Summary: 2025/04/19 12:32
First reported date: 2011/05/25
Inquiry period : 2025/03/20 12:32 ~ 2025/04/19 12:32 (1 months), 115 search results
전 기간대비 -82% 낮은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 Operation Government MWNEWS AMOS DYEPACK 입니다.
악성코드 유형 Grandoreiro 도 새롭게 확인됩니다.
기관 및 기업 South Korea 도 새롭게 확인됩니다.
기타 free npm Think Multiple ArcanaLoader 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/18 Dark Web Market: STYX Market
ㆍ 2025/04/18 Identity-based cyberattacks a third of intrusions, drop infostealers
ㆍ 2025/04/17 Interlock ransomware evolves tactics with ClickFix, infostealers
참고로 동일한 그룹의 악성코드 타입은 FormBook QakBot RedLine 등 101개 종이 확인됩니다.
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Stealer | 115 | ▼ -94 (-82%) |
2 | Malware | 62 | ▼ -59 (-95%) |
3 | Campaign | 35 | ▼ -46 (-131%) |
4 | target | 34 | ▼ -9 (-26%) |
5 | Phishing | 29 | ▼ -13 (-45%) |
6 | Report | 28 | ▼ -24 (-86%) |
7 | IoC | 25 | ▼ -20 (-80%) |
8 | Update | 23 | ▼ -7 (-30%) |
9 | attack | 23 | ▼ -22 (-96%) |
10 | Victim | 22 | ▼ -17 (-77%) |
11 | intelligence | 20 | ▼ -7 (-35%) |
12 | 20 | ▼ -9 (-45%) | |
13 | Criminal | 20 | ▼ -13 (-65%) |
14 | Exploit | 20 | ▼ -15 (-75%) |
15 | Browser | 18 | - 0 (0%) |
16 | Advertising | 17 | ▼ -17 (-100%) |
17 | Windows | 17 | ▼ -17 (-100%) |
18 | United States | 16 | ▼ -11 (-69%) |
19 | Lumma | 16 | ▼ -48 (-300%) |
20 | c&c | 15 | ▼ -10 (-67%) |
21 | Operation | 15 | ▲ 4 (27%) |
22 | Software | 14 | ▼ -4 (-29%) |
23 | Microsoft | 14 | ▼ -9 (-64%) |
24 | powershell | 13 | ▼ -6 (-46%) |
25 | Government | 11 | ▲ 1 (9%) |
26 | Ransomware | 11 | ▼ -15 (-136%) |
27 | Remote Code Execution | 11 | ▼ -9 (-82%) |
28 | Cryptocurrency | 11 | ▼ -11 (-100%) |
29 | DarkWeb | 10 | ▼ -5 (-50%) |
30 | Trojan | 10 | ▼ -4 (-40%) |
31 | Password | 10 | ▼ -3 (-30%) |
32 | infostealer | 10 | ▼ -1 (-10%) |
33 | Social Engineering | 9 | ▼ -2 (-22%) |
34 | MFA | 8 | ▼ -2 (-25%) |
35 | 8 | ▼ -5 (-63%) | |
36 | Kaspersky | 8 | ▼ -13 (-163%) |
37 | hacking | 8 | ▼ -6 (-75%) |
38 | Android | 8 | - 0 (0%) |
39 | Telegram | 8 | ▼ -10 (-125%) |
40 | MWNEWS | 8 | ▲ 3 (38%) |
41 | AMOS | 8 | ▲ 1 (13%) |
42 | Distribution | 7 | ▼ -17 (-243%) |
43 | Vulnerability | 7 | ▼ -7 (-100%) |
44 | NetWireRC | 7 | ▼ -16 (-229%) |
45 | Russia | 7 | ▼ -11 (-157%) |
46 | 7 | ▼ -13 (-186%) | |
47 | Chrome | 7 | ▼ -3 (-43%) |
48 | free | 6 | ▲ new |
49 | Banking | 6 | - 0 (0%) |
50 | DYEPACK | 6 | ▲ 4 (67%) |
51 | MacOS | 6 | ▼ -7 (-117%) |
52 | North Korea | 6 | ▼ -3 (-50%) |
53 | Education | 6 | ▼ -3 (-50%) |
54 | GitHub | 6 | ▼ -17 (-283%) |
55 | GameoverP2P | 6 | - 0 (0%) |
