Summary: 2025/04/15 18:25
Inquiry period : 2025/04/08 18:25 ~ 2025/04/15 18:25 (7 days), 2,000 search results
전 기간대비 상승한 Top5 연관 키워드는 Update United States Attack target Microsoft 입니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/15 Crypto Firm Bitdeer Prioritizes Mining to Weather Tariff Turmoil
ㆍ 2025/04/15 China Says US Hacked Networks of 2025 Asian Winter Games
ㆍ 2025/04/15 마에스트로 포렌식, macOS 포렌식 솔루션 ‘마에스트로 위즈덤’ 런칭
Trend graph by period
Total number of trend targets
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Malware | 347 | ▼ -24 (-7%) |
2 | Update | 194 | ▲ 26 (13%) |
3 | Report | 184 | ▼ -20 (-11%) |
4 | United States | 180 | ▲ 20 (11%) |
5 | Attack | 165 | ▲ 23 (14%) |
6 | target | 163 | ▲ 3 (2%) |
7 | Ransomware | 138 | ▼ -15 (-11%) |
8 | Microsoft | 125 | ▲ 37 (30%) |
9 | Exploit | 121 | ▼ -3 (-2%) |
10 | Software | 103 | ▼ -25 (-24%) |
11 | Vulnerability | 102 | ▲ 13 (13%) |
12 | Alert | 99 | ▼ -29 (-29%) |
13 | Windows | 94 | ▲ 28 (30%) |
14 | MWNEWS | 90 | ▲ 20 (22%) |
15 | AI | 88 | ▲ 14 (16%) |
16 | Campaign | 88 | ▼ -34 (-39%) |
17 | Victim | 86 | ▼ -25 (-29%) |
18 | RCE | 86 | ▲ 81 (94%) |
19 | Education | 79 | ▲ 16 (20%) |
20 | Operation | 79 | ▲ 4 (5%) |
21 | China | 76 | ▲ 3 (4%) |
22 | hacking | 71 | ▼ -15 (-21%) |
23 | Phishing | 69 | ▼ -25 (-36%) |
24 | intelligence | 66 | ▼ -31 (-47%) |
25 | 64 | ▲ 3 (5%) | |
26 | 60 | ▼ -17 (-28%) | |
27 | Threat | 60 | ▼ -10 (-17%) |
28 | Advertising | 57 | ▲ 7 (12%) |
29 | DDoS | 53 | ▼ -8 (-15%) |
30 | Kaspersky | 52 | ▼ -22 (-42%) |
31 | Criminal | 47 | ▼ -7 (-15%) |
32 | Alleged | 46 | ▼ -14 (-30%) |
33 | Schwachstellen | 40 | ▲ 6 (15%) |
34 | Russia | 40 | ▲ 3 (8%) |
35 | South Korea | 40 | ▼ -7 (-18%) |
36 | access | 39 | ▲ 17 (44%) |
37 | Government | 37 | ▼ -10 (-27%) |
38 | US | 36 | ▲ 2 (6%) |
39 | last | 35 | ▲ 3 (9%) |
40 | von | 34 | ▲ 4 (12%) |
41 | North Korea | 33 | ▼ -13 (-39%) |
42 | Dark | 33 | ▲ 2 (6%) |
43 | Sale | 32 | ▼ -9 (-28%) |
44 | Zusammenfassung | 31 | ▲ 2 (6%) |
45 | April | 31 | ▲ 10 (32%) |
46 | Mehrere | 31 | ▲ 3 (10%) |
47 | Sicherheitsnews | 31 | ▲ 2 (6%) |
48 | taegliche | 30 | ▲ 3 (10%) |
49 | c&c | 30 | ▼ -5 (-17%) |
50 | Group | 30 | ▼ -23 (-77%) |
51 | Ucraina | 30 | ▲ 8 (27%) |
52 | NetWireRC | 29 | - 0 (0%) |
53 | Data | 29 | ▼ -28 (-97%) |
54 | Android | 29 | ▼ -9 (-31%) |
55 | securityaffairs | 29 | ▼ -16 (-55%) |
56 | ChatGPT | 29 | ▼ -4 (-14%) |
57 | ZeroDay | 28 | ▲ 4 (14%) |
58 | DarkWeb | 28 | ▼ -35 (-125%) |
59 | India | 27 | ▲ 3 (11%) |
60 | httpstco | 27 | ▲ 4 (15%) |
61 | Linux | 26 | ▼ -6 (-23%) |
62 | code | 26 | ▲ 10 (38%) |
63 | IoC | 25 | ▼ -3 (-12%) |
64 | CISA | 25 | ▼ -1 (-4%) |
65 | breach | 25 | ▼ -15 (-60%) |
66 | United Kingdom | 24 | ▲ 8 (33%) |
67 | Stealer | 23 | ▼ -2 (-9%) |
68 | Schwachstelle | 23 | ▼ -8 (-35%) |
69 | 22 | ▲ 9 (41%) | |
70 | Remote | 21 | ▲ 9 (43%) |
71 | XSS | 21 | ▲ 12 (57%) |
72 | CVE | 21 | - 0 (0%) |
73 | advisory | 20 | ▲ 4 (20%) |
74 | VPN | 20 | - 0 (0%) |
75 | Fortinet | 20 | ▲ 18 (90%) |
76 | Website | 20 | ▼ -6 (-30%) |
77 | NortonLifeLock | 20 | ▼ -2 (-10%) |
78 | Distribution | 20 | ▼ -10 (-50%) |
79 | Password | 20 | ▼ -6 (-30%) |
80 | Apple | 19 | ▼ -25 (-132%) |
81 | Register | 19 | ▼ -13 (-68%) |
82 | cloud | 19 | ▲ 1 (5%) |
83 | Team | 19 | ▲ 4 (21%) |
84 | WordPress | 18 | ▼ -1 (-6%) |
85 | Europe | 18 | ▼ -13 (-72%) |
86 | Artikel | 18 | ▼ -10 (-56%) |
