Summary: 2025/04/17 14:20

First reported date: 2011/03/31
Inquiry period : 2025/04/10 14:20 ~ 2025/04/17 14:20 (7 days), 34 search results

전 기간대비 -24% 낮은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
Google Campaign target China attack 입니다.
악성코드 유형 RAT 도 새롭게 확인됩니다.
공격자 Tick 도 새롭게 확인됩니다.
공격기술 RCE 도 새롭게 확인됩니다.
기관 및 기업 Chinese Ucraina Europe Australia North Korea United Kingdom Brazil ESET German South Korea 도 새롭게 확인됩니다.
기타 threat Telegram SpyNote Last Consumer 등 신규 키워드도 확인됩니다.

안드로이드는 리눅스 커널을 기반으로 구글에서 제작하고 있는 스마트폰과 같은 플랫폼의 모바일 운영 체제와 미들웨어 및 중요 애플리케이션이 포함된 소프트웨어 집합
https://namu.wiki/w/%EC%95%88%EB%93%9C%EB%A1%9C%EC%9D%B4%EB%93%9C(%EC%9A%B4%EC%98%81%EC%B2%B4%EC%A0%9C)

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/17 IT Sicherheitsnews taegliche Zusammenfassung 2025-04-16
    ㆍ 2025/04/17 Gegen unnötigen Akkuverbrauch: So können Android-Entwickler ihre Apps jetzt besser überwachen
    ㆍ 2025/04/17 Exploiting SMS: Threat Actors Use Social Engineering to Target Companies

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1Android 34 ▼ -8 (-24%)
2Malware 20 - 0 (0%)
3Google 17 ▲ 3 (18%)
4Update 13 ▼ -7 (-54%)
5Report 11 ▼ -3 (-27%)
6Campaign 11 ▲ 7 (64%)
7target 10 ▲ 6 (60%)
8China 10 ▲ 8 (80%)
9attack 9 ▲ 5 (56%)
10Windows 8 ▲ 2 (25%)
11Exploit 8 ▼ -3 (-38%)
12WhatsApp 8 ▲ 7 (88%)
13intelligence 7 ▲ 6 (86%)
14Phishing 7 ▲ 3 (43%)
15threat 7 ▲ new
16Vulnerability 6 ▼ -1 (-17%)
17United States 6 ▼ -1 (-17%)
18Trojan 6 - 0 (0%)
19Telegram 6 ▲ new
20ZeroDay 5 ▼ -3 (-60%)
21Linux 5 ▼ -1 (-20%)
22RCE 4 ▲ new
23Ransomware 4 ▲ 3 (75%)
24Email 4 ▲ 2 (50%)
25SpyNote 4 ▲ new
26Kaspersky 4 ▼ -1 (-25%)
27Victim 4 ▲ 2 (50%)
28Russia 4 ▲ 1 (25%)
29Password 3 ▲ 2 (67%)
30Software 3 ▼ -2 (-67%)
31April 3 - 0 (0%)
32Chinese 3 ▲ new
33hacking 3 ▼ -2 (-67%)
34Microsoft 3 - 0 (0%)
35Last 3 ▲ new
36Government 3 ▲ 2 (67%)
37Zusammenfassung 2 - 0 (0%)
38c&c 2 - 0 (0%)
39IoC 2 ▼ -1 (-50%)
40Ucraina 2 ▲ new
41Dark 2 ▲ 1 (50%)
42Consumer 2 ▲ new
43Sicherheitsnews 2 - 0 (0%)
44taegliche 2 - 0 (0%)
45Distribution 2 ▲ 1 (50%)
46RAT 2 ▲ new
47Cryptocurrency 2 ▲ new
48von 2 ▼ -1 (-50%)
49Europe 2 ▲ new
50Snapshot 2 ▲ new
51Advertising 2 ▼ -2 (-100%)
52Malicious Traffic 2 ▲ new
53VPN 2 ▲ new
54Pixel 2 ▲ new
55Australia 2 ▲ new
56Browser 2 ▼ -1 (-50%)
57Chrome 2 ▲ new
58Smishing 2 ▲ 1 (50%)
59BadBazaar 2 ▲ new
60Apple 2 ▼ -1 (-50%)
61hijack 2 ▲ 1 (50%)
62North Korea 2 ▲ new
63Patchday 2 ▼ -1 (-50%)
64United Kingdom 2 ▲ new
65Mehrere 2 ▼ -2 (-100%)
66Schwachstellen 2 ▼ -2 (-100%)
67YARA 1 ▲ new
68Gegen 1 ▲ new
69ANY 1 ▲ new
70WMI 1 ▲ new
71können 1 ▲ new
72powershell 1 - 0 (0%)
73VBScript 1 - 0 (0%)
74ihre 1 ▲ new
75Trends 1 ▲ new
76ltdivgt 1 - 0 (0%)
77Spotify 1 ▲ new
78unnötigen 1 ▲ new
79RUN 1 ▲ new
80actor 1 ▲ new
81Docker 1 ▲ new
82Brazil 1 ▲ new
83ESET 1 ▲ new
84Suricata 1 - 0 (0%)
85Fortinet 1 ▲ new
86DarkWeb 1 - 0 (0%)
87forensic 1 ▲ new
88autoreboot 1 ▲ new
89httpstcoTQX 1 ▲ new
90GitHub 1 - 0 (0%)
91German 1 ▲ new
92South Korea 1 ▲ new
93Banking 1 ▼ -2 (-200%)
94Tick 1 ▲ new
95UNC5221 1 - 0 (0%)
96WinRAR 1 ▲ new
97June 1 ▲ new
98Phones 1 ▲ new
99MFA 1 ▲ new
100Education 1 ▼ -1 (-100%)
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
Trojan
6 (42.9%)
Ransomware
4 (28.6%)
RAT
2 (14.3%)
Grandoreiro
1 (7.1%)
Clipbanker
1 (7.1%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Tick
1 (50%)
UNC5221
1 (50%)
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Campaign
11 (28.2%)
Exploit
8 (20.5%)
Phishing
7 (17.9%)
RCE
4 (10.3%)
hacking
3 (7.7%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
Google
17 (23.9%)
China
10 (14.1%)
United States
6 (8.5%)
Kaspersky
4 (5.6%)
Russia
4 (5.6%)
Threat info
Last 5

