technique
https://capec.mitre.org/data/definitions/94.html
technique
https://attack.mitre.org/techniques/T1557
technique
https://capec.mitre.org/data/definitions/577.html
technique
https://attack.mitre.org/techniques/T1033
technique
https://documents.trendmicro.com/assets/wp/wp-criminal-hideouts-for-lease.pdf
Max Goncharov. (2015, July 15). Criminal Hideouts for Lease: Bulletproof Hosting Services. Retrieved March 6, 2017.
technique
https://attack.mitre.org/techniques/T1583
technique
https://thisissecurity.stormshield.com/2014/08/20/poweliks-command-line-confusion/
B. Ancel. (2014, August 20). Poweliks – Command Line Confusion. Retrieved March 5, 2018.
technique
https://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/white-papers/wp-cpl-malware.pd
Merces, F. (2014). CPL Malware Malicious Control Panel Items. Retrieved November 1, 2017.
technique
https://attack.mitre.org/techniques/T1218/011
technique
https://docs.docker.com/engine/api/v1.41/
Docker. (n.d.). Docker Engine API v1.41 Reference. Retrieved March 31, 2021.