References

Type
Url
Description

technique

https://attack.mitre.org/techniques/T1514


technique

https://capec.mitre.org/data/definitions/634.html


technique

https://attack.mitre.org/techniques/T1123


technique

https://developer.apple.com/library/content/documentation/MacOSX/Conceptual/BPSystemStartup/Chapters

Apple. (n.d.). Creating Launch Daemons and Agents. Retrieved July 10, 2017.


technique

https://www.synack.com/wp-content/uploads/2016/03/RSA_OSX_Malware.pdf

Patrick Wardle. (2016, February 29). Let's Play Doctor: Practical OS X Malware Detection & Analysis. Retrieved July 10, 2017.


technique

https://technet.microsoft.com/en-us/library/cc772408.aspx

Microsoft. (n.d.). Services. Retrieved June 7, 2016.


technique

https://attack.mitre.org/techniques/T1543


technique

https://www.trendmicro.com/en_us/research/20/f/xorddos-kaiji-botnet-malware-variants-target-exposed-

Remillano II, A., et al. (2020, June 20). XORDDoS, Kaiji Variants Target Exposed Docker Servers. Retrieved April 5, 2021.


technique

https://unit42.paloaltonetworks.com/hildegard-malware-teamtnt/

Chen, J. et al. (2021, February 3). Hildegard: New TeamTNT Cryptojacking Malware Targeting Kubernetes. Retrieved April 5, 2021.


technique

https://www.volexity.com/blog/2015/10/07/virtual-private-keylogging-cisco-web-vpns-leveraged-for-acc

Adair, S. (2015, October 7). Virtual Private Keylogging: Cisco Web VPNs Leveraged for Access and Persistence. Retrieved March 20, 2017.