Summary: 2025/04/17 10:54

First reported date: 2004/10/06
Inquiry period : 2025/04/16 10:54 ~ 2025/04/17 10:54 (1 days), 3 search results

지난 7일 기간대비 33% 높은 트렌드를 보이고 있습니다.
지난 7일 기간대비 상승한 Top5 연관 키워드는
GameoverP2P c&c Cobalt Strike Malware Victim 입니다.
악성코드 유형 NetWireRC AsyncRAT MgBot ZXShell RAT Lumma XWorm Trojan PlugX TONESHELL 도 새롭게 확인됩니다.
공격자 Hacking Team Equation Group Volt Typhoon Anonymous MuddyWater 도 새롭게 확인됩니다.
공격기술 Dropper 도 새롭게 확인됩니다.
기관 및 기업 China Taiwan Police Iran Zscaler 도 새롭게 확인됩니다.
기타 Cobalt The Shadow Brokers Mustan driver SplatCloak 등 신규 키워드도 확인됩니다.

Gameover ZeuS is a peer-to-peer botnet based on components from the earlier ZeuS trojan. According to a report by Symantec, Gameover Zeus has largely been used for banking fraud and distribution of the CryptoLocker ransomware. In early June 2014, the U.S. Department of Justice announced that an international inter-agency collaboration named Operation Tovar had succeeded in temporarily cutting communication between Gameover ZeuS and its command and control servers.  Ref.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/17 Wars without Gun Smoke: China Plays the Cyber Name-and-Shame Game on Taiwan and the U.S
    ㆍ 2025/04/17 Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2
    ㆍ 2025/04/16 How Indicators of Compromise, Attack, and Behavior Help Spot and Stop Cyber Threats


참고로 동일한 그룹의 악성코드 타입은 PingPull Prometei Mirai 등 9개 종이 확인됩니다.

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1GameoverP2P 3 ▲ 1 (33%)
2c&c 3 ▲ 3 (100%)
3Cobalt Strike 3 ▲ 3 (100%)
4Malware 3 ▲ 1 (33%)
5Victim 3 ▲ 2 (67%)
6EDR 2 ▲ 2 (100%)
7Windows 2 ▲ 1 (50%)
8Backdoor 2 ▲ 2 (100%)
9Exploit 2 ▲ 1 (50%)
10United States 2 ▲ 1 (50%)
11Campaign 2 ▲ 1 (50%)
12Phishing 2 ▲ 2 (100%)
13Update 2 ▲ 1 (50%)
14NetWireRC 2 ▲ new
15IoC 2 ▲ 2 (100%)
16Cobalt 1 ▲ new
17Hacking Team 1 ▲ new
18The Shadow Brokers 1 ▲ new
19AsyncRAT 1 ▲ new
20Equation Group 1 ▲ new
21Mustan 1 ▲ new
22driver 1 ▲ new
23Dropper 1 ▲ new
24Operation 1 - 0 (0%)
25SplatCloak 1 ▲ new
26Ransomware 1 ▲ 1 (100%)
27Report 1 - 0 (0%)
28China 1 ▲ new
29Taiwan 1 ▲ new
30Volt Typhoon 1 ▲ new
31attack 1 - 0 (0%)
32MgBot 1 ▲ new
33Sliver 1 ▲ new
34Anonymous 1 ▲ new
35ZXShell 1 ▲ new
36Police 1 ▲ new
37Criminal 1 ▲ 1 (100%)
38arrest 1 ▲ new
39keylogger 1 ▲ new
40Microsoft 1 - 0 (0%)
41target 1 - 0 (0%)
42RAT 1 ▲ new
43MuddyWater 1 ▲ new
44Vulnerability 1 - 0 (0%)
45powershell 1 - 0 (0%)
46Iran 1 ▲ new
47Lumma 1 ▲ new
48XWorm 1 ▲ new
49Vawtrak 1 ▲ 1 (100%)
50Stealer 1 ▲ 1 (100%)
51Linux 1 ▲ 1 (100%)
52ZeroDay 1 ▲ 1 (100%)
53Email 1 - 0 (0%)
54Trojan 1 ▲ new
55intelligence 1 - 0 (0%)
56MUSTANG PANDA 1 ▲ new
57Kaspersky 1 ▲ 1 (100%)
58Zscaler 1 ▲ new
59schtasks 1 ▲ new
60PlugX 1 ▲ new
61TONESHELL 1 ▲ new
62GitHub 1 ▲ 1 (100%)
63Advertising 1 - 0 (0%)
64hijack 1 ▲ 1 (100%)
65hac 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
GameoverP2P
3 (18.8%)
NetWireRC
2 (12.5%)
AsyncRAT
1 (6.3%)
Ransomware
1 (6.3%)
MgBot
1 (6.3%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Hacking Team
1 (20%)
Equation Group
1 (20%)
Volt Typhoon
1 (20%)
Anonymous
1 (20%)
MuddyWater
1 (20%)
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Backdoor
2 (18.2%)
Exploit
2 (18.2%)
Campaign
2 (18.2%)
Phishing
2 (18.2%)
Dropper
1 (9.1%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
United States
2 (22.2%)
China
1 (11.1%)
Taiwan
1 (11.1%)
Police
1 (11.1%)
Microsoft
1 (11.1%)
Malware Family
Top 5

A malware family is a group of applications with similar attack techniques.
In this trend, it is classified into Ransomware, Stealer, RAT or Backdoor, Loader, Botnet, Cryptocurrency Miner.

Additional information

No data
No data
No data
No data
Beta Service, If you select keyword, you can check detailed information.