technique
http://opensecuritytraining.info/Keylogging_files/The%20Adventures%20of%20a%20Keystroke.pdf
Tinaztepe, E. (n.d.). The Adventures of a Keystroke: An in-depth look into keyloggers on Windows. Retrieved April 27, 2016.
technique
https://community.cisco.com/t5/security-blogs/attackers-continue-to-target-legacy-devices/ba-p/41699
Omar Santos. (2020, October 19). Attackers Continue to Target Legacy Devices. Retrieved October 20, 2020.
technique
https://capec.mitre.org/data/definitions/568.html
technique
https://attack.mitre.org/techniques/T1056/001
technique
https://www.hybrid-analysis.com/sample/ef0d2628823e8e0a0de3b08b8eacaf41cf284c086a948bdfd67f4e4373c14
Hybrid Analysis. (2018, June 12). c9b65b764985dfd7a11d3faf599c56b8.exe. Retrieved August 19, 2018.
technique
https://www.hybrid-analysis.com/sample/22dab012c3e20e3d9291bce14a2bfc448036d3b966c6e78167f4626f5f9e3
Hybrid Analysis. (2018, May 30). 2a8efbfadd798f6111340f7c1c956bee.dll. Retrieved August 19, 2018.
technique
https://attack.mitre.org/techniques/T1222/002
technique
https://web.archive.org/web/20200302085133/https://www.cylance.com/content/dam/cylance/pages/operati
Cylance. (2014, December). Operation Cleaver. Retrieved September 14, 2017.
technique
https://www.us-cert.gov/ncas/alerts/TA18-086A
US-CERT. (2018, March 27). TA18-068A Brute Force Attacks Conducted by Cyber Actors. Retrieved October 2, 2019.
technique
https://capec.mitre.org/data/definitions/49.html