SNS

(Total : 11)
  Total keyword

Android Malware China WhatsApp Telegram Google Report Campaign Chinese Exploit hijack Trojan Linux apple hacking Windows ThreatMon target US RCE Update attack United States Supply chain Intelligence

No Title Date
1Cyber_OSINT @Cyber_O51NT
Doctor Web reports that cheap Chinese Android phones are shipping with trojanized WhatsApp and Telegram apps, designed to steal crypto by swapping wallet addresses, with the campaign active since June 2024. #CyberSecurity #Malware https://t.co/c5nERk8d4z
2025.04.17
2The Hacker News @TheHackersNews
???? New Android Phones, Pre-Loaded with Malware?! Since June 2024, cheap Androids from Chinese brands like SHOWJI come with trojanized WhatsApp/Telegram apps out of the box. ???? Fake models: “S24 Ultra”, “Note 13 Pro”, etc. ???? Malware replaces your crypto wallet address in chats https://t.co/5
2025.04.16
3Pierluigi Paganini - Security Affairs @securityaffairs
@DoctorWeb Chinese #Android phones shipped with #malware-laced #WhatsApp, #Telegram apps https://t.co/JlE8ApOWLt #securityaffairs #hacking #China
2025.04.16
4Kaspersky @kaspersky
Your phone might be tracking you—for hackers. And #Apple’s network is helping. ???? Apple’s Find My network can be exploited to remotely track other vendors’ #Android, #Windows, and #Linux devices. Full story ⇒ https://t.co/VtKrEF0DRS #AirTag #CyberSecurity #iOS https://t.co/fUAtl5qLsB
2025.04.15
5BleepingComputer @BleepinComputer
Google adds Android auto-reboot to block forensic data extractions - @billtoulas https://t.co/TQX1uqQHUH https://t.co/TQX1uqQHUH
2025.04.15

Additional information

No data
No data
No data
No URL CC ASN Co Reporter Date
1https://www.kmyjh.top/002.apk
android apk SpyNote
ZA ZAPOWER LINE DATACENTERJAMESWT_WT2025.04.13
2https://www.kmyjh.top/005.apk
android apk SpyNote
ZA ZAPOWER LINE DATACENTERJAMESWT_WT2025.04.13
3https://www.kmyjh.top/004.apk
android apk SpyNote
ZA ZAPOWER LINE DATACENTERJAMESWT_WT2025.04.13
4https://www.kmyjh.top/003.apk
android apk SpyNote
ZA ZAPOWER LINE DATACENTERJAMESWT_WT2025.04.13
5https://kmyjh.top/app-release.apk
android apk SpyNote
ZA ZAPOWER LINE DATACENTERJAMESWT_WT2025.04.13
View only the last 5
Beta Service, If you select keyword, you can check detailed information.