January 2026 Phishing Email Trends Report

January 2026 Phishing Email Trends Report

This report provides the distribution quantity, statistics, trends, and case information on phishing emails and email threats collected and analyzed for one month in January 2026. The following are some statistics and cases included in the original report. 1) Phishing Email Threat Statistics In January 2026, the most prevalent threat

June 2025 Infostealer Trend Report

June 2025 Infostealer Trend Report

This report provides statistics, trends, and case information on Infostealer malware including the distribution volume, distribution methods, and disguises based on the data collected and analyzed in June 2025. The following is a summary of the report.   1) Data Sources and Collection Methods   AhnLab SEcurity intelligence Center (ASEC)

XwormRAT Being Distributed Using Steganography

XwormRAT Being Distributed Using Steganography

AhnLab SEcurity intelligence Center (ASEC) collects information on malware distributed through phishing emails by using its own “email honeypot system.” Based on this information, ASEC publishes the “Phishing Email Trend Report” and “Infostealer Trend Report” on the ASEC Blog every month. Recently, XwormRAT has been confirmed to be distributed using

XLoader Info-stealer Distributed Using MS Equation Editor Vulnerability (CVE-2017-11882)

XLoader Info-stealer Distributed Using MS Equation Editor Vulnerability (CVE-2017-11882)

AhnLab Security Intelligence Center (ASEC) publishes the information of phishing emails to AhnLab TIP monthly under the title “Trends Report on Phishing Emails.” There are various keywords/topics disguised as phishing, and this blog will cover cases where emails disguised as emails for checking purchases and order confirmations are used to

February 2025 Infostealer Trend Report

February 2025 Infostealer Trend Report

This report provides statistics, trends, and case information on the distribution quantity, distribution methods, and disguise techniques of Infostealer collected and analyzed during February 2025. Below is a summary of the report.   1. Data Sources and Collection Methods   To proactively repond to Infostealer, AhnLab SEcurity intelligence Center (ASEC)

XLoader Executed Through JAR Signing Tool (jarsigner.exe)

XLoader Executed Through JAR Signing Tool (jarsigner.exe)

Recently, AhnLab SEcurity intelligence Center (ASEC) identified the distribution of XLoader malware using the DLL side-loading technique. The DLL side-loading attack technique saves a normal application and a malicious DLL in the same folder path to enable the malicious DLL to also be executed when the application is run. The