References

Type
Url
Description

technique

https://blog.malwarebytes.com/threat-analysis/2017/01/new-mac-backdoor-using-antiquated-code/

Thomas Reed. (2017, January 18). New Mac backdoor using antiquated code. Retrieved July 5, 2017.


technique

https://docs.microsoft.com/en-us/dotnet/api/system.drawing.graphics.copyfromscreen?view=netframework

Microsoft. (n.d.). Graphics.CopyFromScreen Method. Retrieved March 24, 2020.


technique

https://capec.mitre.org/data/definitions/648.html


technique

https://attack.mitre.org/techniques/T1113


technique

http://www.symantec.com/connect/blogs/are-mbr-infections-back-fashion

Lau, H. (2011, August 8). Are MBR Infections Back in Fashion? (Infographic). Retrieved November 13, 2014.


technique

https://www.fireeye.com/content/dam/fireeye-www/regional/fr_FR/offers/pdfs/ig-mtrends-2016.pdf

Mandiant. (2016, February). M-Trends 2016. Retrieved January 4, 2017.


technique

https://attack.mitre.org/techniques/T1067


technique

https://capec.mitre.org/data/definitions/564.html


technique

https://attack.mitre.org/techniques/T1037


technique

https://www.rapid7.com/fundamentals/man-in-the-middle-attacks/

Rapid7. (n.d.). Man-in-the-Middle (MITM) Attacks. Retrieved March 2, 2020.