Summary: 2025/05/04 11:54
First reported date: 2016/12/01
Inquiry period : 2025/04/27 11:54 ~ 2025/05/04 11:54 (7 days), 1 search results
전 기간대비 신규 트렌드를 보이고 있습니다.
기관 및 기업 CrowdStrike 도 새롭게 확인됩니다.
기타 AI Winning Combination critical gen 등 신규 키워드도 확인됩니다.
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | AI | 1 | ▲ new |
2 | Winning | 1 | ▲ new |
3 | Combination | 1 | ▲ new |
4 | critical | 1 | ▲ new |
5 | gen | 1 | ▲ new |
6 | attack | 1 | ▲ new |
7 | CrowdStrike | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
No data.

Attacker & Actors
The status of the attacker or attack group being issued.
No data.

Technique
This is an attack technique that is becoming an issue.
No data.

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
CrowdStrike |
|
1 (100%) |
Threat info
Last 5SNS
(Total : 1)
Total keyword
News
(Total : 0)No data.
Additional information
No | Title | Date |
---|---|---|
1 | 틱톡, 유럽 사용자 데이터 중국 전송.. 8000억대 벌금 - 시큐리티팩트 | 2025.05.03 |
2 | Saskatoon children’s hospital nurse unlawfully snooped on records of 314 patients: privacy report - Malware.News | 2025.05.03 |
3 | Dating app Raw exposed users’ location data and personal information - Malware.News | 2025.05.03 |
4 | Hacker hired Telangana man to courier threats to Star Health Insurance MD - Malware.News | 2025.05.03 |
5 | Acadian Ambulance Seeks Dismissal of Data Breach Lawsuit - Malware.News | 2025.05.03 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Top 10 for LLM & Gen AI Project Ranked by OWASP - TrendMicro | 2025.04.15 |
2 | Trump fires Gen. Timothy Haugh from leadership of Cyber Command and NSA - CyberScoop | 2025.04.04 |
3 | Out with the Old, In with the Bold: Gen Threat Labs - Malware.News | 2025.02.14 |
4 | Out with the Old, In with the Bold: Gen Threat Labs - Malware.News | 2025.02.14 |
5 | Gen Q3/2024 Threat Report - Malware.News | 2024.11.19 |
View only the last 5 |
No | Request | Hash(md5) | Report No | Date |
---|---|---|---|---|
1 | ![]() Gen | 9d1b497b9d05f015cc768ee06fe6050d | 10045 | 2021.04.01 |
2 | ![]() Gen | 5daa2140732ce865b202962807d107b1 | 10046 | 2021.04.01 |
3 | asse9e3x.rar Gen | 3d0fffa0fe157c3bffb917e6a8d9da2e | 10062 | 2021.04.01 |
4 | ![]() Gen | c50eeb216ab9f7e9b375270426c4dfd6 | 9945 | 2021.03.30 |
5 | ![]() Emotet Gen | f3da2faeed91df74170149fc4420ef09 | 9802 | 2021.03.27 |
View only the last 5 |
Level | Description |
---|---|
danger | File has been identified by 38 AntiVirus engines on VirusTotal as malicious |
watch | Communicates with host for which no DNS query was performed |
watch | Drops 100 unknown file mime types indicative of ransomware writing encrypted files back to disk |
watch | One or more non-whitelisted processes were created |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
notice | A process created a hidden window |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | An application raised an exception which may be indicative of an exploit crash |
notice | Checks for the Locally Unique Identifier on the system for a suspicious privilege |
notice | Creates a suspicious process |
notice | Creates executable files on the filesystem |
notice | Drops an executable to the user AppData folder |
notice | Executes one or more WMI queries |
notice | Foreign language identified in PE resource |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | Performs some HTTP requests |
notice | Queries for potentially installed applications |
notice | Resolves a suspicious Top Level Domain (TLD) |
notice | Sends data using the HTTP POST Method |
notice | Steals private information from local Internet browsers |
notice | Terminates another process |
notice | Uses Windows utilities for basic Windows functionality |
info | Checks if process is being debugged by a debugger |
info | Collects information to fingerprint the system (MachineGuid |
info | Command line console output was observed |
info | One or more processes crashed |
info | Queries for the computername |
info | The executable contains unknown PE section names indicative of a packer (could be a false positive) |
info | The file contains an unknown PE resource name possibly indicative of a packer |
info | This executable has a PDB path |
info | Tries to locate where the browsers are installed |
No data
No data
Beta Service, If you select keyword, you can check detailed information.