diff --git a/2017/2017.07.24.Tick_group/unit42-tick-group-continues-attacks.pdf b/2017/2017.07.24.Tick_group/unit42-tick-group-continues-attacks.pdf new file mode 100644 index 0000000..a5d0e9d Binary files /dev/null and b/2017/2017.07.24.Tick_group/unit42-tick-group-continues-attacks.pdf differ diff --git a/README.md b/README.md index 7fe2f0f..acbb5f9 100644 --- a/README.md +++ b/README.md @@ -12,6 +12,7 @@ Please fire issue to me if any lost of APT/Malware events/campaigns. * [targetedthreats](https://github.com/botherder/targetedthreats/wiki/Reports) ## 2017 +* Jul 24 - [“Tick” Group Continues Attacks](https://researchcenter.paloaltonetworks.com/2017/07/unit42-tick-group-continues-attacks/) | [Local](../../blob/master/2017/2017.07.24.Tick_group) * Jul 18 - [Recent Winnti Infrastructure and Samples](http://www.clearskysec.com/winnti/) | [Local](../../blob/master/2017/2017.07.18.winnti) * Jul 11 - [Winnti Evolution - Going Open Source](https://www.protectwise.com/blog/winnti-evolution-going-open-source.html) | [Local](../../blob/master/2017/2017.07.11.winnti-evolution-going-open-source) * Jul 10 - [OSX Malware Linked to Operation Emmental Hijacks User Network Traffic](http://blog.trendmicro.com/trendlabs-security-intelligence/osx_dok-mac-malware-emmental-hijacks-user-network-traffic/) | [Local](../../blob/master/2017/2017.07.10.osx_dok-mac-malware-emmental-hijacks-user-network-traffic)