diff --git a/galaxy.html b/galaxy.html
index 803d0a4..1b2c9f3 100755
--- a/galaxy.html
+++ b/galaxy.html
@@ -90771,6 +90771,9 @@ Threat actor is a cluster galaxy available in JSON format at https://www.brighttalk.com/webcast/10703/261205 https://github.com/eset/malware-research/tree/master/oceanlotus Since at least 2014, an Iranian threat group tracked by FireEye as APT34 has conducted reconnaissance aligned with the strategic interests of Iran. The group conducts operations primarily in the Middle East, targeting financial, government, energy, chemical, telecommunications and other industries. Repeated targeting of Middle Eastern financial, energy and government organizations leads FireEye to assess that those sectors are a primary concern of APT34. The use of infrastructure tied to Iranian operations, timing and alignment with the national interests of Iran also lead FireEye to assess that APT34 acts on behalf of the Iranian government. APT34 is also known as: APT 34
+
@@ -92094,6 +92097,75 @@ Threat actor is a cluster galaxy available in JSON format at
+
+APT34
+
+
+
FireEye has identified APT35 operations dating back to 2014. APT35, also known as the Newscaster Team, is a threat group sponsored by the Iranian government that conducts long term, resource-intensive operations to collect strategic intelligence. APT35 typically targets U.S. and the Middle Eastern military, diplomatic and government personnel, organizations in the media, energy and defense industrial base (DIB), and engineering, business services and telecommunications sectors.
+APT35 is also known as:
+APT 35
+Newscaster Team
+Links |
+
https://www.fireeye.com/content/dam/collateral/en/mtrends-2018.pdf |
+