Summary: 2025/04/17 15:55

First reported date: 2008/06/10
Inquiry period : 2025/04/10 15:55 ~ 2025/04/17 15:55 (7 days), 150 search results

전 기간대비 -11% 낮은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
Alert Malware target Windows Vulnerability 입니다.
공격기술 RCE 도 새롭게 확인됩니다.
기관 및 기업 United Kingdom Europe North Korea Ucraina Iran Deloitte 도 새롭게 확인됩니다.
기타 domain LYNX Kidney DaVita Linux 등 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/17 Interlock ransomware evolves tactics with ClickFix, infostealers
    ㆍ 2025/04/17 Wars without Gun Smoke: China Plays the Cyber Name-and-Shame Game on Taiwan and the U.S
    ㆍ 2025/04/16 Threat Intelligence Snapshot: Week 15, 2025


참고로 동일한 그룹의 악성코드 타입은 WannaCry Sodinokibi Phobos 등 78개 종이 확인됩니다.

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1Ransomware 150 ▼ -17 (-11%)
2Victim 63 ▼ -18 (-29%)
3Alert 56 ▲ 1 (2%)
4Malware 35 ▲ 2 (6%)
5Report 28 - 0 (0%)
6attack 27 ▼ -5 (-19%)
7United States 20 ▼ -2 (-10%)
8target 19 ▲ 8 (42%)
9DarkWeb 15 ▼ -12 (-80%)
10Group 15 ▼ -9 (-60%)
11Exploit 15 ▼ -3 (-20%)
12Update 14 ▼ -8 (-57%)
13Campaign 13 ▼ -1 (-8%)
14Windows 13 ▲ 5 (38%)
15Vulnerability 13 ▲ 3 (23%)
16MWNEWS 11 ▲ 5 (45%)
17Phishing 10 ▲ 2 (20%)
18RCE 10 ▲ new
19Akira 10 ▲ 2 (20%)
20Government 9 ▲ 5 (56%)
21United Kingdom 8 ▲ new
22Advertising 8 ▲ 1 (13%)
23China 8 ▲ 1 (13%)
24Microsoft 8 ▼ -3 (-38%)
25threat 8 ▲ 4 (50%)
26Criminal 8 ▼ -4 (-50%)
27INC 8 ▲ 5 (63%)
28Operation 7 ▼ -3 (-43%)
29Software 7 ▼ -3 (-43%)
30ZeroDay 7 ▼ -2 (-29%)
31hacking 7 ▼ -1 (-14%)
32Education 6 - 0 (0%)
33intelligence 6 - 0 (0%)
34LockBit 6 ▼ -1 (-17%)
35domain 6 ▲ new
36Email 5 ▼ -3 (-60%)
37LYNX 5 ▲ new
38Ransom 5 ▲ 1 (20%)
39ThreatProtection 4 ▲ 1 (25%)
40Kaspersky 4 ▼ -3 (-75%)
41Password 4 ▲ 3 (75%)
42critical 4 ▲ 3 (75%)
43amp 4 ▼ -2 (-50%)
44PLAY 4 ▼ -1 (-25%)
45Europe 4 ▲ new
46South Korea 4 ▲ 2 (50%)
47Android 4 ▲ 3 (75%)
48gang 4 ▲ 3 (75%)
49Russia 4 ▲ 1 (25%)
50dragonforce 4 ▲ 1 (25%)
51Canada 3 ▲ 2 (67%)
52공격 3 - 0 (0%)
53LinkedIn 3 ▲ 1 (33%)
54Kidney 3 ▲ new
55Qilin 3 ▼ -4 (-133%)
56April 3 ▼ -4 (-133%)
57Distribution 3 ▼ -1 (-33%)
58IoC 3 ▲ 1 (33%)
59North Korea 3 ▲ new
60Taiwan 3 ▲ 2 (67%)
61DaVita 3 ▲ new
62Germany 3 ▲ 2 (67%)
63Black Basta 3 ▼ -1 (-33%)
64NortonLifeLock 3 - 0 (0%)
65Clop 3 ▼ -2 (-67%)
66dark 3 ▼ -1 (-33%)
67Linux 3 ▲ new
68Interlock 3 - 0 (0%)
69RaaS 2 ▲ 1 (50%)
70Deface 2 ▼ -2 (-100%)
71Stealer 2 - 0 (0%)
72Ucraina 2 ▲ new
73Iran 2 ▲ new
74CISA 2 ▼ -3 (-150%)
75Telegram 2 ▲ 1 (50%)
76Spain 2 - 0 (0%)
77AhnLab 2 ▲ 1 (50%)
78Social Engineering 2 ▼ -1 (-50%)
79Australia 2 ▲ 1 (50%)
80Record 2 - 0 (0%)
81conference 2 ▲ new
82Takedown 2 - 0 (0%)
83Supply chain 2 - 0 (0%)
84entire 2 - 0 (0%)
85Deloitte 2 ▲ new
86Google 2 ▼ -1 (-50%)
87March 2 - 0 (0%)
88Medusa 2 ▼ -2 (-100%)
89SAFEPAY 2 ▲ 1 (50%)
90Zero Trust 2 ▲ 1 (50%)
91Engineering 2 ▲ new
92RATel 2 ▼ -2 (-100%)
93breach 2 ▼ -2 (-100%)
94Hertz 2 ▲ new
95Review 2 ▲ 1 (50%)
96Blog 2 ▲ 1 (50%)
97Nach 2 ▲ new
98ITUnternehmen 2 ▲ new
99Lübecker 2 ▲ new
100Basta 2 ▲ 1 (50%)
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
Ransomware
150 (82.9%)
Akira
10 (5.5%)
LockBit
6 (3.3%)
Black Basta
3 (1.7%)
Clop
3 (1.7%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Exploit
15 (24.6%)
Campaign
13 (21.3%)
Phishing
10 (16.4%)
RCE
10 (16.4%)
hacking
7 (11.5%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
United States
20 (20.2%)
Government
9 (9.1%)
United Kingdom
8 (8.1%)
China
8 (8.1%)
Microsoft
8 (8.1%)
Malware Family
Top 5

