References

Type
Url
Description

technique

https://kubernetes.io/docs/concepts/overview/kubernetes-api/

The Kubernetes Authors. (n.d.). The Kubernetes API. Retrieved March 29, 2021.


technique

https://attack.mitre.org/techniques/T1613


technique

https://blog.malwarebytes.com/threat-analysis/2017/01/new-mac-backdoor-using-antiquated-code/

Thomas Reed. (2017, January 18). New Mac backdoor using antiquated code. Retrieved July 5, 2017.


technique

https://docs.microsoft.com/en-us/powershell/module/Microsoft.PowerShell.Core/About/about_PowerShell_

Wheeler, S. et al.. (2019, May 1). About PowerShell.exe. Retrieved October 11, 2019.


technique

https://attack.mitre.org/techniques/T1143


technique

https://www.virusbulletin.com/uploads/pdf/conference/vb2014/VB2014-Wardle.pdf

Patrick Wardle. (2015). Malware Persistence on OS X Yosemite. Retrieved July 10, 2017.


technique

https://www.blackhat.com/docs/us-15/materials/us-15-Wardle-Writing-Bad-A-Malware-For-OS-X.pdf

Patrick Wardle. (2015). Writing Bad @$$ Malware for OS X. Retrieved July 10, 2017.


technique

https://attack.mitre.org/techniques/T1161


technique

https://arxiv.org/ftp/arxiv/papers/1408/1408.1136.pdf

Gardiner, J., Cova, M., Nagaraja, S. (2014, February). Command & Control Understanding, Denying and Detecting. Retrieved April 20, 2016.


technique

https://en.wikipedia.org/wiki/Binary-to-text_encoding

Wikipedia. (2016, December 26). Binary-to-text encoding. Retrieved March 1, 2017.