diff --git a/2019/2019.07.04.TA505_Gelup_FlowerPippi/Appendix-Latest-Spam-Campaigns-from-TA505-Now-Using-New-Malware-Tools-Gelup-and-FlowerPippi.pdf b/2019/2019.07.04.TA505_Gelup_FlowerPippi/Appendix-Latest-Spam-Campaigns-from-TA505-Now-Using-New-Malware-Tools-Gelup-and-FlowerPippi.pdf new file mode 100644 index 0000000..ed6ab83 Binary files /dev/null and b/2019/2019.07.04.TA505_Gelup_FlowerPippi/Appendix-Latest-Spam-Campaigns-from-TA505-Now-Using-New-Malware-Tools-Gelup-and-FlowerPippi.pdf differ diff --git a/2019/2019.07.04.TA505_Gelup_FlowerPippi/Latest Spam Campaigns from TA505 Now Using New Malware Tools Gelup and FlowerPippi.pdf b/2019/2019.07.04.TA505_Gelup_FlowerPippi/Latest Spam Campaigns from TA505 Now Using New Malware Tools Gelup and FlowerPippi.pdf new file mode 100644 index 0000000..2e62574 Binary files /dev/null and b/2019/2019.07.04.TA505_Gelup_FlowerPippi/Latest Spam Campaigns from TA505 Now Using New Malware Tools Gelup and FlowerPippi.pdf differ diff --git a/2019/2019.07.04.TA505_Gelup_FlowerPippi/Tech-Brief-Latest-Spam-Campaigns-from-TA505-Now-Using-New-Malware-Tools-Gelup-and-FlowerPippi.pdf b/2019/2019.07.04.TA505_Gelup_FlowerPippi/Tech-Brief-Latest-Spam-Campaigns-from-TA505-Now-Using-New-Malware-Tools-Gelup-and-FlowerPippi.pdf new file mode 100644 index 0000000..c25cad4 Binary files /dev/null and b/2019/2019.07.04.TA505_Gelup_FlowerPippi/Tech-Brief-Latest-Spam-Campaigns-from-TA505-Now-Using-New-Malware-Tools-Gelup-and-FlowerPippi.pdf differ diff --git a/README.md b/README.md index 942f2bc..fe89937 100644 --- a/README.md +++ b/README.md @@ -33,6 +33,7 @@ Please fire issue to me if any lost APT/Malware events/campaigns. * Jul 11 - [[ESET] Buhtrap group uses zero‑day in latest espionage campaigns](https://www.welivesecurity.com/2019/07/11/buhtrap-zero-day-espionage-campaigns/) | [Local](../../blob/master/2019/2019.07.11.Buhtrap_Group) * Jul 09 - [[CISCO] Sea Turtle keeps on swimming, finds new victims, DNS hijacking techniques](https://blog.talosintelligence.com/2019/07/sea-turtle-keeps-on-swimming.html) | [Local](../../blob/master/2019/2019.07.09.SeaTurtle_swimming) * Jul 04 - [[Kaspersky] Twas the night before](https://securelist.com/twas-the-night-before/91599/) | [Local](../../blob/master/2019/2019.07.04.NewsBeef_APT) +* Jul 04 - [[Trend Micro] Latest Spam Campaigns from TA505 Now Using New Malware Tools Gelup and FlowerPippi](https://blog.trendmicro.com/trendlabs-security-intelligence/latest-spam-campaigns-from-ta505-now-using-new-malware-tools-gelup-and-flowerpippi/) | [Local](../../blob/master/2019/2019.07.04.TA505_Gelup_FlowerPippi) * Jul 03 - [[Anomali] Multiple Chinese Threat Groups Exploiting CVE-2018-0798 Equation Editor Vulnerability Since Late 2018](https://www.anomali.com/blog/multiple-chinese-threat-groups-exploiting-cve-2018-0798-equation-editor-vulnerability-since-late-2018) | [Local](../../blob/master/2019/2019.07.03.Chinese_APT_CVE-2018-0798) * Jul 01 - [[Check Point] Operation Tripoli](https://research.checkpoint.com/operation-tripoli/) | [Local](../../blob/master/2019/2019.07.01.Operation_Tripoli) * Jul 01 - [[Cylance] Threat Spotlight: Ratsnif - New Network Vermin from OceanLotus](https://threatvector.cylance.com/en_us/home/threat-spotlight-ratsnif-new-network-vermin-from-oceanlotus.html) | [Local](../../blob/master/2019/2019.07.01.OceanLotus_Ratsnif)