technique
https://www.elastic.co/blog/embracing-offensive-tooling-building-detections-against-koadic-using-eql
Stepanic, D.. (2020, January 13). Embracing offensive tooling: Building detections against Koadic using EQL. Retrieved November 30, 2020.
technique
https://attack.mitre.org/techniques/T1087/001
technique
http://www.slideshare.net/StephanBorosh/external-to-da-the-os-x-way
Alex Rymdeko-Harvey, Steve Borosh. (2016, May 14). External to DA, the OS X Way. Retrieved July 3, 2017.
technique
http://juusosalonen.com/post/30923743427/breaking-into-the-os-x-keychain
Juuso Salonen. (2012, September 5). Breaking into the OS X keychain. Retrieved July 15, 2017.
technique
https://www.welivesecurity.com/2016/07/06/new-osxkeydnap-malware-hungry-credentials/
Marc-Etienne M.Leveille. (2016, July 6). New OSX/Keydnap malware is hungry for credentials. Retrieved July 3, 2017.
technique
https://attack.mitre.org/techniques/T1167
technique
https://arstechnica.com/tech-policy/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack/
Bright, P. (2011, February 15). Anonymous speaks: the inside story of the HBGary hack. Retrieved March 9, 2017.
technique
http://media.blackhat.com/bh-us-10/whitepapers/Ryan/BlackHat-USA-2010-Ryan-Getting-In-Bed-With-Robin
Ryan, T. (2010). “Getting In Bed with Robin Sage.”. Retrieved March 6, 2017.
technique
https://www.securityweek.com/iranian-hackers-targeted-us-officials-elaborate-social-media-attack-ope
Lennon, M. (2014, May 29). Iranian Hackers Targeted US Officials in Elaborate Social Media Attack Operation. Retrieved March 1, 2017.
technique
https://attack.mitre.org/techniques/T1586/001