Summary: 2025/04/24 13:15
First reported date: 2017/02/07
Inquiry period : 2025/04/17 13:15 ~ 2025/04/24 13:15 (7 days), 6 search results
전 기간대비 동일한 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 Malware dprk cti 입니다.
악성코드 유형 RokRAT 도 새롭게 확인됩니다.
공격자 APT37 도 새롭게 확인됩니다.
기관 및 기업 AhnLab SECUI 도 새롭게 확인됩니다.
기타 intelligence 위장 Email Browser malicious 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/23 Malicious LNK Disguised as a Notification
ㆍ 2025/04/22 Malicious LNK Disguised as Notices
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | lnk | 6 | - 0 (0%) |
2 | Malware | 5 | ▲ 3 (60%) |
3 | dprk | 4 | ▲ 1 (25%) |
4 | cti | 4 | ▲ 1 (25%) |
5 | North Korea | 4 | - 0 (0%) |
6 | AhnLab | 3 | ▲ new |
7 | intelligence | 2 | ▲ new |
8 | 위장 | 2 | ▲ new |
9 | 2 | ▲ new | |
10 | Browser | 2 | ▲ new |
11 | Konni | 2 | ▼ -2 (-100%) |
12 | malicious | 2 | ▲ new |
13 | Notification | 1 | ▲ new |
14 | SECUI | 1 | ▲ new |
15 | 탈취 | 1 | ▲ new |
16 | ASEC | 1 | ▲ new |
17 | 정보 | 1 | ▲ new |
18 | Deep | 1 | ▲ new |
19 | 고지서 | 1 | ▲ new |
20 | Dive | 1 | ▲ new |
21 | Into | 1 | ▲ new |
22 | MultiStage | 1 | ▲ new |
23 | Kimsuky | 1 | ▼ -1 (-100%) |
24 | 그룹 | 1 | ▼ -1 (-100%) |
25 | 공격 | 1 | - 0 (0%) |
26 | 문서 | 1 | ▲ new |
27 | 한글 | 1 | ▲ new |
28 | RokRAT | 1 | ▲ new |
29 | APT37 | 1 | ▲ new |
30 | 수해 | 1 | ▲ new |
31 | 악성코드 | 1 | - 0 (0%) |
32 | 김수 | 1 | ▲ new |
33 | 북한 | 1 | ▼ -1 (-100%) |
34 | Campaign | 1 | - 0 (0%) |
Special keyword group
Top 5Threat info
Last 5SNS
(Total : 4)
Total keyword
North Korea dprk Malware Konni AhnLab Kimsuky SECUI Attacker RokRAT APT37 악성코드 북한 Campaign
News
(Total : 2)
Total keyword
Malware AhnLab Browser Email intelligence
No | Title | Date |
---|---|---|
1 | Malicious LNK Disguised as a Notification - Malware.News | 2025.04.23 |
2 | Malicious LNK Disguised as Notices - ASEC BLOG | 2025.04.22 |
Additional information
No | Title | Date |
---|---|---|
1 | Hackers exploiting vulnerabilities at higher rates, reports Verizon - Malware.News | 2025.04.24 |
2 | 북한 해커, 하루 만에 1900억원 넘게 털었다 - 시큐리티팩트 | 2025.04.24 |
3 | 2025 State of the SOC Report - Malware.News | 2025.04.24 |
4 | Power Parasites: Job & Investment Scam Campaign Targets Energy Companies and Major Brands - Malware.News | 2025.04.24 |
5 | Shopify faces privacy lawsuit for collecting customer data - Malware.News | 2025.04.24 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Malicious LNK Disguised as a Notification - Malware.News | 2025.04.23 |
2 | Malicious LNK Disguised as Notices - ASEC BLOG | 2025.04.22 |
3 | Windows Shell Link Vulnerability ZDI-CAN-25373: Detecting Hidden Commands - Malware.News | 2025.03.20 |
4 | 북한 해킹 그룹 Konni(코니)에서 만든 사이버범죄 신고시스템 사칭 악성코드-ECRM.hwp.lnk(2025.3.11) - Malware.News | 2025.03.14 |
5 | 2024-10-25 HeptaX - Unauthorized RDP Connections. Nalicious LNK. > Powershell > Bat files Samples - Malware.News | 2024.10.29 |
View only the last 5 |
No data
No data
No data
No | URL | CC | ASN Co | Reporter | Date |
---|---|---|---|---|---|
1 | http://193.233.48.64/Downloads/test.pdf.lnk lnk | RU ![]() | OOO FREEnet Group | DaveLikesMalwre | 2025.04.22 |
2 | https://cpcalendars.auiesce.ru/Downloads/Commercial_Proposal_Request.pdf.lnk lnk xml-opendir | US ![]() | DaveLikesMalwre | 2025.04.20 | |
3 | https://asd.tyamile.ru/Downloads/Commercial_Proposal_Request.pdf.lnk Emmenhtal lnk xml-opendir | US ![]() | CLOUDFLARENET | DaveLikesMalwre | 2025.04.20 |
4 | https://ki46-mailscanner.000-0x2autxx-8yhx.cc/Downloads/Commercial_Proposal_Request.pdf.lnk Emmenhtal lnk xml-opendir | US ![]() | CLOUDFLARENET | DaveLikesMalwre | 2025.04.20 |
5 | https://cpcontacts.auiesce.ru/Downloads/Commercial_Proposal_Request.pdf.lnk Emmenhtal lnk xml-opendir | US ![]() | DaveLikesMalwre | 2025.04.20 | |
View only the last 5 |
Beta Service, If you select keyword, you can check detailed information.