References

Type
Url
Description

technique

https://securelist.com/project-tajmahal/90240/

GReAT. (2019, April 10). Project TajMahal – a sophisticated new APT framework. Retrieved October 14, 2019.


technique

https://wunderwuzzi23.github.io/blog/passthecookie.html

Rehberger, J. (2018, December). Pivot to the Cloud using Pass the Cookie. Retrieved April 5, 2019.


technique

https://unit42.paloaltonetworks.com/mac-malware-steals-cryptocurrency-exchanges-cookies/

Chen, Y., Hu, W., Xu, Z., et. al. (2019, January 31). Mac Malware Steals Cryptocurrency Exchanges’ Cookies. Retrieved October 14, 2019.


technique

https://attack.mitre.org/techniques/T1539


technique

https://kubernetes.io/docs/concepts/workloads/controllers/cron-jobs/

The Kubernetes Authors. (n.d.). Kubernetes CronJob. Retrieved March 29, 2021.


technique

https://kubernetes.io/docs/concepts/workloads/controllers/job/

The Kubernetes Authors. (n.d.). Kubernetes Jobs. Retrieved March 30, 2021.


technique

https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/

Weizman, Y. (2020, April 2). Threat Matrix for Kubernetes. Retrieved March 30, 2021.


technique

https://attack.mitre.org/techniques/T1053/007


technique

https://blogs.akamai.com/2018/01/a-death-match-of-domain-generation-algorithms.html

Liu, H. and Yuzifovich, Y. (2018, January 9). A Death Match of Domain Generation Algorithms. Retrieved February 18, 2019.


technique

https://umbrella.cisco.com/blog/2016/10/10/domain-generation-algorithms-effective/

Scarfo, A. (2016, October 10). Domain Generation Algorithms – Why so effective?. Retrieved February 18, 2019.