Input Capture

Adversaries can use methods of capturing user input for obtaining credentials for Valid Accounts and information Collection that include keylogging and user input field interception.

Keylogging is the most prevalent type of input capture, with many different ways of intercepting keystrokes, [1] but other methods exist to target information for specific purposes, such as performing a UAC prompt or wrapping the Windows default credential provider. [2]

Keylogging is likely to be used to acquire credentials for new access opportunities when Credential Dumping efforts are not effective, and may require an adversary to remain passive on a system for a period of time before an opportunity arises.

Adversaries may also install code on externally facing portals, such as a VPN login page, to capture and transmit credentials of users who attempt to log into the service. This variation on input capture may be conducted post-compromise using legitimate administrative access as a backup measure to maintain network access through External Remote Services and Valid Accounts or as part of the initial compromise by exploitation of the externally facing web service. [3]

ID: T1056
Tactic: Collection, Credential Access
Platform: Linux, macOS, Windows
Permissions Required: Administrator, SYSTEM
Data Sources: Windows Registry, Kernel drivers, Process monitoring, API monitoring
CAPEC ID: CAPEC-568
Contributors: John Lambert, Microsoft Threat Intelligence Center
Version: 1.0

Procedure Examples

Name Description
ADVSTORESHELL

ADVSTORESHELL can perform keylogging.[14][15]

Agent Tesla

Agent Tesla can log keystrokes on the victim’s machine.[49][50][51]

APT28

APT28 has used tools to perform keylogging.[108][54]

APT3

APT3 has used a keylogging tool that records keystrokes in encrypted files.[95]

APT38

APT38 used a Trojan called KEYLIME to capture keystrokes from the victim’s machine.[98]

APT41

APT41 used a keylogger called GEARSHIFT on a target system.[92]

Astaroth

Astaroth logs keystrokes from the victim's machine.[81]

BabyShark

BabyShark has a PowerShell-based remote administration ability that can implement a PowerShell or C# based keylogger.[94]

BADNEWS

When it first starts, BADNEWS spawns a new thread to log keystrokes.[41][42][43]

BadPatch

BadPatch has a keylogging capability.[23]

Bandook

Bandook contains keylogging capabilities[70]

BISCUIT

BISCUIT can capture keystrokes.[75]

BlackEnergy

BlackEnergy has run a keylogger plug-in on a victim.[76]

Carbanak

Carbanak logs key strokes for configured processes and sends them back to the C2 server.[25][26]

Cardinal RAT

Cardinal RAT can log keystrokes.[72]

Catchamas

Catchamas collects keystrokes from the victim’s machine.[61]

CHOPSTICK

CHOPSTICK is capable of performing keylogging.[53][14][54]

Cobalt Strike

Cobalt Strike can track key presses with a keylogger module.[11]

Cobian RAT

Cobian RAT has a feature to perform keylogging on the victim’s machine.[59]

CosmicDuke

CosmicDuke uses a keylogger and steals clipboard contents from victims.[65]

DarkComet

DarkComet has a keylogging capability.[22]

Darkhotel

Darkhotel has used a keylogger.[102]

Daserf

Daserf can log keystrokes.[73][74]

Derusbi

Derusbi is capable of logging keystrokes.[37]

DOGCALL

DOGCALL is capable of logging keystrokes.[62][63]

Duqu

Duqu can track key presses with a keylogger module.[34]

DustySky

DustySky contains a keylogger.[16]

Empire

Empire includes keylogging capabilities for Windows, Linux, and macOS systems.[12]

EvilGrab

EvilGrab has the capability to capture keystrokes.[17]

FakeM

FakeM contains a keylogger module.[77]

FIN4

FIN4 has captured credentials via fake Outlook Web App (OWA) login pages and has also used a .NET based keylogger.[105][106]

Fysbis

Fysbis can perform keylogging. [91]

gh0st RAT

gh0st RAT has a keylogger.[38]

GreyEnergy

GreyEnergy has a module to harvest pressed keystrokes.[55]

