technique
https://blogs.cisco.com/security/evolution-of-attacks-on-cisco-ios-devices
Graham Holmes. (2015, October 8). Evolution of attacks on Cisco IOS devices. Retrieved October 19, 2020.
technique
https://attack.mitre.org/techniques/T1600
technique
https://www.cyberark.com/resources/threat-research-blog/golden-saml-newly-discovered-attack-techniqu
Reiner, S. (2017, November 21). Golden SAML: Newly Discovered Attack Technique Forges Authentication to Cloud Apps. Retrieved December 17, 2020.
technique
https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-configurable-token-
Microsoft. (2020, December 14). Configurable token lifetimes in Microsoft Identity Platform. Retrieved December 22, 2020.
technique
https://msrc-blog.microsoft.com/2020/12/13/customer-guidance-on-recent-nation-state-cyber-attacks/
MSRC. (2020, December 13). Customer Guidance on Recent Nation-State Cyber Attacks. Retrieved December 17, 2020.
technique
https://blogs.microsoft.com/on-the-issues/2020/12/13/customers-protect-nation-state-cyberattacks/
Lambert, J. (2020, December 13). Important steps for customers to protect themselves from recent nation-state cyberattacks. Retrieved December 17, 2020.
technique
https://www.sygnia.co/golden-saml-advisory
Sygnia. (2020, December). Detection and Hunting of Golden SAML Attack. Retrieved January 6, 2021.
technique
https://attack.mitre.org/techniques/T1606/002
technique
https://blog.trendmicro.com/trendlabs-security-intelligence/pawn-storm-abuses-open-authentication-ad
Hacquebord, F.. (2017, April 25). Pawn Storm Abuses Open Authentication in Advanced Social Engineering Attacks. Retrieved October 4, 2019.
technique
https://capec.mitre.org/data/definitions/163.html