Summary: 2025/04/19 12:29

First reported date: 2009/08/05
Inquiry period : 2025/04/12 12:29 ~ 2025/04/19 12:29 (7 days), 28 search results

전 기간대비 18% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
Browser Malware Email Update Report 입니다.
악성코드 유형 RAT njRAT NetWireRC LockBit RedLine Raccoon Vidar 도 새롭게 확인됩니다.
공격기술 hijack 도 새롭게 확인됩니다.
기관 및 기업 CISA China Proofpoint United Kingdom Cisco Spain 도 새롭게 확인됩니다.
기타 WhatsApp Education risk privacy Sicherheitslücke 등 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/18 Dark Web Market: STYX Market
    ㆍ 2025/04/18 Care what you share
    ㆍ 2025/04/17 Hi, robot: Half of all internet traffic now automated

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1Browser 28 ▲ 5 (18%)
2Malware 13 ▲ 3 (23%)
3Email 10 ▲ 5 (50%)
4Update 9 ▲ 1 (11%)
5Report 8 ▲ 3 (38%)
6target 7 - 0 (0%)
7RCE 7 ▲ 6 (86%)
8Google 7 ▲ 2 (29%)
9Chrome 6 - 0 (0%)
10attack 6 ▲ 3 (50%)
11Campaign 6 - 0 (0%)
12Exploit 5 ▼ -1 (-20%)
13Phishing 5 ▲ 1 (20%)
14Software 5 - 0 (0%)
15Password 4 ▲ 2 (50%)
16Microsoft 4 ▼ -3 (-75%)
17Windows 4 ▼ -3 (-75%)
18United States 4 - 0 (0%)
19Stealer 3 - 0 (0%)
20Cryptocurrency 3 ▲ 1 (33%)
21account 3 ▲ 2 (67%)
22GameoverP2P 3 ▲ 2 (67%)
23WhatsApp 3 ▲ new
24Vulnerability 3 - 0 (0%)
25Advertising 3 ▼ -4 (-133%)
26GitHub 3 ▲ 1 (33%)
27intelligence 3 ▲ 2 (67%)
28Kaspersky 3 ▲ 1 (33%)
29Education 3 ▲ new
30MFA 3 ▲ 1 (33%)
31Criminal 3 - 0 (0%)
32Russia 3 ▲ 1 (33%)
33Victim 3 ▲ 1 (33%)
34risk 2 ▲ new
35ChatGPT 2 ▲ 1 (50%)
36privacy 2 ▲ new
37Operation 2 - 0 (0%)
38Sicherheitslücke 2 ▲ new
39Safari 2 ▲ 1 (50%)
40IoC 2 ▼ -1 (-50%)
41Kritische 2 ▲ new
42hijack 2 ▲ new
43c&c 2 ▼ -2 (-100%)
44Apple 2 - 0 (0%)
45protection 2 ▲ 1 (50%)
46RAT 2 ▲ new
47threat 2 ▲ 1 (50%)
48Ransomware 2 - 0 (0%)
49Trojan 2 ▼ -1 (-50%)
50enterprise 2 ▲ new
51Social Engineering 2 ▲ 1 (50%)
52powershell 2 ▼ -3 (-150%)
53payment 2 - 0 (0%)
54VPN 2 ▲ 1 (50%)
55last 1 ▲ new
56Android 1 ▼ -1 (-100%)
57Smishing 1 - 0 (0%)
58Cofense 1 ▲ new
59Zusammenfassung 1 - 0 (0%)
60address 1 ▲ new
61legitimate 1 ▲ new
62UNKRemoteRogue 1 ▲ new
63taegliche 1 - 0 (0%)
64Sicherheitsnews 1 - 0 (0%)
65sense 1 ▲ new
66compromised 1 ▲ new
67access 1 - 0 (0%)
68Dec 1 ▲ new
69njRAT 1 ▲ new
70information 1 ▲ new
71NetWireRC 1 ▲ new
72own 1 ▲ new
73Figure 1 - 0 (0%)
74Takedown 1 ▼ -1 (-100%)
75Webbrowser 1 ▲ new
76CISA 1 ▲ new
77China 1 ▲ new
78Proofpoint 1 ▲ new
79dlp 1 ▲ new
80infosec 1 ▲ new
81insiderrisk 1 ▲ new
82United Kingdom 1 ▲ new
83Cisco 1 ▲ new
84datalossprevention 1 ▲ new
85LockBit 1 ▲ new
86Spain 1 ▲ new
87RedLine 1 ▲ new
88Raccoon 1 ▲ new
89Vidar 1 ▲ new
90Telegram 1 ▼ -1 (-100%)
91Lumma 1 - 0 (0%)
92DarkWeb 1 ▲ new
93RSA Conference 1 ▲ new
94DDoS 1 - 0 (0%)
95humancentric 1 ▲ new
96human 1 ▲ new
97abgedichtet 1 ▲ new
98Firefox 1 ▼ -2 (-200%)
99Kali 1 ▲ new
100Router 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
GameoverP2P
3 (17.6%)
RAT
2 (11.8%)
Ransomware
2 (11.8%)
Trojan
2 (11.8%)
njRAT
1 (5.9%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
RCE
7 (21.9%)
Campaign
6 (18.8%)
Exploit
5 (15.6%)
Phishing
5 (15.6%)
Stealer
3 (9.4%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
Google
7 (21.2%)
Microsoft
4 (12.1%)
United States
4 (12.1%)
Kaspersky
3 (9.1%)
Russia
3 (9.1%)
Threat info
Last 5