Group5

Malware used by Group5 is capable of capturing keystrokes.[87]

Helminth

The executable version of Helminth has a module to log keystrokes.[68]

HTTPBrowser

HTTPBrowser is capable of capturing keystrokes on victims.[58]

JPIN

JPIN contains a custom keylogger.[48]

jRAT

jRAT has the capability to log keystrokes from the victim’s machine, both offline and online.[66][67]

Kasidet

Kasidet has the ability to initiate keylogging.[78]

Ke3chang

Ke3chang has used keyloggers.[109]

KeyBoy

KeyBoy installs a keylogger for intercepting credentials and keystrokes.[88]

Kimsuky

Kimsuky has used a PowerShell-based keylogger.[112][113]

KONNI

KONNI has the capability to perform keylogging.[46]

Lazarus Group

Lazarus Group malware KiloAlfa contains keylogging functionality.[96][97]

Machete

Machete logs keystrokes from the victim’s machine. [89][90]

MacSpy

MacSpy captures keystrokes.[19]

Magic Hound

Magic Hound malware is capable of keylogging.[107]

Matroyshka

Matroyshka is capable of keylogging.[30][31]

menuPass

menuPass has used key loggers to steal usernames and passwords.[111]

Micropsia

Micropsia has keylogging capabilities.[71]

MoonWind

MoonWind has a keylogger.[29]

NanoCore

NanoCore can perform keylogging on the victim’s machine.[27]

NavRAT

NavRAT logs the keystrokes on the targeted system.[60]

NetTraveler

NetTraveler contains a keylogger.[40]

NETWIRE

NETWIRE can perform keylogging.[35][36]

njRAT

njRAT is capable of logging keystrokes.[85][86][87]

OilRig

OilRig has used keylogging tools called KEYPUNCH and LONGWATCH.
[100][101]

OwaAuth

OwaAuth captures and DES-encrypts credentials before writing the username and password to a log file, C:\log.txt.[58]

PLATINUM

PLATINUM has used several different keyloggers.[48]

PlugX

PlugX has a module for capturing keystrokes per process including window titles.[21]

PoisonIvy

PoisonIvy contains a keylogger.[56][57]

PoshC2

PoshC2 has modules for keystroke logging and capturing credentials from spoofed Outlook authentication messages.[13]

PowerSploit

PowerSploit's Get-Keystrokes Exfiltration module can log keystrokes.[9][10]

Prikormka

Prikormka contains a keylogger module that collects keystrokes and the titles of foreground windows.[18]

Proton

Proton uses a keylogger to capture keystrokes.[19]

Pupy

Pupy uses a keylogger to capture keystrokes it then sends back to the server after it is stopped.[4]

QuasarRAT

QuasarRAT has a built-in keylogger.[7][8]

Regin

Regin contains a keylogger.[24]

Remcos

Remcos has a command for keylogging.[5][6]

Remexi

Remexi gathers and exfiltrates keystrokes from the machine.[82]

Remsec

Remsec contains a keylogger component.[32][33]

Revenge RAT

Revenge RAT has a plugin for keylogging.[83][84]

ROKRAT

ROKRAT uses a keylogger to capture keystrokes and location of where the user is typing.[69]

Rover

Rover has keylogging functionality.[28]

RTM

RTM can record keystrokes from both the keyboard and virtual keyboard.[39]

RunningRAT

RunningRAT captures keystrokes and sends them back to the C2 server.[45]

Sowbug

Sowbug has used keylogging tools.[99]

SslMM

SslMM creates a new thread implementing a keylogging facility using Windows Keyboard Accelerators.[47]

Stolen Pencil

Stolen Pencil has a tool to log keystrokes to %userprofile%\appdata\roaming\apach.{{txt,log}}.[110]

Sykipot

Sykipot contains keylogging functionality to steal passwords.[20]

Threat Group-3390

Threat Group-3390 actors installed a credential logger on Microsoft Exchange servers. Threat Group-3390 also leveraged the reconnaissance framework, ScanBox, to capture keystrokes.[58][103][104]

