References

Type
Url
Description

technique

http://windowsir.blogspot.com/2013/07/howto-determinedetect-use-of-anti.html

Carvey, H. (2013, July 23). HowTo: Determine/Detect the use of Anti-Forensics Techniques. Retrieved June 3, 2016.


technique

https://attack.mitre.org/techniques/T1099


technique

https://attack.mitre.org/techniques/T1016/001


technique

https://blog.malwarebytes.com/threat-analysis/2017/04/new-osx-dok-malware-intercepts-web-traffic/

Thomas Reed. (2017, July 7). New OSX.Dok malware intercepts web traffic. Retrieved July 10, 2017.


technique

https://www.cybereason.com/blog/labs-proton-b-what-this-mac-malware-actually-does

Amit Serper. (2018, May 10). ProtonB What this Mac Malware Actually Does. Retrieved March 19, 2018.


technique

https://attack.mitre.org/techniques/T1548/003


technique

https://www.sudo.ws/

Todd C. Miller. (2018). Sudo Man Page. Retrieved March 19, 2018.


technique

http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part-2.pdf

ESET. (2016, October). En Route with Sednit - Part 2: Observing the Comings and Goings. Retrieved November 21, 2016.


technique

https://attack.mitre.org/techniques/T1560/003


technique

https://content.fireeye.com/m-trends/rpt-m-trends-2020

Mandiant. (2020, February). M-Trends 2020. Retrieved April 24, 2020.