Summary: 2025/04/19 12:35
First reported date: 2004/10/06
Inquiry period : 2025/04/12 12:35 ~ 2025/04/19 12:35 (7 days), 11 search results
전 기간대비 -73% 낮은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 c&c Campaign Vulnerability Exploit Phishing 입니다.
악성코드 유형 NetWireRC Lumma Trojan TONESHELL PlugX MgBot Black Basta Vidar ZXShell RAT XWorm AsyncRAT 도 새롭게 확인됩니다.
공격자 Hacking Team Equation Group Volt Typhoon MuddyWater 도 새롭게 확인됩니다.
공격기술 Dropper 도 새롭게 확인됩니다.
기관 및 기업 China Taiwan Rapid7 Police Zscaler Canada Cisco McAfee Iran United Kingdom 도 새롭게 확인됩니다.
기타 Cobalt Sliver Kali The Shadow Brokers Mustan 등 신규 키워드도 확인됩니다.
Gameover ZeuS is a peer-to-peer botnet based on components from the earlier ZeuS trojan. According to a report by Symantec, Gameover Zeus has largely been used for banking fraud and distribution of the CryptoLocker ransomware. In early June 2014, the U.S. Department of Justice announced that an international inter-agency collaboration named Operation Tovar had succeeded in temporarily cutting communication between Gameover ZeuS and its command and control servers. Ref.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/18 Dark Web Market: STYX Market
ㆍ 2025/04/18 Inside Black Basta: Ransomware Resilience and Evolution After the Leak
ㆍ 2025/04/17 Strengthening Zero Trust Security with Expert Penetration Testing
참고로 동일한 그룹의 악성코드 타입은 PingPull Prometei Mirai 등 9개 종이 확인됩니다.
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | GameoverP2P | 11 | ▼ -8 (-73%) |
2 | Malware | 10 | ▼ -4 (-40%) |
3 | c&c | 7 | ▲ 5 (71%) |
4 | Campaign | 7 | ▲ 1 (14%) |
5 | Vulnerability | 6 | ▲ 1 (17%) |
6 | Report | 6 | ▼ -2 (-33%) |
7 | Exploit | 6 | ▲ 1 (17%) |
8 | Update | 6 | ▼ -4 (-67%) |
9 | Phishing | 5 | ▲ 3 (60%) |
10 | 5 | - 0 (0%) | |
11 | United States | 5 | ▼ -7 (-140%) |
12 | Criminal | 4 | ▲ 2 (50%) |
13 | Windows | 4 | ▼ -5 (-125%) |
14 | Microsoft | 4 | ▼ -4 (-100%) |
15 | Victim | 4 | ▼ -1 (-25%) |
16 | IoC | 4 | ▲ 1 (25%) |
17 | Advertising | 4 | ▼ -5 (-125%) |
18 | Cobalt Strike | 4 | ▲ 3 (75%) |
19 | attack | 4 | ▼ -2 (-50%) |
20 | Social Engineering | 3 | ▲ 2 (67%) |
21 | Browser | 3 | ▲ 2 (67%) |
22 | intelligence | 3 | ▼ -2 (-67%) |
23 | powershell | 3 | ▼ -2 (-67%) |
24 | Linux | 3 | ▲ 1 (33%) |
25 | Software | 3 | ▼ -3 (-100%) |
26 | EDR | 3 | ▲ 1 (33%) |
27 | Stealer | 3 | ▲ 2 (67%) |
28 | VPN | 3 | ▲ 2 (67%) |
29 | Ransomware | 3 | - 0 (0%) |
30 | GitHub | 3 | ▲ 2 (67%) |
31 | Operation | 3 | ▼ -5 (-167%) |
32 | target | 3 | ▼ -4 (-133%) |
33 | NetWireRC | 3 | ▲ new |
34 | Cryptocurrency | 2 | ▲ 1 (50%) |
35 | Vawtrak | 2 | ▼ -1 (-50%) |
36 | Kaspersky | 2 | - 0 (0%) |
37 | Lumma | 2 | ▲ new |
38 | RCE | 2 | ▼ -3 (-150%) |
39 | Backdoor | 2 | - 0 (0%) |
40 | VBScript | 2 | - 0 (0%) |
41 | 2 | ▲ 1 (50%) | |
42 | Anonymous | 2 | ▲ 1 (50%) |
43 | Cobalt | 2 | ▲ new |
44 | Telegram | 2 | ▲ 1 (50%) |
45 | AI | 2 | ▲ 1 (50%) |
46 | Sliver | 2 | ▲ new |
47 | China | 2 | ▲ new |
48 | RedLine | 1 | - 0 (0%) |
49 | Kali | 1 | ▲ new |
50 | Taiwan | 1 | ▲ new |
51 | The Shadow Brokers | 1 | ▲ new |
52 | Hacking Team | 1 | ▲ new |
53 | Equation Group | 1 | ▲ new |
54 | Mustan | 1 | ▲ new |
55 | driver | 1 | ▲ new |
56 | SplatCloak | 1 | ▲ new |
57 | cloud | 1 | ▲ new |
58 | Dropper | 1 | ▲ new |
59 | keylogger | 1 | ▲ new |
60 | Trojan | 1 | ▲ new |
61 | hijack | 1 | - 0 (0%) |
62 | TONESHELL | 1 | ▲ new |
63 | PlugX | 1 | ▲ new |
64 | Volt Typhoon | 1 | ▲ new |
65 | MgBot | 1 | ▲ new |
66 | ComputerN | 1 | ▲ new |
67 | ChatGPT | 1 | - 0 (0%) |
68 | Rapid7 | 1 | ▲ new |
69 | Black Basta | 1 | ▲ new |
70 | Raccoon | 1 | - 0 (0%) |
71 | VMware | 1 | ▲ new |
72 | Vidar | 1 | ▲ new |
73 | Distribution | 1 | ▼ -3 (-300%) |
74 | question | 1 | ▲ new |
75 | DarkWeb | 1 | - 0 (0%) |
76 | SaaS | 1 | ▲ new |
77 | real | 1 | ▲ new |
78 | hac | 1 | ▲ new |
79 | arrest | 1 | ▲ new |
80 | Russia | 1 | - 0 (0%) |
