technique
http://windowsir.blogspot.com/2013/07/howto-determinedetect-use-of-anti.html
Carvey, H. (2013, July 23). HowTo: Determine/Detect the use of Anti-Forensics Techniques. Retrieved June 3, 2016.
technique
https://attack.mitre.org/techniques/T1099
technique
https://attack.mitre.org/techniques/T1016/001
technique
https://blog.malwarebytes.com/threat-analysis/2017/04/new-osx-dok-malware-intercepts-web-traffic/
Thomas Reed. (2017, July 7). New OSX.Dok malware intercepts web traffic. Retrieved July 10, 2017.
technique
https://www.cybereason.com/blog/labs-proton-b-what-this-mac-malware-actually-does
Amit Serper. (2018, May 10). ProtonB What this Mac Malware Actually Does. Retrieved March 19, 2018.
technique
https://attack.mitre.org/techniques/T1548/003
technique
https://www.sudo.ws/
Todd C. Miller. (2018). Sudo Man Page. Retrieved March 19, 2018.
technique
http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part-2.pdf
ESET. (2016, October). En Route with Sednit - Part 2: Observing the Comings and Goings. Retrieved November 21, 2016.
technique
https://attack.mitre.org/techniques/T1560/003
technique
https://content.fireeye.com/m-trends/rpt-m-trends-2020
Mandiant. (2020, February). M-Trends 2020. Retrieved April 24, 2020.