Summary: 2025/04/15 19:14

First reported date: 2008/06/10
Inquiry period : 2025/04/14 19:14 ~ 2025/04/15 19:14 (1 days), 17 search results

지난 7일 기간대비 -29% 낮은 트렌드를 보이고 있습니다.
지난 7일 기간대비 상승한 Top5 연관 키워드는
Malware DarkWeb RCE United Kingdom Russia 입니다.
악성코드 유형 MedusaLocker HyperSSL 도 새롭게 확인됩니다.
공격자 APT35 도 새롭게 확인됩니다.
기관 및 기업 Israel 도 새롭게 확인됩니다.
기타 Pawnee Unified Heights DaVita bit 등 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/15 Aufschlüsselung von Ransomware-as-a-Service
    ㆍ 2025/04/14 14th April – Threat Intelligence Report
    ㆍ 2025/04/14 Nearly $23M lost in ransomware attack against IKEA operator


참고로 동일한 그룹의 악성코드 타입은 WannaCry Sodinokibi Phobos 등 78개 종이 확인됩니다.

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1Ransomware 17 ▼ -5 (-29%)
2Victim 7 ▼ -3 (-43%)
3Malware 5 ▲ 1 (20%)
4Alert 5 ▼ -2 (-40%)
5Report 4 - 0 (0%)
6attack 4 ▼ -1 (-25%)
7DarkWeb 3 ▲ 1 (33%)
8United States 3 ▼ -1 (-33%)
9Vulnerability 2 - 0 (0%)
10RCE 2 ▲ 1 (50%)
11Pawnee 2 ▲ new
12United Kingdom 2 ▲ 1 (50%)
13Russia 2 ▲ 2 (100%)
14Campaign 2 - 0 (0%)
15Criminal 2 ▲ 1 (50%)
16hacking 2 ▲ 1 (50%)
17Windows 2 - 0 (0%)
18Unified 2 ▲ new
19Exploit 2 ▼ -1 (-50%)
20Update 2 ▼ -1 (-50%)
21Heights 2 ▲ new
22MWNEWS 2 ▲ 1 (50%)
23group 2 - 0 (0%)
24DaVita 2 ▲ new
25PLAY 2 ▲ 2 (100%)
26bit 1 ▲ new
27few 1 ▲ new
28Education 1 - 0 (0%)
29light 1 ▲ new
30Nine 1 ▲ new
31Iran 1 ▲ 1 (100%)
32ESET 1 ▲ 1 (100%)
33Names 1 ▲ 1 (100%)
34District 1 ▲ 1 (100%)
35공격 1 ▲ 1 (100%)
36School 1 ▲ new
37교육 1 ▲ new
38EDR 1 ▲ 1 (100%)
39APT35 1 ▲ new
40due 1 ▲ new
41Phishing 1 - 0 (0%)
42dark 1 ▲ 1 (100%)
43RaaS 1 ▲ 1 (100%)
44RansomwareasaService 1 ▲ new
45und 1 ▲ new
46Aufschlüsselung 1 ▲ new
47von 1 ▲ new
48ist 1 ▲ new
49DarkAtlas 1 ▲ new
50Squad 1 ▲ new
51Akira 1 - 0 (0%)
52Ransomwares 1 ▲ new
53China 1 - 0 (0%)
54North Korea 1 ▲ 1 (100%)
55DragonForce 1 - 0 (0%)
56Israel 1 ▲ new
57Ex 1 ▲ new
58httpstconbnDrxxH 1 ▲ new
59NL 1 ▲ new
60Olson 1 ▲ new
61amp 1 - 0 (0%)
62firm 1 ▲ new
63Dialysis 1 ▲ new
64Qilin 1 - 0 (0%)
65archive 1 ▲ new
66detection 1 ▲ new
67theyre 1 ▲ new
68Advertising 1 - 0 (0%)
69Operation 1 ▼ -1 (-100%)
70IKEA 1 ▲ 1 (100%)
71operator 1 ▲ new
72April 1 - 0 (0%)
73Hits 1 ▲ new
74ZeroDay 1 ▼ -1 (-100%)
75Check Point 1 ▲ 1 (100%)
76WhatsApp 1 ▲ new
77Twitter 1 ▲ 1 (100%)
78Linux 1 ▲ new
79Deface 1 - 0 (0%)
80MedusaLocker 1 ▲ new
81HyperSSL 1 ▲ new
82Microsoft 1 ▼ -1 (-100%)
83Kidney 1 ▲ new
84Ucraina 1 ▲ 1 (100%)
85Android 1 ▲ 1 (100%)
86Kaspersky 1 - 0 (0%)
87Clop 1 - 0 (0%)
88ToddyCat 1 ▲ new
89Care 1 ▲ new
90기관 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
Ransomware
17 (81%)
Akira
1 (4.8%)
MedusaLocker
1 (4.8%)
HyperSSL
1 (4.8%)
Clop
1 (4.8%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
APT35
1 (100%)
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
RCE
2 (20%)
Campaign
2 (20%)
hacking
2 (20%)
Exploit
2 (20%)
Phishing
1 (10%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
United States
3 (18.8%)
United Kingdom
2 (12.5%)
Russia
2 (12.5%)
Iran
1 (6.3%)
ESET
1 (6.3%)
Malware Family
Top 5

