References

Type
Url
Description

technique

https://attack.mitre.org/techniques/T1192


technique

https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Report.pdf

Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Unraveling the Long Thread of the Sony Attack. Retrieved February 25, 2016.


technique

https://www.secureworks.com/research/wcry-ransomware-analysis

Counter Threat Unit Research Team. (2017, May 18). WCry Ransomware Analysis. Retrieved March 26, 2019.


technique

https://blog.talosintelligence.com/2018/02/olympic-destroyer.html

Mercer, W. and Rascagneres, P. (2018, February 12). Olympic Destroyer Takes Aim At Winter Olympics. Retrieved March 14, 2019.


technique

https://attack.mitre.org/techniques/T1489


technique

https://arstechnica.com/information-technology/2014/06/active-malware-operation-let-attackers-sabota

Dan Goodin. (2014, June 30). Active malware operation let attackers sabotage US energy industry. Retrieved March 9, 2017.


technique

https://www.losangeles.va.gov/documents/MI-000120-MW.pdf

Federal Bureau of Investigation, Cyber Division. (2020, March 26). FIN7 Cyber Actors Targeting US Businesses Through USB Keystroke Injection Attacks. Retrieved October 14, 2020.


technique

https://www2.fireeye.com/rs/848-DID-242/images/rpt-apt29-hammertoss.pdf

FireEye Labs. (2015, July). HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group. Retrieved September 17, 2015.


technique

https://securelist.com/sofacy-apt-hits-high-profile-targets-with-updated-toolset/72924/

Kaspersky Lab's Global Research and Analysis Team. (2015, December 4). Sofacy APT hits high profile targets with updated toolset. Retrieved December 10, 2015.


technique

https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf

Mandiant. (n.d.). APT1 Exposing One of China’s Cyber Espionage Units. Retrieved July 18, 2016.