technique
https://blog.malwarebytes.com/threat-analysis/2017/01/new-mac-backdoor-using-antiquated-code/
Thomas Reed. (2017, January 18). New Mac backdoor using antiquated code. Retrieved July 5, 2017.
technique
https://docs.microsoft.com/en-us/dotnet/api/system.drawing.graphics.copyfromscreen?view=netframework
Microsoft. (n.d.). Graphics.CopyFromScreen Method. Retrieved March 24, 2020.
technique
https://capec.mitre.org/data/definitions/648.html
technique
https://attack.mitre.org/techniques/T1113
technique
http://www.symantec.com/connect/blogs/are-mbr-infections-back-fashion
Lau, H. (2011, August 8). Are MBR Infections Back in Fashion? (Infographic). Retrieved November 13, 2014.
technique
https://www.fireeye.com/content/dam/fireeye-www/regional/fr_FR/offers/pdfs/ig-mtrends-2016.pdf
Mandiant. (2016, February). M-Trends 2016. Retrieved January 4, 2017.
technique
https://attack.mitre.org/techniques/T1067
technique
https://capec.mitre.org/data/definitions/564.html
technique
https://attack.mitre.org/techniques/T1037
technique
https://www.rapid7.com/fundamentals/man-in-the-middle-attacks/
Rapid7. (n.d.). Man-in-the-Middle (MITM) Attacks. Retrieved March 2, 2020.