81 | Police | 1 | ▲ new |
82 | ZXShell | 1 | ▲ new |
83 | schtasks | 1 | ▲ new |
84 | Trust | 1 | ▲ new |
85 | Zscaler | 1 | ▲ new |
86 | W | 1 | ▲ new |
87 | Canada | 1 | ▲ new |
88 | RAT | 1 | ▲ new |
89 | ZeroDay | 1 | ▼ -1 (-100%) |
90 | Cisco | 1 | ▲ new |
91 | McAfee | 1 | ▲ new |
92 | XWorm | 1 | ▲ new |
93 | Iran | 1 | ▲ new |
94 | United Kingdom | 1 | ▲ new |
95 | Apple | 1 | ▲ new |
96 | MuddyWater | 1 | ▲ new |
97 | AsyncRAT | 1 | ▲ new |
98 | Street | 1 | ▲ new |
99 | privacy | 1 | ▲ new |
100 | house | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
GameoverP2P |
|
11 (32.4%) |
Ransomware |
|
3 (8.8%) |
NetWireRC |
|
3 (8.8%) |
Vawtrak |
|
2 (5.9%) |
Lumma |
|
2 (5.9%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|---|---|
Anonymous |
|
2 (33.3%) |
Hacking Team |
|
1 (16.7%) |
Equation Group |
|
1 (16.7%) |
Volt Typhoon |
|
1 (16.7%) |
MuddyWater |
|
1 (16.7%) |

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Campaign |
|
7 (23.3%) |
Exploit |
|
6 (20%) |
Phishing |
|
5 (16.7%) |
Social Engineering |
|
3 (10%) |
Stealer |
|
3 (10%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
United States |
|
5 (20%) |
Microsoft |
|
4 (16%) |
Kaspersky |
|
2 (8%) |
|
2 (8%) | |
China |
|
2 (8%) |
Malware Family
Top 5
A malware family is a group of applications with similar attack techniques.
In this trend, it is classified into Ransomware, Stealer, RAT or Backdoor, Loader, Botnet, Cryptocurrency Miner.
Threat info
Last 5SNS
(Total : 1)News
(Total : 10)GameoverP2P Malware c&c Campaign Vulnerability Report Exploit Update Attacker Phishing Email United States Cobalt Strike attack Advertising Criminal IoC Victim Microsoft Windows intelligence Software powershell Linux EDR Stealer GitHub NetWireRC Ransomware VPN Operation target Social Engineering Browser VBScript Cryptocurrency Kaspersky Lumma RCE Backdoor Google Sliver Telegram Cobalt China Anonymous The Shadow Brokers Hacking Team Equation Group Dropper keylogger Trojan hijack TONESHELL PlugX schtasks Zscaler Taiwan Volt Typhoon Rapid7 Kali DarkWeb Russia Vidar Raccoon RedLine Black Basta MUSTANG PANDA VMware Distribution arrest Police ZXShell MgBot Iran RAT ZeroDay Cisco McAfee Vawtrak XWorm IcedID MuddyWater AsyncRAT Password Canada United Kingdom ...
No | Title | Date |
---|---|---|
1 | Dark Web Market: STYX Market - Malware.News | 2025.04.18 |
2 | Inside Black Basta: Ransomware Resilience and Evolution After the Leak - Malware.News | 2025.04.18 |
3 | Strengthening Zero Trust Security with Expert Penetration Testing - Malware.News | 2025.04.17 |
4 | Wars without Gun Smoke: China Plays the Cyber Name-and-Shame Game on Taiwan and the U.S - Malware.News | 2025.04.17 |
5 | Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2 - Malware.News | 2025.04.17 |
Additional information
No | Title | Date |
---|---|---|
1 | Tesla to Delay Production of Cheaper EVs, Reuters Reports - Bloomberg Technology | 2025.04.19 |
2 | When Vulnerability Information Flows are Vulnerable Themselves - Malware.News | 2025.04.19 |
3 | CISA warns threat hunting staff of end to Google, Censys contracts as agency cuts set in - Malware.News | 2025.04.19 |
4 | Radiology practice reportedly working with FBI after ‘data security incident’ - Malware.News | 2025.04.19 |
5 | Text scams grow to steal hundreds of millions of dollars - Malware.News | 2025.04.19 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Dark Web Market: STYX Market - Malware.News | 2025.04.18 |
2 | Dark Web Market: STYX Market - Malware.News | 2025.04.18 |
3 | Inside Black Basta: Ransomware Resilience and Evolution After the Leak - Malware.News | 2025.04.18 |
4 | Inside Black Basta: Ransomware Resilience and Evolution After the Leak - Malware.News | 2025.04.18 |
5 | Wars without Gun Smoke: China Plays the Cyber Name-and-Shame Game on Taiwan and the U.S - Malware.News | 2025.04.17 |
View only the last 5 |