Summary: 2025/04/15 18:52
First reported date: 2011/04/26
Inquiry period : 2025/04/14 18:52 ~ 2025/04/15 18:52 (1 days), 2 search results
지난 7일 기간대비 동일한 트렌드를 보이고 있습니다.
기관 및 기업 구글 도 새롭게 확인됩니다.
기타 From httpswwwnavegadorupdatecomdownloadphp httpstcoE 크롬 브라우저 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/15 구글 크롬 136 20년간의 브라우저 기록 개인정보 보호 위험 수정
Trend graph by period
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
No data.

Attacker & Actors
The status of the attacker or attack group being issued.
No data.

Technique
This is an attack technique that is becoming an issue.
No data.
Threat info
Last 5SNS
(Total : 1)Additional information
No | Title | Date |
---|---|---|
1 | Closing the Gap: How to Build a Consistent Exposure and Vulnerability Management Workflow - Malware.News | 2025.04.15 |
2 | Colleges and Schools Now Top Targets for Online Threat Actors - Malware.News | 2025.04.15 |
3 | Trump Revenge Tour Targets Cyber Leaders, Elections - Malware.News | 2025.04.15 |
4 | GenAI vulnerabilities fixed only 21% of the time after pentesting - Malware.News | 2025.04.15 |
5 | Meta slurps up EU user data for AI training - Malware.News | 2025.04.15 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | 구글 크롬 136 20년간의 브라우저 기록 개인정보 보호 위험 수정 - Malware.News | 2025.04.15 |
2 | 파키스탄 연계 해킹 그룹, 인도 정부·국방·해양 집중 공격 - 시큐리티팩트 | 2025.04.14 |
3 | SpyNote, BadBazaar, MOONSHINE Malware Target Android and iOS Users via Fake Apps - The Hacker News | 2025.04.11 |
4 | China-based SMS Phishing Triad Pivots to Banks - Malware.News | 2025.04.11 |
5 | China-based SMS Phishing Triad Pivots to Banks - Malware.News | 2025.04.11 |
View only the last 5 |
Level | Description |
---|---|
danger | File has been identified by 66 AntiVirus engines on VirusTotal as malicious |
danger | The process wscript.exe wrote an executable file to disk which it then attempted to execute |
danger | Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually) |
danger | Executed a process and injected code into it |
warning | Disables Windows Security features |
watch | Communicates with host for which no DNS query was performed |
watch | Installs itself for autorun at Windows startup |
watch | One or more non-whitelisted processes were created |
watch | Potential code injection by writing to the memory of another process |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
watch | Used NtSetContextThread to modify a thread in a remote process indicative of process injection |
notice | A process attempted to delay the analysis task. |
notice | A process created a hidden window |
notice | Checks whether any human activity is being performed by constantly checking whether the foreground window changed |
notice | Creates a suspicious process |
notice | Creates executable files on the filesystem |
notice | Drops a binary and executes it |
notice | Drops an executable to the user AppData folder |
notice | One or more potentially interesting buffers were extracted |
notice | Terminates another process |
notice | Uses Windows utilities for basic Windows functionality |
notice | Yara rule detected in process memory |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | Command line console output was observed |
info | The executable contains unknown PE section names indicative of a packer (could be a false positive) |
No data
Beta Service, If you select keyword, you can check detailed information.