TinyZBot

TinyZBot contains keylogger functionality.[79]

Unknown Logger

Unknown Logger is capable of recording keystrokes.[41]

VERMIN

VERMIN collects keystrokes from the victim machine.[80]

XAgentOSX

XAgentOSX contains keylogging functionality that will monitor for active application windows and write them to the log, it can handle special characters, and it will buffer by default 50 characters before sending them out over the C2 infrastructure.[52]

yty

yty uses a keylogger plugin to gather keystrokes.[44]

Zeus Panda

Zeus Panda can perform keylogging on the victim’s machine by hooking the functions TranslateMessage and WM_KEYDOWN.[64]

ZxShell

ZxShell has a feature to capture a remote computer's keystrokes using a keylogger. [92][93]

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.

Detection

Keyloggers may take many forms, possibly involving modification to the Registry and installation of a driver, setting a hook, or polling to intercept keystrokes. Commonly used API calls include SetWindowsHook, GetKeyState, and GetAsyncKeyState. [1] Monitor the Registry and file system for such changes and detect driver installs, as well as looking for common keylogging API calls. API calls alone are not an indicator of keylogging, but may provide behavioral data that is useful when combined with other information such as new files written to disk and unusual processes.

Monitor the Registry for the addition of a Custom Credential Provider. [2] Detection of compromised Valid Accounts in use by adversaries may help to catch the result of user input interception if new techniques are used.

