Summary: 2025/05/04 10:21

First reported date: 2014/02/26
Inquiry period : 2025/04/27 10:21 ~ 2025/05/04 10:21 (7 days), 115 search results

전 기간대비 -6% 낮은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
Microsoft Education ChatGPT AI Criminal 입니다.
악성코드 유형 QuasarRAT solarmarker 도 새롭게 확인됩니다.
공격자 Volt Typhoon 도 새롭게 확인됩니다.
기관 및 기업 Police Australia 도 새롭게 확인됩니다.
기타 Cobalt Strike Twitter auf Ein APT10 등 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/05/02 M&S이어 해로즈까지 털려.. 영국 소매업계 '보안 비상'
    ㆍ 2025/05/02 Softwareupdates manipuliert: Hacker missbrauchen IPv6-Feature für Cyberattacken
    ㆍ 2025/05/02 SKT 해킹 배후에 중국 그림자?.. 악명 떨치는 중국계 해킹 조직들

Trend graph by period


Related keyword cloud
Top 100

SoftwareMalwareUpdateReportUnited StatesRCEattackMicrosoftExploitOperationEducationChatGPTAIPhishingVulnerabilityCriminalAdvertisingAppletargetGoogleintelligencevonderZeroDayGitHubSupply chainChinaPasswordhackingKIBrowserEmailGovernmentWhatsAppAndroidZero TrustWindowsCobalt StrikeLinkedInRansomwareRed TeamCampaignDieconferenceCiscoTwitter공격aufxBOMEinfürQuasarRATAPT10SoiPhoneaccessUnited KingdomLinuxthirdpartydasIPvtechmobileESCOPoliceNutzercodeduWenn사업기술KIChatbots해군MWNEWSpaymentAustraliaEnterpriseDistributionBusinessAlertbisProzentTeam바티칸교황ChromeAmazonVolt TyphoonWaruminformationsolarmarkerRATelpowershellBlisterSouth KoreabreachforumsRisesollAPT32OpenAI
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
Ransomware
4 (25%)
QuasarRAT
3 (18.8%)
solarmarker
2 (12.5%)
RATel
2 (12.5%)
PlugX
2 (12.5%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Volt Typhoon
2 (100%)
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
RCE
15 (30.6%)
Exploit
11 (22.4%)
Phishing
9 (18.4%)
hacking
6 (12.2%)
Campaign
4 (8.2%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
United States
17 (23%)
Microsoft
12 (16.2%)
Apple
7 (9.5%)
Google
7 (9.5%)
China
6 (8.1%)
Threat info
Last 5

SNS

(Total : 12)
  Total keyword

Software Ransomware Update Stealc Amadey hijack Stealer Zscaler PowerShell Report ClickFix ClearFake Distribution Red Team ZeroDay Exploit Victim Proofpoint

No Title Date
1Kaspersky @kaspersky
That 'free' cracked software? It comes with a price. ????️ Miner? Check. Credential stealer? Check. Working program? Not so much. Learn more: https://t.co/GspIi8Hrad https://t.co/4tf8JnsPmG
2025.05.02
2Proofpoint @proofpoint
#ClickFix, a #socialengineering tactic where threat actors deploy malicious website pop-ups or impersonate legitimate software, is gaining traction among state-sponsored actors. Proofpoint's research was covered by @BleepinComputer. https://t.co/UptQbzeKVM
2025.05.02
3Virus Bulletin @virusbtn
Zscaler reports updates in StealC v2: it now supports loaders for MSI and PowerShell, uses a JSON-based RC4-encrypted protocol, and lets operators tailor payload rules and bot responses by geolocation, HWID, and installed software. https://t.co/sobQhqyLfy https://t.co/LIJtw7xWD3
2025.05.02
4Zscaler ThreatLabz @Threatlabz
StealC V2 includes enhanced information stealing, RC4 encryption, and a new control panel with an embedded builder that allows operators to customize payload rules based on geolocation, HWID, and installed software. ThreatLabz has observed StealC V2 being deployed via Amadey, https://t.co/412gUQofJ
2025.05.01
5BleepingComputer @BleepinComputer
Hackers abuse IPv6 networking feature to hijack software updates - @LawrenceAbrams https://t.co/hKJYTWOpQn https://t.co/hKJYTWOpQn
2025.05.01

Additional information

No data
No data
No data
No data
Beta Service, If you select keyword, you can check detailed information.