References

Type
Url
Description

technique

https://www.elastic.co/blog/embracing-offensive-tooling-building-detections-against-koadic-using-eql

Stepanic, D.. (2020, January 13). Embracing offensive tooling: Building detections against Koadic using EQL. Retrieved November 30, 2020.


technique

https://attack.mitre.org/techniques/T1087/001


technique

http://www.slideshare.net/StephanBorosh/external-to-da-the-os-x-way

Alex Rymdeko-Harvey, Steve Borosh. (2016, May 14). External to DA, the OS X Way. Retrieved July 3, 2017.


technique

http://juusosalonen.com/post/30923743427/breaking-into-the-os-x-keychain

Juuso Salonen. (2012, September 5). Breaking into the OS X keychain. Retrieved July 15, 2017.


technique

https://www.welivesecurity.com/2016/07/06/new-osxkeydnap-malware-hungry-credentials/

Marc-Etienne M.Leveille. (2016, July 6). New OSX/Keydnap malware is hungry for credentials. Retrieved July 3, 2017.


technique

https://attack.mitre.org/techniques/T1167


technique

https://arstechnica.com/tech-policy/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack/

Bright, P. (2011, February 15). Anonymous speaks: the inside story of the HBGary hack. Retrieved March 9, 2017.


technique

http://media.blackhat.com/bh-us-10/whitepapers/Ryan/BlackHat-USA-2010-Ryan-Getting-In-Bed-With-Robin

Ryan, T. (2010). “Getting In Bed with Robin Sage.”. Retrieved March 6, 2017.


technique

https://www.securityweek.com/iranian-hackers-targeted-us-officials-elaborate-social-media-attack-ope

Lennon, M. (2014, May 29). Iranian Hackers Targeted US Officials in Elaborate Social Media Attack Operation. Retrieved March 1, 2017.


technique

https://attack.mitre.org/techniques/T1586/001