References

  1. Tinaztepe, E. (n.d.). The Adventures of a Keystroke: An in-depth look into keyloggers on Windows. Retrieved April 27, 2016.
  2. Wrightson, T. (2012, January 2). CAPTURING WINDOWS 7 CREDENTIALS AT LOGON USING CUSTOM CREDENTIAL PROVIDER. Retrieved November 12, 2014.
  3. Adair, S. (2015, October 7). Virtual Private Keylogging: Cisco Web VPNs Leveraged for Access and Persistence. Retrieved March 20, 2017.
  4. Nicolas Verdier. (n.d.). Retrieved January 29, 2018.
  5. Bacurio, F., Salvio, J. (2017, February 14). REMCOS: A New RAT In The Wild. Retrieved November 6, 2018.
  6. Brumaghin, E., Unterbrink, H. (2018, August 22). Picking Apart Remcos Botnet-In-A-Box. Retrieved November 6, 2018.
  7. MaxXor. (n.d.). QuasarRAT. Retrieved July 10, 2018.
  8. Meltzer, M, et al. (2018, June 07). Patchwork APT Group Targets US Think Tanks. Retrieved July 16, 2018.
  9. PowerShellMafia. (2012, May 26). PowerSploit - A PowerShell Post-Exploitation Framework. Retrieved February 6, 2018.
  10. PowerSploit. (n.d.). PowerSploit. Retrieved February 6, 2018.
  11. Strategic Cyber LLC. (2017, March 14). Cobalt Strike Manual. Retrieved May 24, 2017.
  12. Schroeder, W., Warner, J., Nelson, M. (n.d.). Github PowerShellEmpire. Retrieved April 28, 2016.
  13. Nettitude. (2018, July 23). Python Server for PoshC2. Retrieved April 23, 2019.
  14. ESET. (2016, October). En Route with Sednit - Part 2: Observing the Comings and Goings. Retrieved November 21, 2016.
  15. Bitdefender. (2015, December). APT28 Under the Scope. Retrieved February 23, 2017.
  16. ClearSky. (2016, January 7). Operation DustySky. Retrieved January 8, 2016.
  17. PwC and BAE Systems. (2017, April). Operation Cloud Hopper: Technical Annex. Retrieved April 13, 2017.
  18. Cherepanov, A.. (2016, May 17). Operation Groundbait: Analysis of a surveillance toolkit. Retrieved May 18, 2016.
  19. Patrick Wardle. (n.d.). Mac Malware of 2017. Retrieved September 21, 2018.
  20. Blasco, J. (2012, January 12). Sykipot variant hijacks DOD and Windows smart cards. Retrieved January 10, 2016.
  21. Computer Incident Response Center Luxembourg. (2013, March 29). Analysis of a PlugX variant. Retrieved November 5, 2018.
  22. TrendMicro. (2014, September 03). DARKCOMET. Retrieved November 6, 2018.
  23. Bar, T., Conant, S. (2017, October 20). BadPatch. Retrieved November 13, 2018.
  24. Kaspersky Lab's Global Research and Analysis Team. (2014, November 24). THE REGIN PLATFORM NATION-STATE OWNAGE OF GSM NETWORKS. Retrieved December 1, 2014.
  25. Kaspersky Lab's Global Research and Analysis Team. (2015, February). CARBANAK APT THE GREAT BANK ROBBERY. Retrieved August 23, 2018.
  26. Bennett, J., Vengerik, B. (2017, June 12). Behind the CARBANAK Backdoor. Retrieved June 11, 2018.
  27. Kasza, A., Halfpop, T. (2016, February 09). NanoCoreRAT Behind an Increase in Tax-Themed Phishing E-mails. Retrieved November 9, 2018.
  28. Ray, V., Hayashi, K. (2016, February 29). New Malware ‘Rover’ Targets Indian Ambassador to Afghanistan. Retrieved February 29, 2016.
  29. Miller-Osborn, J. and Grunzweig, J.. (2017, March 30). Trochilus and New MoonWind RATs Used In Attack Against Thai Organizations. Retrieved March 30, 2017.
  30. ClearSky Cyber Security and Trend Micro. (2017, July). Operation Wilted Tulip: Exposing a cyber espionage apparatus. Retrieved August 21, 2017.
  31. Minerva Labs LTD and ClearSky Cyber Security. (2015, November 23). CopyKittens Attack Group. Retrieved September 11, 2017.
  32. Symantec Security Response. (2016, August 8). Backdoor.Remsec indicators of compromise. Retrieved August 17, 2016.
  33. Kaspersky Lab's Global Research & Analysis Team. (2016, August 9). The ProjectSauron APT. Technical Analysis. Retrieved August 17, 2016.
  34. Symantec Security Response. (2011, November). W32.Duqu: The precursor to the next Stuxnet. Retrieved September 17, 2015.
  35. McAfee. (2015, March 2). Netwire RAT Behind Recent Targeted Attacks. Retrieved February 15, 2018.
  36. Davis, S. and Carr, N. (2017, September 21). APT33: New Insights into Iranian Cyber Espionage Group. Retrieved February 15, 2018.
  37. FireEye. (2018, March 16). Suspected Chinese Cyber Espionage Group (TEMP.Periscope) Targeting U.S. Engineering and Maritime Industries. Retrieved April 11, 2018.
