Summary: 2025/05/03 16:41

First reported date: 2015/02/02
Inquiry period : 2025/04/03 16:41 ~ 2025/05/03 16:41 (1 months), 21 search results

전 기간대비 43% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
Trend North Korea cti dprk Report 입니다.
공격자 APT37 CryptoCore unc4899 도 새롭게 확인됩니다.
공격기술 Phishing APT Backdoor Spear Phishing 도 새롭게 확인됩니다.
기관 및 기업 Japan Mandiant Taiwan Government 도 새롭게 확인됩니다.
기타 Micros Software March Think AI 등 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/05/02 Gefährlicher Trend: So viele Nutzer vertrauen KI-Ergebnissen blind
    ㆍ 2025/04/13 Vibe-Coding: Das steckt hinter dem neuen Trend, der Programmieren für alle ermöglicht
    ㆍ 2025/04/10 March 2025 Infostealer Trend Report

Trend graph by period


Related keyword cloud
Top 100

TrendNorth KoreactidprkTrend MicroReportCampaigntargetPhishingMicrosZeroDaySoftwareAPTBackdoorMonthlyGoogleExploitMarchLazarusintelligenceAhnLabAPT37MicroThinkITWorkerAIactionfunattackTrendsJapanGefährlicherUNCUnitJanuaryMarchExtortionSovieleMandiantRansomwareNSFOCUSCryptoCoreTraderTraitorDatajumpypiscesTaiwanBriefingVulnerabilityrecentHiroakiHarariseoverallnumberSpear PhishingMalwareGovernmentDaiNickFriendTopOldMyCVEEmailunc4899GooglestechenduserAdvertisingTierunc5342AhnLabSecuInfoUNC4736OneStealerDistributionKasperskyCriminalRussiayouthtechsavvycyEffectiveAzureVisionderOperationMicrosoftWasmitwelcheundDeepCentralApexUpdateInfostealerDasunc3782
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
Ransomware
1 (33.3%)
Konni
1 (33.3%)
BPFDoor
1 (33.3%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Lazarus
2 (20%)
APT37
2 (20%)
CryptoCore
1 (10%)
TraderTraitor
1 (10%)
unc4899
1 (10%)
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Campaign
4 (26.7%)
Phishing
3 (20%)
APT
2 (13.3%)
Backdoor
2 (13.3%)
Exploit
2 (13.3%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
North Korea
7 (20.6%)
dprk
7 (20.6%)
Trend Micro
5 (14.7%)
Google
2 (5.9%)
AhnLab
2 (5.9%)
Threat info
Last 5

SNS

(Total : 15)
  Total keyword

North Korea dprk Report target Trend Micro Campaign Phishing ZeroDay Google APT Exploit Lazarus Backdoor attack APT37 CVE Email Spear Phishing Taiwan Advertising Attacker Malware Government Vulnerability Ransomware BPFDoor sectora01 Egypt South Korea Hong Kong Kaspersky Criminal Russia UNC4736 CryptoCore TraderTraitor Mandiant unc4899 unc1069 intelligence AhnLab SECUI 보고서 Konni Kimsuky Japan

No Title Date
1Virus Bulletin @virusbtn
Trend Micro's Hara Hiroaki outlines recent modifications observed in Earth Kasha’s TTPs in its latest campaign, detected in March 2025, targeting Taiwan & Japan. The attack begins with a spear-phishing email that leads to a new version of the ANEL backdoor https://t.co/uPzsBAhS9A https://t.co/RZ
2025.05.02
2Malwarebytes @Malwarebytes
The number of known Zero-day attacks were down in 2024, but the overall trend is still on the rise. https://t.co/AwJUcPZH7F
2025.05.01
3Virus Bulletin @virusbtn
Trend Micro's Nick Dai & Sunny Lu look into the Earth Kurma APT campaign targeting government and telecommunications sectors in Southeast Asia. The campaign used advanced malware, rootkits, and trusted cloud services to conduct cyberespionage. https://t.co/J1btG6LWZo https://t.co/sFwJtIJ4mJ
2025.04.30
4Mandiant (part of Google Cloud) @Mandiant
In 2024, attackers exploited 75 zero-days across end-user platforms and enterprise tech. Google’s latest report unpacks what this trend says about evolving threat priorities. Full analysis here: https://t.co/UO3IVKxFbj https://t.co/wJZHqLCcXD
2025.04.29
5lazarusholic @lazarusholic
"Hello 0-Days, My Old Friend: A 2024 Zero-Day Exploitation Analysis" published by @googlecloud. #APT37, #CVE-2024-21338, #CVE-2024-38178, #Trend, #DPRK, #CTI https://t.co/Psbiib6oMk
2025.04.29

Additional information

No data
No data
No data
No data
Beta Service, If you select keyword, you can check detailed information.