A malware family is a group of applications with similar attack techniques.
In this trend, it is classified into Ransomware, Stealer, RAT or Backdoor, Loader, Botnet, Cryptocurrency Miner.

Threat info
Last 5

SNS

(Total : 11)
  Total keyword

Ransomware Victim DarkWeb Exploit attack United States RCE Akira Windows Update Attacker Criminal Advertising Malware Report

No Title Date
1FalconFeeds.io @FalconFeedsio
???? Ransomware Alert: Pawnee Heights Unified School District 496(https://t.co/BSMCJWt9SR), a public school district dedicated to providing a safe and supportive learning environment that equips students with academic, technical, social, and lifelong skills for success as https://t.co/AYPZuOgxdK
2025.04.15
2FalconFeeds.io @FalconFeedsio
???? DragonForce Ransomware Alert ???? DragonForce Ransomware has added 3 new victims to their dark web portal. - Pratt Homes ???????? - PryorMorrow ???????? - KraftKisarna AB ???????? https://t.co/RKgL4T4B0D
2025.04.15
3Cyber_OSINT @Cyber_O51NT
The DarkAtlas Squad reports on the Akira Ransomware's rise, detailing its exploits, known tools, behaviors on Windows, and methods for initial access and data exfiltration. #Ransomware #Cybersecurity https://t.co/vPxXHyqFLY
2025.04.15
4Kaspersky @kaspersky
Attackers often hide malware in archive files to evade detection and deliver payloads like ransomware. Since these files are widely trusted, they’re a common attack vector. Here’s how cybercriminals exploit archives - and how to secure your systems against them ???? https://t.co/SydkDfp8XA
2025.04.14
5FalconFeeds.io @FalconFeedsio
???? PLAY Ransomware Alert ???? PLAY Ransomware group has added 9 new victims to their darkweb portal. * Waller Corporation ???????? * MBL Architecture ???????? * Cortez Resources, LLC???????? * Comport Consulting ???????? * Merri Makers Catering ???????? * O'Brien & Ryan, LLP???????? * Voigt-
2025.04.14

Additional information

No Request Hash(md5) Report No Date
1 hello.exe
Ransomware Malicious Library .NET EXE PE32 PE File
69d1c11ae24884ea55ab39787853ad0c553312024.11.13
Level Description
danger File has been identified by 58 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
No data
No URL CC ASN Co Reporter Date
1https://hilarious-trifle-d9182e.netlify.app/lootsubmit.ps1
fog Ransomware
SG SGAMAZON-02JAMESWT_WT2025.04.04
2https://hilarious-trifle-d9182e.netlify.app/cwiper.exe
fog Ransomware
SG SGAMAZON-02JAMESWT_WT2025.04.04
3https://hilarious-trifle-d9182e.netlify.app/Pay
fog Ransomware
SG SGAMAZON-02JAMESWT_WT2025.04.04
4https://hilarious-trifle-d9182e.netlify.app/stage1.ps1
fog Ransomware
SG SGAMAZON-02JAMESWT_WT2025.04.04
5https://hilarious-trifle-d9182e.netlify.app/Pay%20Adjustment.zip
fog Ransomware
SG SGAMAZON-02JAMESWT_WT2025.04.04
View only the last 5
Beta Service, If you select keyword, you can check detailed information.