Summary: 2025/04/17 10:54
First reported date: 2004/10/06
Inquiry period : 2025/04/16 10:54 ~ 2025/04/17 10:54 (1 days), 3 search results
지난 7일 기간대비 33% 높은 트렌드를 보이고 있습니다.
지난 7일 기간대비 상승한 Top5 연관 키워드는 GameoverP2P c&c Cobalt Strike Malware Victim 입니다.
악성코드 유형 NetWireRC AsyncRAT MgBot ZXShell RAT Lumma XWorm Trojan PlugX TONESHELL 도 새롭게 확인됩니다.
공격자 Hacking Team Equation Group Volt Typhoon Anonymous MuddyWater 도 새롭게 확인됩니다.
공격기술 Dropper 도 새롭게 확인됩니다.
기관 및 기업 China Taiwan Police Iran Zscaler 도 새롭게 확인됩니다.
기타 Cobalt The Shadow Brokers Mustan driver SplatCloak 등 신규 키워드도 확인됩니다.
Gameover ZeuS is a peer-to-peer botnet based on components from the earlier ZeuS trojan. According to a report by Symantec, Gameover Zeus has largely been used for banking fraud and distribution of the CryptoLocker ransomware. In early June 2014, the U.S. Department of Justice announced that an international inter-agency collaboration named Operation Tovar had succeeded in temporarily cutting communication between Gameover ZeuS and its command and control servers. Ref.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/17 Wars without Gun Smoke: China Plays the Cyber Name-and-Shame Game on Taiwan and the U.S
ㆍ 2025/04/17 Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2
ㆍ 2025/04/16 How Indicators of Compromise, Attack, and Behavior Help Spot and Stop Cyber Threats
참고로 동일한 그룹의 악성코드 타입은 PingPull Prometei Mirai 등 9개 종이 확인됩니다.
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | GameoverP2P | 3 | ▲ 1 (33%) |
2 | c&c | 3 | ▲ 3 (100%) |
3 | Cobalt Strike | 3 | ▲ 3 (100%) |
4 | Malware | 3 | ▲ 1 (33%) |
5 | Victim | 3 | ▲ 2 (67%) |
6 | EDR | 2 | ▲ 2 (100%) |
7 | Windows | 2 | ▲ 1 (50%) |
8 | Backdoor | 2 | ▲ 2 (100%) |
9 | Exploit | 2 | ▲ 1 (50%) |
10 | United States | 2 | ▲ 1 (50%) |
11 | Campaign | 2 | ▲ 1 (50%) |
12 | Phishing | 2 | ▲ 2 (100%) |
13 | Update | 2 | ▲ 1 (50%) |
14 | NetWireRC | 2 | ▲ new |
15 | IoC | 2 | ▲ 2 (100%) |
16 | Cobalt | 1 | ▲ new |
17 | Hacking Team | 1 | ▲ new |
18 | The Shadow Brokers | 1 | ▲ new |
19 | AsyncRAT | 1 | ▲ new |
20 | Equation Group | 1 | ▲ new |
21 | Mustan | 1 | ▲ new |
22 | driver | 1 | ▲ new |
23 | Dropper | 1 | ▲ new |
24 | Operation | 1 | - 0 (0%) |
25 | SplatCloak | 1 | ▲ new |
26 | Ransomware | 1 | ▲ 1 (100%) |
27 | Report | 1 | - 0 (0%) |
28 | China | 1 | ▲ new |
29 | Taiwan | 1 | ▲ new |
30 | Volt Typhoon | 1 | ▲ new |
31 | attack | 1 | - 0 (0%) |
32 | MgBot | 1 | ▲ new |
33 | Sliver | 1 | ▲ new |
34 | Anonymous | 1 | ▲ new |
35 | ZXShell | 1 | ▲ new |
36 | Police | 1 | ▲ new |
37 | Criminal | 1 | ▲ 1 (100%) |
38 | arrest | 1 | ▲ new |
39 | keylogger | 1 | ▲ new |
40 | Microsoft | 1 | - 0 (0%) |
41 | target | 1 | - 0 (0%) |
42 | RAT | 1 | ▲ new |
43 | MuddyWater | 1 | ▲ new |
44 | Vulnerability | 1 | - 0 (0%) |
45 | powershell | 1 | - 0 (0%) |
46 | Iran | 1 | ▲ new |
47 | Lumma | 1 | ▲ new |
48 | XWorm | 1 | ▲ new |
49 | Vawtrak | 1 | ▲ 1 (100%) |
50 | Stealer | 1 | ▲ 1 (100%) |
51 | Linux | 1 | ▲ 1 (100%) |
52 | ZeroDay | 1 | ▲ 1 (100%) |
53 | 1 | - 0 (0%) | |
54 | Trojan | 1 | ▲ new |
55 | intelligence | 1 | - 0 (0%) |
