Summary: 2025/04/17 13:20

First reported date: 2014/04/04
Inquiry period : 2025/04/10 13:20 ~ 2025/04/17 13:20 (7 days), 23 search results

전 기간대비 65% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
hijack Malware Hijacking Update Exploit 입니다.
악성코드 유형 TONESHELL GameoverP2P RATel 도 새롭게 확인됩니다.
공격기술 RCE Downloader 도 새롭게 확인됩니다.
기관 및 기업 Google Check Point Russia Government China 도 새롭게 확인됩니다.
기타 target Cryptocurrency malicious Victim amp 등 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/17 Hi, robot: Half of all internet traffic now automated
    ㆍ 2025/04/17 Advanced KQL Deep Dive: User State Change Tracking
    ㆍ 2025/04/17 Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1hijack 23 ▲ 15 (65%)
2Malware 14 ▲ 10 (71%)
3target 10 ▲ new
4Hijacking 10 ▲ 6 (60%)
5Update 8 ▲ 6 (75%)
6Exploit 7 ▲ 6 (86%)
7Advertising 7 ▲ 5 (71%)
8RCE 6 ▲ new
9attack 6 ▲ 4 (67%)
10Criminal 6 ▲ 5 (83%)
11Microsoft 6 ▲ 5 (83%)
12Software 5 ▲ 4 (80%)
13Windows 5 ▲ 2 (40%)
14Backdoor 5 ▲ 4 (80%)
15Report 5 ▲ 4 (80%)
16Campaign 5 ▲ 4 (80%)
17Cryptocurrency 4 ▲ new
18United States 4 ▲ 3 (75%)
19Google 4 ▲ new
20EDR 4 ▲ 3 (75%)
21malicious 4 ▲ new
22Victim 4 ▲ new
23Operation 3 ▲ 1 (33%)
24amp 3 ▲ new
25payment 3 ▲ new
26Kaspersky 3 ▲ 2 (67%)
27package 3 ▲ new
28IoC 3 ▲ new
29Trojan 3 ▲ 1 (33%)
30GitHub 3 ▲ 2 (67%)
31powershell 2 ▲ new
32googlewallet 2 ▲ new
33Downloader 2 ▲ new
34Check Point 2 ▲ new
35tap 2 ▲ new
36convenient 2 ▲ new
37NFC 2 ▲ new
38googlepay 2 ▲ new
39ApplePay 2 ▲ new
40keylogger 2 ▲ new
41file 2 ▲ 1 (50%)
42TONESHELL 2 ▲ new
43Bot 2 ▲ new
44c&c 2 ▲ 1 (50%)
45Zscaler 2 ▲ 1 (50%)
46MUSTANG PANDA 2 ▲ new
47Cobalt Strike 2 ▲ 1 (50%)
48Chrome 2 ▲ new
49Black Hat 2 ▲ new
50Russia 2 ▲ new
51thread 2 ▲ new
52Government 2 ▲ new
53Fake 2 ▲ new
54Android 2 ▲ 1 (50%)
55Browser 2 ▲ new
56Threat 2 ▲ new
57hooking 1 ▲ new
58Vawtrak 1 ▲ new
59MEXC 1 ▲ new
60Red Team 1 ▲ new
61process 1 ▲ new
62ltlt 1 ▲ new
63execution 1 ▲ new
64PoC 1 ▲ new
65return 1 ▲ new
66Alureon 1 ▲ new
67Check 1 ▲ new
68Point 1 ▲ new
69Tenable 1 ▲ new
70Credential 1 ▲ new
71Research 1 ▲ new
72세이프브리치 1 ▲ new
73GameoverP2P 1 ▲ new
74theft 1 ▲ new
75state 1 ▲ new
76UNIX 1 ▲ new
77China 1 ▲ new
78application 1 ▲ new
79human 1 ▲ new
80web 1 ▲ new
81traffic 1 ▲ new
82Password 1 - 0 (0%)
83Router 1 ▲ new
84intelligence 1 ▲ new
85Email 1 ▲ new
86C2 1 ▲ new
87Education 1 ▲ new
88Firefox 1 ▲ new
89operator 1 ▲ new
90schtasks 1 ▲ new
91step 1 ▲ new
92user 1 ▲ new
93Safari 1 ▲ new
94Emotet 1 ▲ new
95RATel 1 ▲ new
96MFA 1 ▲ new
97ChatGPT 1 ▲ new
98Mustan 1 ▲ new
99StarProxy 1 ▲ new
100driver 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
Trojan
3 (30%)
TONESHELL
2 (20%)
GameoverP2P
1 (10%)
RATel
1 (10%)
PlugX
1 (10%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
hijack
23 (38.3%)
Hijacking
10 (16.7%)
Exploit
7 (11.7%)
RCE
6 (10%)
Backdoor
5 (8.3%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
Microsoft
6 (21.4%)
United States
4 (14.3%)
Google
4 (14.3%)
Kaspersky
3 (10.7%)
Check Point
2 (7.1%)
Threat info
Last 5

SNS

(Total : 10)
  Total keyword

hijack Hijacking Google Malware Kaspersky Android payment Russia Criminal target Campaign United States Advertising Check Point Report Cryptocurrency Attacker Exploit powershell Government HijackLoader EDR

No Title Date
1Kaspersky @kaspersky
That ‘convenient’ tap to pay? Cybercriminals love it too. ???? Hackers are hijacking NFC payments, turning #ApplePay & #GoogleWallet into digital pickpockets. Here’s how they do it—and how to stop them. ???? https://t.co/PcEvcBiatS #CyberSecurity #GooglePay #NFC https://t.co/Cz5CWMO0Ar
2025.04.16
2Cyber_OSINT @Cyber_O51NT
Check Point Research revealed "Waiting Thread Hijacking," a stealthier process injection technique that cleverly utilizes waiting threads to execute code without triggering EDR alerts, evolving classic thread execution methods. #Cybersecurity #Malware https://t.co/x4eLkdBdve
2025.04.15
3The Hacker News @TheHackersNews
???? Crypto devs & traders beware! Fake Python package ccxt-mexc-futures hijacked MEXC trades—1,065+ downloads, rerouted orders, stole tokens. Now, 1 in 5 AI-generated packages are fake. Slopsquatting is rising. ???? Full story: https://t.co/vnbOx4RyEm
2025.04.15
4Unit 42 @Unit42_Intel
We found a campaign using domains spoofing the United States IRS. The FQDNs present a fake CAPTCHA-style page that uses #pastehijacking and instructs viewers to paste a malicious script into a run window. HTML pages have comments in Russian. Details at https://t.co/R7W2pEZayL https://t.co/35M8FSukmG
2025.04.15
5Threat Intelligence @threatintel
#ThreatProtection #HijackLoader new modular enhancements for stealth and evasion. Read more about Symantec's protection: https://t.co/oKkLyhHyQh
2025.04.14

Additional information

No data
No data
No data
No data
Beta Service, If you select keyword, you can check detailed information.