technique
https://attack.mitre.org/techniques/T1192
technique
https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Report.pdf
Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Unraveling the Long Thread of the Sony Attack. Retrieved February 25, 2016.
technique
https://www.secureworks.com/research/wcry-ransomware-analysis
Counter Threat Unit Research Team. (2017, May 18). WCry Ransomware Analysis. Retrieved March 26, 2019.
technique
https://blog.talosintelligence.com/2018/02/olympic-destroyer.html
Mercer, W. and Rascagneres, P. (2018, February 12). Olympic Destroyer Takes Aim At Winter Olympics. Retrieved March 14, 2019.
technique
https://attack.mitre.org/techniques/T1489
technique
https://arstechnica.com/information-technology/2014/06/active-malware-operation-let-attackers-sabota
Dan Goodin. (2014, June 30). Active malware operation let attackers sabotage US energy industry. Retrieved March 9, 2017.
technique
https://www.losangeles.va.gov/documents/MI-000120-MW.pdf
Federal Bureau of Investigation, Cyber Division. (2020, March 26). FIN7 Cyber Actors Targeting US Businesses Through USB Keystroke Injection Attacks. Retrieved October 14, 2020.
technique
https://www2.fireeye.com/rs/848-DID-242/images/rpt-apt29-hammertoss.pdf
FireEye Labs. (2015, July). HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group. Retrieved September 17, 2015.
technique
https://securelist.com/sofacy-apt-hits-high-profile-targets-with-updated-toolset/72924/
Kaspersky Lab's Global Research and Analysis Team. (2015, December 4). Sofacy APT hits high profile targets with updated toolset. Retrieved December 10, 2015.
technique
https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf
Mandiant. (n.d.). APT1 Exposing One of China’s Cyber Espionage Units. Retrieved July 18, 2016.