diff --git a/2019/2019.07.18.Okrum/ESET_Okrum_and_Ketrican.pdf b/2019/2019.07.18.Okrum/ESET_Okrum_and_Ketrican.pdf new file mode 100644 index 0000000..f434714 Binary files /dev/null and b/2019/2019.07.18.Okrum/ESET_Okrum_and_Ketrican.pdf differ diff --git a/2019/2019.07.18.Proyecto_RAT_Colombian/Appendix_Spam_Campaign_Targets_Colombian_Entities_with_Custom_made_Proyecto_RAT_Uses_Email_Service_YOPmail_for_C&C.pdf b/2019/2019.07.18.Proyecto_RAT_Colombian/Appendix_Spam_Campaign_Targets_Colombian_Entities_with_Custom_made_Proyecto_RAT_Uses_Email_Service_YOPmail_for_C&C.pdf new file mode 100644 index 0000000..1629d6b Binary files /dev/null and b/2019/2019.07.18.Proyecto_RAT_Colombian/Appendix_Spam_Campaign_Targets_Colombian_Entities_with_Custom_made_Proyecto_RAT_Uses_Email_Service_YOPmail_for_C&C.pdf differ diff --git a/2019/2019.07.18.Proyecto_RAT_Colombian/Spam Campaign Targets Colombian Entities with Custom-made Proyecto RAT.pdf b/2019/2019.07.18.Proyecto_RAT_Colombian/Spam Campaign Targets Colombian Entities with Custom-made Proyecto RAT.pdf new file mode 100644 index 0000000..fe085ae Binary files /dev/null and b/2019/2019.07.18.Proyecto_RAT_Colombian/Spam Campaign Targets Colombian Entities with Custom-made Proyecto RAT.pdf differ diff --git a/README.md b/README.md index fe83e3e..5197028 100644 --- a/README.md +++ b/README.md @@ -25,6 +25,8 @@ Please fire issue to me if any lost APT/Malware events/campaigns. * [APT_REPORT collected by @blackorbird](https://github.com/blackorbird/APT_REPORT) ## 2019 +* Jul 18 - [[Trend Micro] Spam Campaign Targets Colombian Entities with Custom-made ‘Proyecto RAT,’ Uses Email Service YOPmail for C&C](https://blog.trendmicro.com/trendlabs-security-intelligence/spam-campaign-targets-colombian-entities-with-custom-proyecto-rat-email-service-yopmail-for-cc/) | [Local](../../blob/master/2019/2019.07.18.Proyecto_RAT_Colombian) +* Jul 18 - [[ESET] OKRUM AND KETRICAN: AN OVERVIEW OF RECENT KE3CHANG GROUP ACTIVITY ](https://www.welivesecurity.com/2019/07/18/okrum-ke3chang-targets-diplomatic-missions/) | [Local](../../blob/master/2019/2019.07.18.Okrum) * Jul 17 - [[Intezer] EvilGnome: Rare Malware Spying on Linux Desktop Users](https://www.intezer.com/blog-evilgnome-rare-malware-spying-on-linux-desktop-users/) | [Local](../../blob/master/2019/2019.07.17.EvilGnome) * Jul 11 - [[ESET] Buhtrap group uses zero‑day in latest espionage campaigns](https://www.welivesecurity.com/2019/07/11/buhtrap-zero-day-espionage-campaigns/) | [Local](../../blob/master/2019/2019.07.11.Buhtrap_Group) * Jul 09 - [[CISCO] Sea Turtle keeps on swimming, finds new victims, DNS hijacking techniques](https://blog.talosintelligence.com/2019/07/sea-turtle-keeps-on-swimming.html) | [Local](../../blob/master/2019/2019.07.09.SeaTurtle_swimming)