87 | Leak | 18 | ▲ 4 (22%) |
88 | ABB | 18 | ▲ 14 (78%) |
89 | amp | 18 | ▼ -3 (-17%) |
90 | Cylon | 18 | ▲ 14 (78%) |
91 | Telegram | 17 | ▲ 7 (41%) |
92 | plugin | 17 | ▲ 2 (12%) |
93 | YouTube | 17 | ▲ 8 (47%) |
94 | Israel | 17 | - 0 (0%) |
95 | Future | 17 | ▲ 2 (12%) |
96 | Trump | 17 | ▼ -8 (-47%) |
97 | webapps | 17 | ▲ 14 (82%) |
98 | Browser | 16 | ▼ -4 (-25%) |
99 | powershell | 16 | ▲ 5 (31%) |
100 | hijack | 16 | ▼ -4 (-25%) |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Ransomware |
|
138 (37.5%) |
NetWireRC |
|
29 (7.9%) |
Akira |
|
14 (3.8%) |
Trojan |
|
14 (3.8%) |
RAT |
|
14 (3.8%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|---|---|
Gamaredon |
|
10 (22.7%) |
Shuckworm |
|
8 (18.2%) |
Lazarus |
|
6 (13.6%) |
Volt Typhoon |
|
4 (9.1%) |
Kimsuky |
|
3 (6.8%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
United States |
|
180 (13.8%) |
Microsoft |
|
125 (9.6%) |
China |
|
76 (5.8%) |
|
64 (4.9%) | |
Kaspersky |
|
52 (4%) |
Malware Type
Top 5
Detailed trend analysis by malware type.
Threat info
Last 5SNS
(Total : 865)target Ransomware Attack Malware Report Victim United States Exploit Update Microsoft DDoS hacking Vulnerability Campaign Kaspersky Windows Phishing Email Operation RCE Attacker DarkWeb North Korea Criminal Education Russia NetWireRC US CVE Stealer China Ucraina IoC Advertising Google C2 dprk India Fortinet Israel c&c APT plugin Akira intelligence Recorded Future Government Password ZeroDay WordPress ChatGPT CISA hijack njRAT Ukraine United Kingdom Africa Spain ...VPN Android Software Oracle Telegram Gamaredon Australia Proofpoint WhatsApp conference RAT Trojan Lumma spyware France Supply chain USA LockBit Shuckworm Open Directory Konni Backdoor GitHub Distribution Linux XWorm arrest CVSS Cryptocurrency powershell payment Chrome Europe Cloudflare Browser Lazarus Symantec PayPal South Korea AhnLab MacOS AsyncRAT Hijacking ESET Opendir UK Indonesia Türkiye Kimsuky Banking Takedown Social Engineering Canada Japan Police VBScript Mandiant BlackSuit Palo Alto Networks Chinese Smishing Black Basta Taiwan ShadowPad GameoverP2P SMB 보고서 Kali Germany SentinelOne Trend Micro RSA Conference NAS Safari UN DDNS MFA ViperSoftX Check Point Viper Vawtrak Facebook Brazil EDR IOCs CrowdStrike Italy Cisco TraderTraitor DarkComet Anonymous Binance WildNeutron ENERGETIC BEAR Attacks Volt Typhoon Campagna VBS RaaS ValleyRAT ThreatMon Rhysida Ransomware Rhysida apt38 Red Team Rapid7 Remcos AgentTesla Maze Colombia Amadey DCRat RansomHouse keylogger SnakeKeylogger Xloader MalSpam Instagram SSRF Discord HijackLoader LummaStealer SECUI Turkey Router GootLoader Dbatloader FakeUpdates SmokeLoader OpenAI Docker VirusTotal AnyDesk LinkedIn 해킹 북한 Iran Singapore Clop Saudi Arabia PlugX SideCopy Remote Code Execution Magento ComputerName ISFB OSINT iot Syrian Microsoft Edge catch Amazon Gmail MDR Targeted DNS McAfee Zero Trust YouTube Lobshot Blue Team
News
