Summary: 2025/04/19 11:56
First reported date: 2016/10/01
Inquiry period : 2025/04/18 11:56 ~ 2025/04/19 11:56 (1 days), 1 search results
지난 7일 기간대비 신규 트렌드를 보이고 있습니다.
악성코드 유형 Mirai 도 새롭게 확인됩니다.
공격기술 RCE Backdoor Exploit Campaign 도 새롭게 확인됩니다.
기관 및 기업 Government CISA Australia Taiwan China South Korea Microsoft United States 도 새롭게 확인됩니다.
기타 Vulnerability MimiKatz intelligence Advertising Education 등 신규 키워드도 확인됩니다.
Mirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world. Ref.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/18 Dark Web Profile: Flax Typhoon
참고로 동일한 그룹의 악성코드 타입은 PingPull Prometei Mirai 등 9개 종이 확인됩니다.
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Vulnerability | 1 | ▲ new |
2 | MimiKatz | 1 | ▲ new |
3 | RCE | 1 | ▲ new |
4 | intelligence | 1 | ▲ new |
5 | Backdoor | 1 | ▲ new |
6 | Government | 1 | ▲ new |
7 | CISA | 1 | ▲ new |
8 | Advertising | 1 | ▲ new |
9 | Education | 1 | ▲ new |
10 | VPN | 1 | ▲ new |
11 | Java | 1 | ▲ new |
12 | Exploit | 1 | ▲ new |
13 | Update | 1 | ▲ new |
14 | Windows | 1 | ▲ new |
15 | Mirai | 1 | ▲ new |
16 | EDR | 1 | ▲ new |
17 | Malware | 1 | ▲ new |
18 | MFA | 1 | ▲ new |
19 | DarkWeb | 1 | ▲ new |
20 | Australia | 1 | ▲ new |
21 | Taiwan | 1 | ▲ new |
22 | China | 1 | ▲ new |
23 | South Korea | 1 | ▲ new |
24 | Microsoft | 1 | ▲ new |
25 | powershell | 1 | ▲ new |
26 | Victim | 1 | ▲ new |
27 | c&c | 1 | ▲ new |
28 | United States | 1 | ▲ new |
29 | Campaign | 1 | ▲ new |
30 | Report | 1 | ▲ new |
31 | Europ | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Mirai |
|
1 (100%) |

Attacker & Actors
The status of the attacker or attack group being issued.
No data.

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
Government |
|
1 (12.5%) |
CISA |
|
1 (12.5%) |
Australia |
|
1 (12.5%) |
Taiwan |
|
1 (12.5%) |
China |
|
1 (12.5%) |
Malware Family
Top 5
A malware family is a group of applications with similar attack techniques.
In this trend, it is classified into Ransomware, Stealer, RAT or Backdoor, Loader, Botnet, Cryptocurrency Miner.
Threat info
Last 5SNS
(Total : 0)No data.
News
(Total : 1)Vulnerability MimiKatz RCE intelligence Backdoor Government CISA Advertising Education VPN Java Exploit Update Windows Mirai EDR Malware MFA DarkWeb Australia Taiwan China South Korea Microsoft powershell Victim c&c United States Campaign Report
No | Title | Date |
---|---|---|
1 | Dark Web Profile: Flax Typhoon - Malware.News | 2025.04.18 |
Additional information
No | Title | Date |
---|---|---|
1 | Tesla to Delay Production of Cheaper EVs, Reuters Reports - Bloomberg Technology | 2025.04.19 |
2 | When Vulnerability Information Flows are Vulnerable Themselves - Malware.News | 2025.04.19 |
3 | CISA warns threat hunting staff of end to Google, Censys contracts as agency cuts set in - Malware.News | 2025.04.19 |
4 | Radiology practice reportedly working with FBI after ‘data security incident’ - Malware.News | 2025.04.19 |
5 | Text scams grow to steal hundreds of millions of dollars - Malware.News | 2025.04.19 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Dark Web Profile: Flax Typhoon - Malware.News | 2025.04.18 |
2 | Dark Web Profile: Flax Typhoon - Malware.News | 2025.04.18 |
3 | Negative Exposure: Edimax Network Cameras Used to Spread Mirai - Akamai | 2025.03.14 |
4 | Akamai warns of active attacks from new Mirai variant - Malware.News | 2025.02.01 |
5 | Mirai Botnet Launches Record 5.6 Tbps DDoS Attack with 13,000+ IoT Devices - The Hacker News | 2025.01.22 |
View only the last 5 |
No | Category | URL | CC | ASN Co | Date |
---|---|---|---|---|---|
1 | c2 | http://cbot.galaxias.cc/ | DE ![]() | 2025.04.03 | |
2 | c2 | http://f.codingdrunk.cc/ | SG ![]() | AS-CHOOPA | 2023.10.06 |
3 | c2 | http://sms.codingdrunk.cc/ | 2023.10.06 |
No | URL | CC | ASN Co | Reporter | Date |
---|---|---|---|---|---|
1 | http://122.5.96.248:41985/i 32-bit arm elf mirai Mozi | CN ![]() | No.31,Jin-rong Street | geenensp | 2025.04.19 |
2 | http://103.77.241.175/and mirai moobot sh | IN ![]() | NDA0E | 2025.04.19 | |
3 | http://192.241.146.135/bins/boatnet.arm5 elf mirai opendir | US ![]() | DIGITALOCEAN-ASN | DaveLikesMalwre | 2025.04.19 |
4 | http://192.241.146.135/bins/boatnet.mips elf mirai opendir | US ![]() | DIGITALOCEAN-ASN | DaveLikesMalwre | 2025.04.19 |
5 | http://192.241.146.135/bins/boatnet.mpsl elf mirai opendir | US ![]() | DIGITALOCEAN-ASN | DaveLikesMalwre | 2025.04.19 |
View only the last 5 |