diff --git a/2019/2019.07.24.Winnti_German/Winnti_ Attacking the Heart of the German Industry.pdf b/2019/2019.07.24.Winnti_German/Winnti_ Attacking the Heart of the German Industry.pdf new file mode 100644 index 0000000..087bc54 Binary files /dev/null and b/2019/2019.07.24.Winnti_German/Winnti_ Attacking the Heart of the German Industry.pdf differ diff --git a/README.md b/README.md index 7035160..df86f18 100644 --- a/README.md +++ b/README.md @@ -25,6 +25,7 @@ Please fire issue to me if any lost APT/Malware events/campaigns. * [APT_REPORT collected by @blackorbird](https://github.com/blackorbird/APT_REPORT) ## 2019 +* Jul 24 - [[] Attacking the Heart of the German Industry](https://web.br.de/interaktiv/winnti/english/) | [Local](../../blob/master/2019/2019.07.24.Winnti_German) * Jul 24 - [[ProofPoint] Chinese APT “Operation LagTime IT” Targets Government Information Technology Agencies in Eastern Asia](https://www.proofpoint.com/us/threat-insight/post/chinese-apt-operation-lagtime-it-targets-government-information-technology) | [Local](../../blob/master/2019/2019.07.24.Operation_LagTime_IT) * Jul 18 - [[FireEye] Hard Pass: Declining APT34’s Invite to Join Their Professional Network](https://www.fireeye.com/blog/threat-research/2019/07/hard-pass-declining-apt34-invite-to-join-their-professional-network.html) | [Local](../../blob/master/2019/2019.07.18.APT34_Hard_Pass) * Jul 18 - [[Trend Micro] Spam Campaign Targets Colombian Entities with Custom-made ‘Proyecto RAT,’ Uses Email Service YOPmail for C&C](https://blog.trendmicro.com/trendlabs-security-intelligence/spam-campaign-targets-colombian-entities-with-custom-proyecto-rat-email-service-yopmail-for-cc/) | [Local](../../blob/master/2019/2019.07.18.Proyecto_RAT_Colombian)