(Total : 1129)Malware Update United States Report attack Software Microsoft Exploit Vulnerability Windows RCE target Education China Campaign Attacker Operation intelligence Google Ransomware Advertising Phishing South Korea hacking Email Victim Criminal Government Android Russia Kaspersky Linux XSS ChatGPT ZeroDay US Apple CISA c&c WhatsApp YouTube Distribution United Kingdom DDoS Ucraina India Europe Remote Code Execution North Korea VPN Cisco Cryptocurrency Browser powershell Data Center MFA Telegram Password NetWireRC Germany IoC Supply chain Twitter ...iPhone Japan conference WordPress GameoverP2P Amazon arrest Australia Java CVSS The Shadow Brokers Iran payment AhnLab Trojan Backdoor Smishing Microsoft Edge GitHub hijack Taiwan Chrome RAT Instagram Social Engineering Vawtrak QRadar Security Suite Africa Canada Palo Alto Networks Fortinet ESET Patch Banking Stealer DarkWeb Oracle LinkedIn Red Hat Facebook Takedown Zero Trust Saudi Arabia 구글 DNS MacOS TikTok DYEPACK CVE RSA Conference Chinese plugin IBM Egypt KISA Forensics 미국 Israel Kakao 교육 FBI IcedID OpenAI SentinelOne Check Point UAE CrowdStrike Red Team DLP VirusTotal France RATel Akamai 피싱 VMware Black Basta Italy Clop Gamaredon SSRF Router Lobshot NSA XDR Shuckworm 한국 Firmware EDR Docker training Spain 일본 PoC Singapore SMB ToddyCat Paloalto 컨퍼런스 Okta Cryptocurrency Miner Cobalt Strike targeted WMI Downloader VBScript Alibaba Hijacking Volt Typhoon IoT Spyware Ukraine 업무 협약 Hong Kong WAF SmokeLoader Botnet Naver UK Phone scam Kali APT Cryptographic key 독일 Black Hat Mandiant KakaoTalk Recorded Future Gmail Cobra Carbon System Tick 취약점 Lazarus Cloudflare IDC 윈도우 LockBit 악성코드 Nato 북한 RevengeRAT 세미나 Fasoo 캐나다 파수 시스코 Ubuntu Police CCTV Deface RaaS Akira keylogger Attacks Anchor SideCopy 포렌식 Tenable Rapid7 Firefox Open Directory 안랩 Emotet Kubernetes NIST Hacked Alureon 세이프브리치 hooking 아랍에미리트 Binance UN Watchdog RSA TP-Link Vendetta 광고 업그레이드 Softcamp 안랩 XDR 크롬 Cobalt Tor USA 카카오 OmniAir Deloitte 콘퍼런스 TraderTraitor FakeUpdates Uptycs Upgrade 스미싱 Iranian MedusaLocker HyperSSL SCADA 우크라이나 APT35 SideWinder ReverseRAT ActionRAT AsyncRAT Spear Phishing RaonSecure SolarWinds DDNS Lumma Copy-Paste 캠페인 깃허브 SystemBC TrickBot Pikabot BumbleBee Entropy ViperSoftX Adwind 블랙햇 보이스피싱 Dropper Raccoon FormBook RedLine Remcos Nanocore RecordBreaker Xloader SparkRAT American Express NirCmd KrakenKeylogger Accenture Clipbanker Magic Kitten Ads 카스퍼스키 Magento Steam German DocuSign DonRoad Team Viper Cambodia Secureworks WannaCry WannaCryptor Malvertising DoTNet ENERGETIC BEAR Splunk Trend Micro xabyss Jupiter Symantec Zscaler CyberArk Darktrace OSINT dailysecu Kill Security 오라클 CatB INCA Internet 잉카인터넷 Konni CVEs NIS AnyDesk Fujitsu 업데이트 Blue Team Stealc Türkiye MgBot Syrian Anonymous
1 | 몽키힙, ‘서울형 키즈카페 청소 AI 리포트 시스템’ 정식 출시… 운영자 중심 서비스 강화 - 데일리시큐 | 2025.04.15 |
2 | Crypto Firm Bitdeer Prioritizes Mining to Weather Tariff Turmoil - Bloomberg Technology | 2025.04.15 |
3 | China Says US Hacked Networks of 2025 Asian Winter Games - Bloomberg Technology | 2025.04.15 |
4 | ‘2025 서울재즈페스타’, 4월 27일 노들섬에서 개최 - 데일리시큐 | 2025.04.15 |
5 | 마에스트로 포렌식, macOS 포렌식 솔루션 ‘마에스트로 위즈덤’ 런칭 - 시큐리티팩트 | 2025.04.15 |
Additional information
No | Title | Date |
---|---|---|
1 | Closing the Gap: How to Build a Consistent Exposure and Vulnerability Management Workflow - Malware.News | 2025.04.15 |
2 | Colleges and Schools Now Top Targets for Online Threat Actors - Malware.News | 2025.04.15 |
3 | Trump Revenge Tour Targets Cyber Leaders, Elections - Malware.News | 2025.04.15 |
4 | GenAI vulnerabilities fixed only 21% of the time after pentesting - Malware.News | 2025.04.15 |
5 | Meta slurps up EU user data for AI training - Malware.News | 2025.04.15 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | AI로 보안 강화…안랩, AI 플랫폼 '안랩 AI 플러스' 출시 - 시큐리티팩트 | 2025.04.15 |