56 | MUSTANG PANDA | 1 | ▲ new |
57 | Kaspersky | 1 | ▲ 1 (100%) |
58 | Zscaler | 1 | ▲ new |
59 | schtasks | 1 | ▲ new |
60 | PlugX | 1 | ▲ new |
61 | TONESHELL | 1 | ▲ new |
62 | GitHub | 1 | ▲ 1 (100%) |
63 | Advertising | 1 | - 0 (0%) |
64 | hijack | 1 | ▲ 1 (100%) |
65 | hac | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
GameoverP2P |
|
3 (18.8%) |
NetWireRC |
|
2 (12.5%) |
AsyncRAT |
|
1 (6.3%) |
Ransomware |
|
1 (6.3%) |
MgBot |
|
1 (6.3%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|---|---|
Hacking Team |
|
1 (20%) |
Equation Group |
|
1 (20%) |
Volt Typhoon |
|
1 (20%) |
Anonymous |
|
1 (20%) |
MuddyWater |
|
1 (20%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
United States |
|
2 (22.2%) |
China |
|
1 (11.1%) |
Taiwan |
|
1 (11.1%) |
Police |
|
1 (11.1%) |
Microsoft |
|
1 (11.1%) |
Malware Family
Top 5
A malware family is a group of applications with similar attack techniques.
In this trend, it is classified into Ransomware, Stealer, RAT or Backdoor, Loader, Botnet, Cryptocurrency Miner.
Threat info
Last 5SNS
(Total : 0)No data.
News
(Total : 3)GameoverP2P c&c Cobalt Strike Malware Victim EDR Windows Backdoor Attacker Exploit United States Campaign Phishing Update NetWireRC IoC Cobalt Hacking Team The Shadow Brokers AsyncRAT Equation Group Dropper Operation Ransomware Report China Taiwan Volt Typhoon attack MgBot Sliver Anonymous ZXShell Police Criminal arrest keylogger Microsoft target RAT MuddyWater Vulnerability powershell Iran Lumma XWorm Vawtrak Stealer Linux ZeroDay Email Trojan intelligence MUSTANG PANDA Kaspersky Zscaler schtasks PlugX TONESHELL GitHub Advertising hijack
No | Title | Date |
---|---|---|
1 | Wars without Gun Smoke: China Plays the Cyber Name-and-Shame Game on Taiwan and the U.S - Malware.News | 2025.04.17 |
2 | Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2 - Malware.News | 2025.04.17 |
3 | How Indicators of Compromise, Attack, and Behavior Help Spot and Stop Cyber Threats - Malware.News | 2025.04.16 |
Additional information
No | Title | Date |
---|---|---|
1 | 엔디비아 'AI 심장부' GPU에 보안 구멍.. '즉시 패치' 비상 - 시큐리티팩트 | 2025.04.17 |
2 | Hi, robot: Half of all internet traffic now automated - Malware.News | 2025.04.17 |
3 | Zoom Sees Outage With 50,000 Users Reporting Availability Issues - Bloomberg Technology | 2025.04.17 |
4 | Nude photos and names: KU Health and Kansas hospital sued for data breach - Malware.News | 2025.04.17 |
5 | DeepSeek Poses ‘Profound’ Security Threat, US House Panel Claims - Bloomberg Technology | 2025.04.17 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Wars without Gun Smoke: China Plays the Cyber Name-and-Shame Game on Taiwan and the U.S - Malware.News | 2025.04.17 |
2 | Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2 - Malware.News | 2025.04.17 |
3 | Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2 - Malware.News | 2025.04.17 |
4 | Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2 - Malware.News | 2025.04.17 |
5 | Threat actors misuse Node.js to deliver malware and other malicious payloads - Malware.News | 2025.04.16 |
View only the last 5 |