Summary: 2025/05/04 18:03
First reported date: 2023/09/27
Inquiry period : 2025/04/27 18:03 ~ 2025/05/04 18:03 (7 days), 1 search results
전 기간대비 신규 트렌드를 보이고 있습니다.
기타 Malware malicious server Supershell C2 등 신규 키워드도 확인됩니다.
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Malware | 1 | ▲ new |
2 | malicious | 1 | ▲ new |
3 | server | 1 | ▲ new |
4 | Supershell | 1 | ▲ new |
5 | C2 | 1 | ▲ new |
6 | Linux | 1 | ▲ new |
7 | c&c | 1 | ▲ new |
8 | Cobalt | 1 | ▲ new |
9 | Advertising | 1 | ▲ new |
10 | Cobalt Strike | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
No data.

Attacker & Actors
The status of the attacker or attack group being issued.
No data.

Technique
This is an attack technique that is becoming an issue.
No data.

Country & Company
This is a country or company that is an issue.
No data.
Threat info
Last 5SNS
(Total : 1)
Total keyword
Malware C2 Linux c&c Cobalt Advertising Cobalt Strike
News
(Total : 0)No data.
Additional information
No | Title | Date |
---|---|---|
1 | Threat Actors Attacking U.S. Citizens Via Social Engineering Attack - Malware.News | 2025.05.04 |
2 | 틱톡, 유럽 사용자 데이터 중국 전송.. 8000억대 벌금 - 시큐리티팩트 | 2025.05.03 |
3 | Saskatoon children’s hospital nurse unlawfully snooped on records of 314 patients: privacy report - Malware.News | 2025.05.03 |
4 | Dating app Raw exposed users’ location data and personal information - Malware.News | 2025.05.03 |
5 | Hacker hired Telangana man to courier threats to Star Health Insurance MD - Malware.News | 2025.05.03 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | FortiManager Zero-Day ‘FortiJump’ Is Now Publicly Addressed (CVE-2024-47575) - Malware.News | 2024.10.24 |
2 | FortiManager Zero-Day ‘FortiJump’ Is Now Publicly Addressed (CVE-2024-47575) - Malware.News | 2024.10.24 |
3 | 2024-09-12 SUPERSHELL + 2023-03-13 SHELLBOT Targeting Linux SSH servers Samples - Malware.News | 2024.09.13 |
4 | 2024-09-12 SUPERSHELL + 2023-03-13 SHELLBOT Targeting Linux SSH servers Samples - Malware.News | 2024.09.13 |
No data
No data
No | Category | URL | CC | ASN Co | Date |
---|---|---|---|---|---|
1 | c2 | http://107.172.0.206:3232/ | US ![]() | AS-COLOCROSSING | 2024.08.05 |
2 | c2 | http://111.231.145.137:3232/ | CN ![]() | ... | 2024.08.05 |
3 | c2 | http://101.34.209.73:3232/ | CN ![]() | 2024.08.05 | |
4 | c2 | http://101.34.209.73:3232/ws | CN ![]() | 2024.08.05 |
No | URL | CC | ASN Co | Reporter | Date |
---|---|---|---|---|---|
1 | http://117.72.74.197:8080/supershell/compile/download/win supershell supershell-c2 | CN ![]() | abus3reports | 2024.10.06 | |
2 | http://47.238.84.157:8000/mysqld elf opendir supershell | US ![]() | NDA0E | 2024.09.22 | |
3 | http://47.238.84.157:8000/mysqld.sh opendir sh supershell | US ![]() | NDA0E | 2024.09.22 | |
4 | http://8.218.239.22:8000/scsi_esrr_1 supershell ua-wget | SG ![]() | anonymous | 2024.09.13 | |
5 | http://142.171.103.249:8888/supershell/compile/download/xd elf linux supershell | CA ![]() | Try0 | 2024.08.23 | |
View only the last 5 |
Beta Service, If you select keyword, you can check detailed information.