November 2025 Infostealer Trend Report

November 2025 Infostealer Trend Report

This report provides statistics, trends, and case information on Infostealer malware collected and analyzed during the month of November 2025, including distribution volume, distribution channels, and disguising techniques. The following is a summary of the report.   1) Data Source and Collection Method   The AhnLab SEcurity intelligence Center (ASEC)

2025 Ransomware Threat Landscape: Impact on Korean Enterprises

2025 Ransomware Threat Landscape: Impact on Korean Enterprises

Overview and Background   The number of ransomware attacks has been increasing worldwide in recent years, and Korean companies are not exempt from this trend. The situation is particularly acute in Asia, where ransomware attacks have surged since 2023. This growing trend has prompted a need for a systematic analysis

October 2025 Infostealer Trend Report

October 2025 Infostealer Trend Report

This report provides statistics, trends, and case information on Infostealer malware such as distribution volume, distribution methods, and disguising techniques, which were collected and analyzed for one month in October 2025. The following is a summary of the report.   1) Data Source and Collection Method   AhnLab SEcurity intelligence

September 2025 Infostealer Trend Report

September 2025 Infostealer Trend Report

This report provides statistics, trends, and case information on Infostealer, including distribution volume, distribution methods, and disguises based on the data collected and analyzed in August 2025. The following is a summary of the original report.   1) Data Source and Collection Methods   AhnLab SEcurity intelligence Center (ASEC) operates

August 2025 Infostealer Trend Report

August 2025 Infostealer Trend Report

This report provides statistics, trends, and case information on Infostealer, including distribution volume, distribution methods, and disguises based on the data collected and analyzed in August 2025. The following is a summary of the original report.   1) Data Source and Collection Methods   AhnLab SEcurity intelligence Center (ASEC) operates

Distribution of SmartLoader Malware via Github Repository Disguised as a Legitimate Project

Distribution of SmartLoader Malware via Github Repository Disguised as a Legitimate Project

AhnLab SEcurity intelligence Center (ASEC) has recently discovered the massive distribution of SmartLoader malware through GitHub repositories. These repositories are carefully crafted to appear as legitimate projects and are attracting user interest by focusing on topics such as game cheats, software cracks, and automation tools. Each repository contains a README

Infostealer Disguised as Copyright Infringement Document Distributed in Korea

Infostealer Disguised as Copyright Infringement Document Distributed in Korea

AhnLab SEcurity intelligence Center (ASEC) has confirmed that Infostealer malware disguised as a document containing legal responsibilities and copyright infringement facts is continuously being distributed in Korea. It is mainly distributed through links in email attachments, and the email instructs the recipients to download the evidence related to the copyright

March 2025 Infostealer Trend Report

March 2025 Infostealer Trend Report

This report provides statistics, trends, and case information on the distribution quantity, distribution methods, and disguise techniques of Infostealer collected and analyzed during March 2025. Below is a summary of the report.   1. Data Sources and Collection Methods   To proactively repond to Infostealer, AhnLab SEcurity intelligence Center (ASEC)

Rhadamanthys Infostealer Being Distributed Through MSC Extension

Rhadamanthys Infostealer Being Distributed Through MSC Extension

AhnLab SEcurity intelligence Center (ASEC) has confirmed that Rhadamanthys Infostealer is being distributed as a file with the MSC extension. The MSC extension is an XML-based format that is executed by the Microsoft Management Console (MMC), and it can register and execute various tasks such as script code and command