Summary: 2025/05/03 01:04

First reported date: 2012/03/26
Inquiry period : 2025/04/26 01:04 ~ 2025/05/03 01:04 (7 days), 26 search results

전 기간대비 8% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
APT Campaign Malware Government Kaspersky 입니다.
악성코드 유형 ROMCOMRAT CrimsonRAT ROMCOM RAT RAT Konni 도 새롭게 확인됩니다.
공격자 APT28 APT43 도 새롭게 확인됩니다.
공격기술 Phishing Spear Phishing 도 새롭게 확인됩니다.
기관 및 기업 France Iranian ESET Iran NATO 도 새롭게 확인됩니다.
기타 target Asia French TransparentTribe Earth 등 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/05/02 IPv6 SLAAC exploited by Chinese APT for AitM attacks
    ㆍ 2025/05/02 Multi-stage malware attacks launched by Nebulous Mantis APT
    ㆍ 2025/04/30 Tracking APT SideWinder Domains By Combining Regex Patterns, Whois Records and Domain Registrars

Trend graph by period


Related keyword cloud
Top 100

APTCampaignMalwaretargetattackGovernmentdprkNorth KoreaKasperskyRussiaAsiaFrenchTransparentTribeEarthKurmaAPT28OperationFrancehackingNetWireRCReportROMCOMRATampFileCrimsonRATapt36ThreatProtectionMultistageMarchTheWizardsChinese가상자산관련China외부CryptocurrencyUpdateSLAACRussiansamplePhishingNSFOCUSsecurityaffairsIoCSoutheastSouth KoreaLazaruscriticalIranianROMCOM RATRATAlertRussianspeakingEspionageKimsukygroupESETPatternsMiddleTrendMicroIranserverIPvSoftwareAdvertisingExploithttpsexpressholidayscoinupsrphpsecurenesstcomInfraDomainsMantisNebulousNATOscriptVBASpear PhishingRegexhttpstcoqiLSideWinderHashTrendMicroRSRCHhttpstcod48032d835c95af816fbcea6e659cdbeDecoyCompromisehttpstcowCBsLIQolKEntitiesUsinghttpsgofinanciallycomimagesuploadNortonLifeLockKonniURLorgsBriefingAPT43Monthlyctitrend
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
NetWireRC
3 (25%)
ROMCOMRAT
3 (25%)
CrimsonRAT
2 (16.7%)
ROMCOM RAT
1 (8.3%)
RAT
1 (8.3%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
APT28
3 (37.5%)
Lazarus
2 (25%)
Kimsuky
1 (12.5%)
APT43
1 (12.5%)
APT37
1 (12.5%)
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
APT
26 (44.8%)
Campaign
22 (37.9%)
hacking
3 (5.2%)
Phishing
2 (3.4%)
Exploit
1 (1.7%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
Government
4 (12.1%)
dprk
4 (12.1%)
North Korea
4 (12.1%)
Kaspersky
4 (12.1%)
Russia
4 (12.1%)
Threat info
Last 5

SNS

(Total : 21)
  Total keyword

APT Campaign Malware target North Korea dprk attack Kaspersky NetWireRC France Russia ROMCOMRAT hacking APT28 Cryptocurrency CrimsonRAT Lazarus IoC South Korea Phishing Government hijack Backdoor Update RAT China ROMCOM RAT RomCom Iran ESET Iranian Hijacking Report Spear Phishing Kimsuky APT43 APT37 Chinese Konni

No Title Date
1Cyber Team @Cyberteam008
[2/2] Infra: 185.235.137.195:3311 185.235.137.195:3309 server1.securenesst.com securenesst.com https://expressholidays.co.in/ups/r.php @500mk500 #APT36 #TransparentTribe #CrimsonRAT #Malware #ioc
2025.05.02
2Cyber Team @Cyberteam008
[1/2] #APT36 / #TransparentTribe 's #CrimsonRAT Campaign through HTML Frame attack File: presentation.accdb (it executes a VBA script) 30908d3c69dc8aaa0368b3a3593eb66c File: Syssm.exe (dropped by VBA script from "expressholidays.co.in") e948aa916d1f9f9b5bba72ad7de7e27f https://t.co/SdxeBrj6a7
2025.05.02
3acosador @adqewrsf
#APT #DPRK file name: 공문_가상자산관련 외부평가위원 위촉 안내.hwp.lnk sha256: 09b0aba40f1da5f3455a6f4097f5a9c88d80a51f2b5f9505370d323b6a78b6f0 https://www.sitisrlweb.com/wp-includes/js/src/get.php, list.php ,upload.php same decoy file vt: https://t.co/oe2J0iFSHU https://t.co/4cXufo6AD2 https://t.co/AIN319qNH4
2025.05.02
4Threat Intelligence @threatintel
#ThreatProtection Iranian #APT targeted critical Middle Eastern infrastructure, read more: https://t.co/tezDS3IBSZ
2025.05.01
5JangPro @JangPr0
#APT #DPRK f9f3b762ed1719bf141c38f8c4f21d76cd65c5ac6c62a4b94ce68569ce87178c Decoy: 가상자산 관련 외부평가위원 위촉 안내.hwp.lnk https://www.seacura.com/wp-includes/js/src/list.php & upload.php & get.php https://t.co/thEJwGxvI2
2025.04.30

Additional information

Level Description
danger File has been identified by 56 AntiVirus engines on VirusTotal as malicious
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice The binary likely contains encrypted or compressed data indicative of a packer
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path
No Category URL CC ASN Co Date
1c2http://00701111.000webhostapp.com/wp-extra/show.phpUS US...2023.09.18
No URL CC ASN Co Reporter Date
1https://jpkinki.com/fjugm
APT Kimsuky
US USCLOUDFLARENETIdaNotPro2025.03.26
2https://www.dropbox.com/scl/fi/cnfhxf0nc3qxfklznh5na/zzJG_2.zip?rlkey=7t1et81enar4uvbb7nnk58m9b&st=2...
APT Kimsuky zip
US USDROPBOXabuse_ch2025.02.12
3https://www.dropbox.com/scl/fi/icvpzbx4vn6lcthva168z/zzJG.zip?rlkey=kntc36792grkm64xriqputbdq&st=px5...
APT Kimsuky
US USDROPBOXJAMESWT_MHT2025.02.05
4https://liuyi.neectar.info/hsdverd_3ed5d/mdswsourt_4rfs
APT decoy Patchwork PDF
GB GBabuse_ch2025.01.22
5https://liuyi.neectar.info/lksderdd_4dferd/jhdfer3s_jh3de
APT exe Patchwork rustystealer
GB GBabuse_ch2025.01.22
View only the last 5
Beta Service, If you select keyword, you can check detailed information.