56 | 5 | ▼ -17 (-340%) | |
57 | EDR | 5 | ▲ 4 (80%) |
58 | Downloader | 5 | ▲ 2 (40%) |
59 | Stealc | 5 | ▲ 4 (80%) |
60 | ThreatProtection | 5 | ▼ -2 (-40%) |
61 | Grandoreiro | 5 | ▲ new |
62 | LummaStealer | 5 | ▼ -2 (-40%) |
63 | Linux | 5 | ▲ 1 (20%) |
64 | Java | 4 | ▼ -8 (-200%) |
65 | recent | 4 | ▼ -2 (-50%) |
66 | VBScript | 4 | ▼ -2 (-50%) |
67 | payment | 4 | - 0 (0%) |
68 | Raccoon | 4 | ▲ 2 (50%) |
69 | Vidar | 4 | - 0 (0%) |
70 | npm | 4 | ▲ new |
71 | hijack | 4 | ▼ -4 (-100%) |
72 | Think | 4 | ▲ new |
73 | RedLine | 4 | ▼ -2 (-50%) |
74 | ZeroDay | 4 | - 0 (0%) |
75 | Cobalt Strike | 4 | ▲ 2 (50%) |
76 | Takedown | 4 | ▲ 1 (25%) |
77 | Braodo | 4 | ▼ -5 (-125%) |
78 | Rhadamanthys | 4 | ▼ -3 (-75%) |
79 | Installerv | 4 | ▲ 3 (75%) |
80 | NortonLifeLock | 4 | ▼ -3 (-75%) |
81 | China | 4 | ▼ -7 (-175%) |
82 | DDoS | 4 | ▼ -1 (-25%) |
83 | Backdoor | 4 | ▼ -6 (-150%) |
84 | malicious | 4 | ▼ -1 (-25%) |
85 | March | 3 | ▲ 2 (67%) |
86 | crypto | 3 | ▲ 1 (33%) |
87 | Multiple | 3 | ▲ new |
88 | ArcanaLoader | 3 | ▲ new |
89 | cheat | 3 | ▲ new |
90 | twice | 3 | ▲ new |
91 | Installer | 3 | ▲ 2 (67%) |
92 | India | 3 | ▼ -1 (-33%) |
93 | Ucraina | 3 | - 0 (0%) |
94 | GIFTEDCROOK | 3 | ▲ new |
95 | Kimsuky | 3 | ▲ 2 (67%) |
96 | South Korea | 3 | ▲ new |
97 | Supply chain | 3 | - 0 (0%) |
98 | AsyncRAT | 3 | ▼ -6 (-200%) |
99 | RAT | 3 | ▼ -6 (-200%) |
100 | Firefox | 3 | ▼ -2 (-67%) |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Lumma |
|
16 (16.5%) |
Ransomware |
|
11 (11.3%) |
Trojan |
|
10 (10.3%) |
NetWireRC |
|
7 (7.2%) |
DYEPACK |
|
6 (6.2%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|---|---|
Kimsuky |
|
3 (60%) |
MuddyWater |
|
2 (40%) |

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Stealer |
|
115 (46.6%) |
Campaign |
|
35 (14.2%) |
Phishing |
|
29 (11.7%) |
Exploit |
|
20 (8.1%) |
Remote Code Execution |
|
11 (4.5%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
United States |
|
16 (15.1%) |
Microsoft |
|
14 (13.2%) |
Government |
|
11 (10.4%) |
Kaspersky |
|
8 (7.5%) |
Russia |
|
7 (6.6%) |
Malware Family
Top 5
A malware family is a group of applications with similar attack techniques.
In this trend, it is classified into Ransomware, Stealer, RAT or Backdoor, Loader, Botnet, Cryptocurrency Miner.
Threat info
Last 5SNS
(Total : 61)Stealer IoC Malware target Lumma Campaign MacOS LummaStealer Criminal powershell Password GitHub Report Email Phishing Browser Update Downloader keylogger Android attack Spain Government Telegram North Korea Software Microsoft Police dprk Proofpoint LinkedIn iCloud ...
