executable contains unknown PE section names indicative of a packer (could be a false positive) |
No | URL | CC | ASN Co | Reporter | Date |
---|---|---|---|---|---|
1 | http://80.94.92.109/bins/pppc elf opendir p | FR ![]() | EZNet LIMITED | NDA0E | 2024.09.19 |
2 | http://80.94.92.109/bins/pspc elf opendir p | FR ![]() | EZNet LIMITED | NDA0E | 2024.09.19 |
3 | http://80.94.92.109/bins/pmips elf opendir p ua-wget | FR ![]() | EZNet LIMITED | ClearlyNotB | 2024.09.19 |
4 | http://80.94.92.109/bins/parm elf opendir p ua-wget | FR ![]() | EZNet LIMITED | ClearlyNotB | 2024.09.19 |
5 | http://80.94.92.109/bins/pmpsl elf opendir p ua-wget | FR ![]() | EZNet LIMITED | ClearlyNotB | 2024.09.19 |
View only the last 5 |