2 | Japan Orders Google to Stop Forcing Phone Makers to Use its Apps - Bloomberg Technolo... | 2025.04.15 |
3 | Colleges and Schools Now Top Targets for Online Threat Actors - Malware.News | 2025.04.15 |
4 | 라온시큐어 컨소시엄, 과기정통부 양자내성암호 시범사업 선정 - 데일리시큐 | 2025.04.15 |
5 | 라온시큐어 컨소시엄, 과기정통부 양자내성암호 시범사업 선정 - 데일리시큐 | 2025.04.15 |
View only the last 5 |
Level | Description |
---|---|
danger | Executed a process and injected code into it |
warning | File has been identified by 28 AntiVirus engines on VirusTotal as malicious |
watch | Allocates execute permission to another process indicative of possible code injection |
watch | Code injection by writing an executable or DLL to the memory of another process |
watch | Communicates with host for which no DNS query was performed |
watch | Deletes executed files from disk |
watch | Manipulates memory of a non-child process indicative of process injection |
watch | Potential code injection by writing to the memory of another process |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
watch | Used NtSetContextThread to modify a thread in a remote process indicative of process injection |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Checks adapter addresses which can be used to detect virtual network interfaces |
notice | Creates executable files on the filesystem |
notice | Drops an executable to the user AppData folder |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | One or more potentially interesting buffers were extracted |
notice | Performs some HTTP requests |
notice | Uses Windows utilities for basic Windows functionality |
notice | Yara rule detected in process memory |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | Uses Windows APIs to generate a cryptographic key |
Network | ET DROP Spamhaus DROP Listed Traffic Inbound group 13 |
Network | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
Network | ET INFO Executable Download from dotted-quad Host |
Network | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
Network | ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile |
Network | ET POLICY PE EXE or DLL Windows file download HTTP |
No | Category | URL | CC | ASN Co | Date |
---|---|---|---|---|---|
1 | malicious | https://u1.unbentoverwrite.shop/ | US ![]() | CLOUDFLARENET | 2025.04.15 |
2 | malicious | https://u1.curtainfrown.shop/ | US ![]() | CLOUDFLARENET | 2025.04.14 |
3 | malware | https://lumiraseo.com/download/payload.exe | DE ![]() | ... | 2025.04.14 |
4 | c2 | http://185.246.113.135:1604/ | ES ![]() | Soltia Consulting SL | 2025.04.14 |
5 | c2 | http://45.81.115.40:1951/ | UA ![]() | meerfarbig GmbH & Co. KG | 2025.04.14 |
View only the last 5 |
No | URL | CC | ASN Co | Reporter | Date |
---|---|---|---|---|---|
1 | http://60.19.220.214:57536/i 32-bit elf mips Mozi | CN ![]() | CHINA UNICOM China169 Backbone | geenensp | 2025.04.15 |
2 | http://115.49.67.158:42886/i 32-bit elf mips Mozi | CN ![]() | CHINA UNICOM China169 Backbone | geenensp | 2025.04.15 |
3 | http://112.248.124.229:51848/i 32-bit elf mips Mozi | CN ![]() | CHINA UNICOM China169 Backbone | geenensp | 2025.04.15 |
4 | http://138.204.196.254:60966/i 32-bit arm elf Mozi | BR ![]() | IUB Telecom Ltda | geenensp | 2025.04.15 |
5 | http://182.126.164.162:57128/i 32-bit elf mips Mozi | CN ![]() | CHINA UNICOM China169 Backbone | geenensp | 2025.04.15 |
View only the last 5 |