News
(Total : 54)Stealer Malware Campaign target Phishing Report Victim Attacker attack intelligence Update Exploit Email Windows Advertising Criminal United States c&c Operation Browser Software IoC Microsoft Remote Code Execution Cryptocurrency Ransomware DarkWeb powershell Social Engineering Government Lumma Trojan Kaspersky MFA Twitter Vulnerability NetWireRC Russia Chrome LinkedIn hacking Password DYEPACK Distribution GameoverP2P Education Telegram Android Linux Banking Google Stealc EDR Grandoreiro China Cobalt Strike payment Java VBScript ZeroDay Backdoor North Korea RedLine DDoS Rhadamanthys Raccoon Zero Trust RCE Vidar Takedown Supply chain South Korea Firefox YouTube Kimsuky India hijack AsyncRAT GitHub RAT Naver IcedID Tor PayPal ESET MuddyWater CrowdStrike Vawtrak Ucraina Recorded Future AhnLab ...
No | Title | Date |
---|---|---|
1 | Dark Web Market: STYX Market - Malware.News | 2025.04.18 |
2 | Identity-based cyberattacks a third of intrusions, drop infostealers - Malware.News | 2025.04.18 |
3 | Interlock ransomware evolves tactics with ClickFix, infostealers - Malware.News | 2025.04.17 |
4 | Malicious crypto developer-targeted coding challenges spread infostealers - Malware.News | 2025.04.16 |
5 | Infostealer deployed via bogus PDFCandy converter - Malware.News | 2025.04.16 |
Additional information
No | Title | Date |
---|---|---|
1 | Tesla to Delay Production of Cheaper EVs, Reuters Reports - Bloomberg Technology | 2025.04.19 |
2 | When Vulnerability Information Flows are Vulnerable Themselves - Malware.News | 2025.04.19 |
3 | CISA warns threat hunting staff of end to Google, Censys contracts as agency cuts set in - Malware.News | 2025.04.19 |
4 | Radiology practice reportedly working with FBI after ‘data security incident’ - Malware.News | 2025.04.19 |
5 | Text scams grow to steal hundreds of millions of dollars - Malware.News | 2025.04.19 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Dark Web Market: STYX Market - Malware.News | 2025.04.18 |
2 | Dark Web Market: STYX Market - Malware.News | 2025.04.18 |
3 | Threat Intelligence Snapshot: Week 14, 2025 - Malware.News | 2025.04.16 |
4 | Threat Intelligence Snapshot: Week 14, 2025 - Malware.News | 2025.04.16 |
5 | Threat actors misuse Node.js to deliver malware and other malicious payloads - Malware.News | 2025.04.16 |
View only the last 5 |
Level | Description |
---|---|
danger | File has been identified by 59 AntiVirus engines on VirusTotal as malicious |
danger | Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually) |
danger | Executed a process and injected code into it |
watch | Allocates execute permission to another process indicative of possible code injection |
watch | Attempts to remove evidence of file being downloaded from the Internet |
watch | Communicates with host for which no DNS query was performed |
watch | Potential code injection by writing to the memory of another process |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
watch | Used NtSetContextThread to modify a thread in a remote process indicative of process injection |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | One or more potentially interesting buffers were extracted |
notice | Potentially malicious URLs were found in the process memory dump |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
notice | Yara rule detected in process memory |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | This executable has a PDB path |
No | URL | CC | ASN Co | Reporter | Date |
---|---|---|---|---|---|
1 | http://80.66.84.133/YJTURMRG.mp4 hta stealer | BY ![]() | ... | DaveLikesMalwre | 2025.04.15 |
2 | https://www.dropbox.com/scl/fi/xfme3jj5rgt6u5ig7he70/CapCut-Pro.rar?rlkey=ndad0985or8n5rokxmb0pz5k0&... Lumma LummaStealer stealer | US ![]() | DROPBOX | iLikeMalware | 2025.04.13 |
3 | https://sites.google.com/view/robloxfree2025/roblox-free-hack Lumma LummaStealer stealer | US ![]() | iLikeMalware | 2025.04.13 | |
4 | https://drive.google.com/file/d/11SRBeq-5b2C7gf5Z24SzNiSxCTSHONLJ/view Lumma LummaStealer stealer | US ![]() | iLikeMalware | 2025.04.13 | |
5 | https://github.com/Fortnite-Wallhacks-2025/.github/releases/tag/files Lumma LummaStealer stealer | US ![]() | MICROSOFT-CORP-MSN-AS-BLOCK | iLikeMalware | 2025.04.13 |
View only the last 5 |