Summary: 2025/04/17 12:34
First reported date: 2010/11/15
Inquiry period : 2025/04/16 12:34 ~ 2025/04/17 12:34 (1 days), 3 search results
지난 7일 기간대비 -33% 낮은 트렌드를 보이고 있습니다.
지난 7일 기간대비 상승한 Top5 연관 키워드는 WhatsApp AI 입니다.
기타 intelligence Domain Trouble COBOL obfuscation 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/16 Has AI changed malicious script obfuscation techniques?
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | code | 3 | ▼ -1 (-33%) |
2 | 1 | ▲ 1 (100%) | |
3 | intelligence | 1 | ▲ new |
4 | Domain | 1 | ▲ new |
5 | Trouble | 1 | ▲ new |
6 | COBOL | 1 | ▲ new |
7 | MWNEWS | 1 | - 0 (0%) |
8 | obfuscation | 1 | ▲ new |
9 | AI | 1 | ▲ 1 (100%) |
10 | Criminal | 1 | ▲ new |
11 | account | 1 | ▲ new |
12 | Malware | 1 | - 0 (0%) |
13 | plugin | 1 | ▲ new |
14 | target | 1 | ▲ new |
15 | Browser | 1 | ▲ new |
16 | QR | 1 | ▲ new |
17 | sherrodim | 1 | ▲ new |
18 | Specific | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
No data.

Attacker & Actors
The status of the attacker or attack group being issued.
No data.

Technique
This is an attack technique that is becoming an issue.
No data.

Country & Company
This is a country or company that is an issue.
No data.
Threat info
Last 5SNS
(Total : 1)
Total keyword
WhatsApp Browser target plugin
News
(Total : 2)
Total keyword
No | Title | Date |
---|---|---|
1 | Porting COBOL Code and the Trouble With Ditching Domain Specific Languages - Hackaday | 2025.04.16 |
2 | Has AI changed malicious script obfuscation techniques? - Malware.News | 2025.04.16 |
Additional information
No | Title | Date |
---|---|---|
1 | 엔디비아 'AI 심장부' GPU에 보안 구멍.. '즉시 패치' 비상 - 시큐리티팩트 | 2025.04.17 |
2 | Hi, robot: Half of all internet traffic now automated - Malware.News | 2025.04.17 |
3 | Zoom Sees Outage With 50,000 Users Reporting Availability Issues - Bloomberg Technology | 2025.04.17 |
4 | Nude photos and names: KU Health and Kansas hospital sued for data breach - Malware.News | 2025.04.17 |
5 | DeepSeek Poses ‘Profound’ Security Threat, US House Panel Claims - Bloomberg Technology | 2025.04.17 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | The Monastery Where Founders Meditate on Code and Profit - Bloomberg Technolo... | 2025.04.15 |
2 | CrowdStrike Research: Securing AI-Generated Code with Multiple Self-Learning AI Agents - Malware.News | 2025.04.15 |
3 | Exploitation of Ivanti VPN flaw to achieve RCE detailed - Malware.News | 2025.04.14 |
4 | Exploitation of Ivanti VPN flaw to achieve RCE detailed - Malware.News | 2025.04.14 |
5 | Advanced device code phishing leveraged by Russian APT - Malware.News | 2025.04.14 |
View only the last 5 |
Level | Description |
---|---|
danger | File has been identified by 38 AntiVirus engines on VirusTotal as malicious |
warning | Generates some ICMP traffic |
watch | Attempts to create or modify system certificates |
watch | Attempts to identify installed AV products by installation directory |
watch | Checks for the presence of known devices from debuggers and forensic tools |
watch | Checks for the presence of known windows from debuggers and forensic tools |
watch | Checks the version of Bios |
watch | Collects information about installed applications |
watch | Communicates with host for which no DNS query was performed |
watch | Deletes a large number of files from the system indicative of ransomware |
watch | Detects VMWare through the in instruction feature |
watch | Executes one or more WMI queries |
watch | Harvests credentials from local FTP client softwares |
watch | Installs itself for autorun at Windows startup |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
notice | A process attempted to delay the analysis task. |
notice | A process created a hidden window |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | An executable file was downloaded by the process axplong.exe |
notice | Checks for the Locally Unique Identifier on the system for a suspicious privilege |
notice | Creates a shortcut to an executable file |
notice | Creates executable files on the filesystem |
notice | Creates hidden or system file |
notice | Drops a binary and executes it |
notice | Drops an executable to the user AppData folder |
notice | Executes one or more WMI queries which can be used to identify virtual machines |
notice | Expresses interest in specific running processes |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | One or more potentially interesting buffers were extracted |
notice | Performs some HTTP requests |
notice | Queries for potentially installed applications |
notice | Sends data using the HTTP POST Method |
notice | Steals private information from local Internet browsers |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
notice | Yara rule detected in process memory |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | One or more processes crashed |
info | Queries for the computername |
info | The executable contains unknown PE section names indicative of a packer (could be a false positive) |
info | Tries to locate where the browsers are installed |
info | Uses Windows APIs to generate a cryptographic key |
Network | ET DROP Spamhaus DROP Listed Traffic Inbound group 33 |
Network | ET HUNTING Download Request Containing Suspicious Filename - Crypted |
Network | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
Network | ET INFO Executable Download from dotted-quad Host |
Network | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
Network | ET INFO Microsoft net.tcp Connection Initialization Activity |
Network | ET INFO Packed Executable Download |
Network | ET INFO TLS Handshake Failure |
Network | ET MALWARE [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization) |
Network | ET MALWARE Amadey Bot Activity (POST) |
Network | ET MALWARE Redline Stealer TCP CnC - Id1Response |
Network | ET MALWARE Redline Stealer TCP CnC Activity |
Network | ET MALWARE Redline Stealer/MetaStealer Family Activity (Response) |
Network | ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 |
Network | ET POLICY PE EXE or DLL Windows file download HTTP |
Network | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) |
No data
Beta Service, If you select keyword, you can check detailed information.