SNS

(Total : 10)
  Total keyword

Browser Email target WhatsApp plugin Tor Update Chrome Russia Campaign powershell Kaspersky dlp Proofpoint Malware Symantec RAT attack India Stealer IoC Safari MacOS

No Title Date
1Proofpoint @proofpoint
Proofpoint human-centric information protection delivers proactive #datalossprevention and #insiderrisk management across all the modern channels people work—email, endpoint, cloud and browsers. Learn more at https://t.co/I7L48yJ9Zr. #infosec #DLP
2025.04.18
2Threat Insight @threatinsight
UNK_RemoteRogue (Russia): In Dec 2024, a targeted campaign used compromised infrastructure to send emails to people linked to a defense industry manufacturer. The emails contained directions in Russian to copy malicious PowerShell code from the browser to their terminal. https://t.co/8c7S1wTplG
2025.04.17
3Microsoft Threat Intelligence @MsftSecIntel
@sherrod_im However, the QR code is used by WhatsApp to connect an account to a linked device and/or the WhatsApp Web portal. If the target follows the instructions on the page, the threat actor could gain access to messages in their WhatsApp account & exfiltrate data using browser plugins.
2025.04.16
4Dark Web Informer - Cyber Threat Intelligence @DarkWebInformer
????Tor Browser 14.5 has been released! Update!???? https://t.co/eKBLwkcgFp
2025.04.16
5Yogesh Londhe @suyog41
Banshee Stealer Safari_Browser_2.45.dmg 1d96e46f60f297e1e520af4ec7d0e895 olaiokejk-oikeja 37127f6ea5453f025b1727f565107545 #Banshee #Stealer #MAC #IOC https://t.co/rphCN7rNsh
2025.04.15

Additional information

No Title Date
1Dark Web Market: STYX Market - Malware.News2025.04.18
2Dark Web Market: STYX Market - Malware.News2025.04.18
3Care what you share - Malware.News2025.04.18
4Care what you share - Malware.News2025.04.18
5Care what you share - Malware.News2025.04.18
View only the last 5
No Request Hash(md5) Report No Date
1 1 Podgląd wpisu po zmianie _ C...
Client SW User Data Stealer browser info stealer Generic Malware Google Chrome User Data Downloader Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Sniff Audio HTTP DNS Code injection BitCoin Internet API persistenc
0b0afec69e7d62568ab3bfdadc92c631591772025.04.18
2 1 Podgląd wpisu po zmianie _ C...
Client SW User Data Stealer browser info stealer Generic Malware Google Chrome User Data Downloader Create Service Socket DGA Http API ScreenShot Escalate priviledges Steal credential PWS Sniff Audio HTTP DNS Code injection BitCoin Internet API persistenc
0b0afec69e7d62568ab3bfdadc92c631591742025.04.18
3 remcos_a.exe
Client SW User Data Stealer Backdoor RemcosRAT Browser Login Data Stealer browser info stealer Generic Malware Google Chrome User Data Downloader Malicious Library Malicious Packer UPX Create Service Socket Escalate priviledges PWS Sniff Audio DNS Interne
e3aecc3188eac24edb8e34f5044b3a6a589982025.04.14
4 pdf.ps1
Client SW User Data Stealer Backdoor RemcosRAT browser info stealer Hide_EXE Generic Malware Google Chrome User Data Downloader Malicious Library .NET framework(MSIL) Antivirus Create Service Socket ScreenShot Escalate priviledges PWS Sniff Audio DNS Inte
642647cf863119977d7bd52e848e0cfe583952025.03.31
5 kent.ps1
Client SW User Data Stealer Backdoor RemcosRAT Formbook browser info stealer Hide_EXE Generic Malware Google Chrome User Data Downloader Malicious Library Confuser .NET Antivirus Create Service Socket ScreenShot Escalate priviledges PWS Sniff Audio DNS Co
432719ce1459add67ebe4c01b47310f2580592025.03.13
View only the last 5
Level Description
watch Found URLs in memory pointing to an IP address rather than a domain (potentially indicative of Command & Control traffic)
watch One or more non-whitelisted processes were created
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice An application raised an exception which may be indicative of an exploit crash
notice Potentially malicious URLs were found in the process memory dump
notice Steals private information from local Internet browsers
notice Terminates another process
notice Yara rule detected in process memory
info Checks if process is being debugged by a debugger
info One or more processes crashed
info Tries to locate where the browsers are installed
No data
No data
Beta Service, If you select keyword, you can check detailed information.