A malware family is a group of applications with similar attack techniques.
In this trend, it is classified into Ransomware, Stealer, RAT or Backdoor, Loader, Botnet, Cryptocurrency Miner.

Threat info
Last 5

SNS

(Total : 106)
  Total keyword

Ransomware Victim DarkWeb Akira United States attack Report target Exploit LockBit RCE Windows Government Malware Canada Criminal Education Update India Distribution Germany Rhysida Europe Rhysida Ransomware Operation Attacker Data Center Mexico Linux Takedown ...

No Title Date
1FalconFeeds.io @FalconFeedsio
???? SAFEPAY Ransomware Alert ???? SAFEPAY Ransomware has added 12 new victims to their dark web portal. Stadt Heilbronn ???????? Kellermann & Engelhardt ITEC GmbH ???????? Heinrich + Steinhardt GmbH ???????? Helix Tool ???????? Hurst + Schröder GmbH ???????? Extreme Fire Solutions ???????? FR
2025.04.17
2FalconFeeds.io @FalconFeedsio
DragonForce Ransomware Alert ???? DragonForce Ransomware has added 2 new victims to their dark web portal. - City of Grove ???????? - Iris ID Systems Inc ???????? https://t.co/6oNwEntZcH
2025.04.17
3FalconFeeds.io @FalconFeedsio
???? MEDUDA Ransomware Alert ???? Lithium Americas Corp. ???????? ???? Lithium Americas Corp. engages in the exploration and development of lithium properties in the United States and Canada, has fallen victim to MEDUSA ransomware. ???? Key Details: ???? Threat Actor: MEDUSA ????Published date ht
2025.04.17
4FalconFeeds.io @FalconFeedsio
???? Ransomware Alert: A-1 Freeman Moving Group(a-1 https://t.co/AOFnRsiknk), a leading U.S. provider of comprehensive moving, relocation, logistics, warehousing, and transportation services for individuals, businesses, governments, and military clients nationwide, based in USA, https://t.co/YtW95F
2025.04.16
5FalconFeeds.io @FalconFeedsio
???? Ransomware Alert ???? Setpoint Systems Corporation ???????? ???? Setpoint Systems Corporation is a lean automation integration firm providing engineering, design, build, and controls experts for turn key custom automated solutions using the Toyota Production System (TPS) methodology https://t
2025.04.16

Additional information

No Request Hash(md5) Report No Date
1 hello.exe
Ransomware Malicious Library .NET EXE PE32 PE File
69d1c11ae24884ea55ab39787853ad0c553312024.11.13
Level Description
danger File has been identified by 58 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
No data
No URL CC ASN Co Reporter Date
1https://hilarious-trifle-d9182e.netlify.app/lootsubmit.ps1
fog Ransomware
SG SGAMAZON-02JAMESWT_WT2025.04.04
2https://hilarious-trifle-d9182e.netlify.app/cwiper.exe
fog Ransomware
SG SGAMAZON-02JAMESWT_WT2025.04.04
3https://hilarious-trifle-d9182e.netlify.app/Pay
fog Ransomware
SG SGAMAZON-02JAMESWT_WT2025.04.04
4https://hilarious-trifle-d9182e.netlify.app/stage1.ps1
fog Ransomware
SG SGAMAZON-02JAMESWT_WT2025.04.04
5https://hilarious-trifle-d9182e.netlify.app/Pay%20Adjustment.zip
fog Ransomware
SG SGAMAZON-02JAMESWT_WT2025.04.04
View only the last 5
Beta Service, If you select keyword, you can check detailed information.