Summary: 2025/04/19 11:56

First reported date: 2016/10/01
Inquiry period : 2025/04/18 11:56 ~ 2025/04/19 11:56 (1 days), 1 search results

지난 7일 기간대비 신규 트렌드를 보이고 있습니다.
악성코드 유형
Mirai 도 새롭게 확인됩니다.
공격기술 RCE Backdoor Exploit Campaign 도 새롭게 확인됩니다.
기관 및 기업 Government CISA Australia Taiwan China South Korea Microsoft United States 도 새롭게 확인됩니다.
기타 Vulnerability MimiKatz intelligence Advertising Education 등 신규 키워드도 확인됩니다.

Mirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.  Ref.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/18 Dark Web Profile: Flax Typhoon


참고로 동일한 그룹의 악성코드 타입은 PingPull Prometei Mirai 등 9개 종이 확인됩니다.

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1Vulnerability 1 ▲ new
2MimiKatz 1 ▲ new
3RCE 1 ▲ new
4intelligence 1 ▲ new
5Backdoor 1 ▲ new
6Government 1 ▲ new
7CISA 1 ▲ new
8Advertising 1 ▲ new
9Education 1 ▲ new
10VPN 1 ▲ new
11Java 1 ▲ new
12Exploit 1 ▲ new
13Update 1 ▲ new
14Windows 1 ▲ new
15Mirai 1 ▲ new
16EDR 1 ▲ new
17Malware 1 ▲ new
18MFA 1 ▲ new
19DarkWeb 1 ▲ new
20Australia 1 ▲ new
21Taiwan 1 ▲ new
22China 1 ▲ new
23South Korea 1 ▲ new
24Microsoft 1 ▲ new
25powershell 1 ▲ new
26Victim 1 ▲ new
27c&c 1 ▲ new
28United States 1 ▲ new
29Campaign 1 ▲ new
30Report 1 ▲ new
31Europ 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
Mirai
1 (100%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


No data.

Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
RCE
1 (25%)
Backdoor
1 (25%)
Exploit
1 (25%)
Campaign
1 (25%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
Government
1 (12.5%)
CISA
1 (12.5%)
Australia
1 (12.5%)
Taiwan
1 (12.5%)
China
1 (12.5%)
Malware Family
Top 5

A malware family is a group of applications with similar attack techniques.
In this trend, it is classified into Ransomware, Stealer, RAT or Backdoor, Loader, Botnet, Cryptocurrency Miner.

Additional information

No data
No data
No Category URL CC ASN Co Date
1c2http://cbot.galaxias.cc/DE DE2025.04.03
2c2http://f.codingdrunk.cc/SG SGAS-CHOOPA2023.10.06
3c2http://sms.codingdrunk.cc/2023.10.06
No URL CC ASN Co Reporter Date
1http://122.5.96.248:41985/i
32-bit arm elf mirai Mozi
CN CNNo.31,Jin-rong Streetgeenensp2025.04.19
2http://103.77.241.175/and
mirai moobot sh
IN INNDA0E2025.04.19
3http://192.241.146.135/bins/boatnet.arm5
elf mirai opendir
US USDIGITALOCEAN-ASNDaveLikesMalwre2025.04.19
4http://192.241.146.135/bins/boatnet.mips
elf mirai opendir
US USDIGITALOCEAN-ASNDaveLikesMalwre2025.04.19
5http://192.241.146.135/bins/boatnet.mpsl
elf mirai opendir
US USDIGITALOCEAN-ASNDaveLikesMalwre2025.04.19
View only the last 5
Beta Service, If you select keyword, you can check detailed information.