technique
https://securelist.com/project-tajmahal/90240/
GReAT. (2019, April 10). Project TajMahal – a sophisticated new APT framework. Retrieved October 14, 2019.
technique
https://wunderwuzzi23.github.io/blog/passthecookie.html
Rehberger, J. (2018, December). Pivot to the Cloud using Pass the Cookie. Retrieved April 5, 2019.
technique
https://unit42.paloaltonetworks.com/mac-malware-steals-cryptocurrency-exchanges-cookies/
Chen, Y., Hu, W., Xu, Z., et. al. (2019, January 31). Mac Malware Steals Cryptocurrency Exchanges’ Cookies. Retrieved October 14, 2019.
technique
https://attack.mitre.org/techniques/T1539
technique
https://kubernetes.io/docs/concepts/workloads/controllers/cron-jobs/
The Kubernetes Authors. (n.d.). Kubernetes CronJob. Retrieved March 29, 2021.
technique
https://kubernetes.io/docs/concepts/workloads/controllers/job/
The Kubernetes Authors. (n.d.). Kubernetes Jobs. Retrieved March 30, 2021.
technique
https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/
Weizman, Y. (2020, April 2). Threat Matrix for Kubernetes. Retrieved March 30, 2021.
technique
https://attack.mitre.org/techniques/T1053/007
technique
https://blogs.akamai.com/2018/01/a-death-match-of-domain-generation-algorithms.html
Liu, H. and Yuzifovich, Y. (2018, January 9). A Death Match of Domain Generation Algorithms. Retrieved February 18, 2019.
technique
https://umbrella.cisco.com/blog/2016/10/10/domain-generation-algorithms-effective/
Scarfo, A. (2016, October 10). Domain Generation Algorithms – Why so effective?. Retrieved February 18, 2019.