References

Type
Url
Description

technique

http://opensecuritytraining.info/Keylogging_files/The%20Adventures%20of%20a%20Keystroke.pdf

Tinaztepe, E. (n.d.). The Adventures of a Keystroke: An in-depth look into keyloggers on Windows. Retrieved April 27, 2016.


technique

https://community.cisco.com/t5/security-blogs/attackers-continue-to-target-legacy-devices/ba-p/41699

Omar Santos. (2020, October 19). Attackers Continue to Target Legacy Devices. Retrieved October 20, 2020.


technique

https://capec.mitre.org/data/definitions/568.html


technique

https://attack.mitre.org/techniques/T1056/001


technique

https://www.hybrid-analysis.com/sample/ef0d2628823e8e0a0de3b08b8eacaf41cf284c086a948bdfd67f4e4373c14

Hybrid Analysis. (2018, June 12). c9b65b764985dfd7a11d3faf599c56b8.exe. Retrieved August 19, 2018.


technique

https://www.hybrid-analysis.com/sample/22dab012c3e20e3d9291bce14a2bfc448036d3b966c6e78167f4626f5f9e3

Hybrid Analysis. (2018, May 30). 2a8efbfadd798f6111340f7c1c956bee.dll. Retrieved August 19, 2018.


technique

https://attack.mitre.org/techniques/T1222/002


technique

https://web.archive.org/web/20200302085133/https://www.cylance.com/content/dam/cylance/pages/operati

Cylance. (2014, December). Operation Cleaver. Retrieved September 14, 2017.


technique

https://www.us-cert.gov/ncas/alerts/TA18-086A

US-CERT. (2018, March 27). TA18-068A Brute Force Attacks Conducted by Cyber Actors. Retrieved October 2, 2019.


technique

https://capec.mitre.org/data/definitions/49.html