  38. Alintanahin, K. (2014, March 13). Kunming Attack Leads to Gh0st RAT Variant. Retrieved November 12, 2014.
  39. Faou, M. and Boutin, J.. (2017, February). Read The Manual: A Guide to the RTM Banking Trojan. Retrieved March 9, 2017.
  40. Kaspersky Lab's Global Research and Analysis Team. (n.d.). The NetTraveler (aka ‘Travnet’). Retrieved November 12, 2014.
  41. Settle, A., et al. (2016, August 8). MONSOON - Analysis Of An APT Campaign. Retrieved September 22, 2016.
  42. Levene, B. et al.. (2018, March 7). Patchwork Continues to Deliver BADNEWS to the Indian Subcontinent. Retrieved March 31, 2018.
  43. Lunghi, D., et al. (2017, December). Untangling the Patchwork Cyberespionage Group. Retrieved July 10, 2018.
  44. Schwarz, D., Sopko J. (2018, March 08). Donot Team Leverages New Modular Malware Framework in South Asia. Retrieved June 11, 2018.
  45. Sherstobitoff, R., Saavedra-Morales, J. (2018, February 02). Gold Dragon Widens Olympics Malware Attacks, Gains Permanent Presence on Victims’ Systems. Retrieved June 6, 2018.
  46. Rascagneres, P. (2017, May 03). KONNI: A Malware Under The Radar For Years. Retrieved November 5, 2018.
  47. Baumgartner, K., Golovkin, M.. (2015, May). The MsnMM Campaigns: The Earliest Naikon APT Campaigns. Retrieved April 10, 2019.
  48. Windows Defender Advanced Threat Hunting Team. (2016, April 29). PLATINUM: Targeted attacks in South and Southeast Asia. Retrieved February 15, 2018.
  49. Brumaghin, E., et al. (2018, October 15). Old dog, new tricks - Analysing new RTF-based campaign distributing Agent Tesla, Loki with PyREbox. Retrieved November 5, 2018.
  50. The DigiTrust Group. (2017, January 12). The Rise of Agent Tesla. Retrieved November 5, 2018.
  51. Zhang, X. (2017, June 28). In-Depth Analysis of A New Variant of .NET Malware AgentTesla. Retrieved November 5, 2018.
  52. Robert Falcone. (2017, February 14). XAgentOSX: Sofacy's Xagent macOS Tool. Retrieved July 12, 2017.
  53. Alperovitch, D.. (2016, June 15). Bears in the Midst: Intrusion into the Democratic National Committee. Retrieved August 3, 2016.
  54. Mueller, R. (2018, July 13). Indictment - United States of America vs. VIKTOR BORISOVICH NETYKSHO, et al. Retrieved September 13, 2018.
  55. Cherepanov, A. (2018, October). GREYENERGY A successor to BlackEnergy. Retrieved November 15, 2018.
  56. FireEye. (2014). POISON IVY: Assessing Damage and Extracting Intelligence. Retrieved November 12, 2014.
  57. Hayashi, K. (2005, August 18). Backdoor.Darkmoon. Retrieved February 23, 2018.
  1. Dell SecureWorks Counter Threat Unit Threat Intelligence. (2015, August 5). Threat Group-3390 Targets Organizations for Cyberespionage. Retrieved August 18, 2018.
  2. Yadav, A., et al. (2017, August 31). Cobian RAT – A backdoored RAT. Retrieved November 13, 2018.
  3. Mercer, W., Rascagneres, P. (2018, May 31). NavRAT Uses US-North Korea Summit As Decoy For Attacks In South Korea. Retrieved June 11, 2018.
  4. Balanza, M. (2018, April 02). Infostealer.Catchamas. Retrieved July 10, 2018.
  5. FireEye. (2018, February 20). APT37 (Reaper): The Overlooked North Korean Actor. Retrieved March 1, 2018.
  6. Grunzweig, J. (2018, October 01). NOKKI Almost Ties the Knot with DOGCALL: Reaper Group Uses New Malware to Deploy RAT. Retrieved November 5, 2018.
  7. Ebach, L. (2017, June 22). Analysis Results of Zeus.Variant.Panda. Retrieved November 5, 2018.
  8. F-Secure Labs. (2015, September 17). The Dukes: 7 years of Russian cyberespionage. Retrieved December 10, 2015.
  9. Sharma, R. (2018, August 15). Revamped jRAT Uses New Anti-Parsing Techniques. Retrieved September 21, 2018.
  10. Kamluk, V. & Gostev, A. (2016, February). Adwind - A Cross-Platform RAT. Retrieved April 23, 2019.
  11. Falcone, R. and Lee, B.. (2016, May 26). The OilRig Campaign: Attacks on Saudi Arabian Organizations Deliver Helminth Backdoor. Retrieved May 3, 2017.
  12. Mercer, W., Rascagneres, P. (2017, April 03). Introducing ROKRAT. Retrieved May 21, 2018.
  13. Galperin, E., Et al.. (2016, August 4). When Governments Attack: State Sponsored Malware Attacks Against Activists, Lawyers, and Journalists. Retrieved May 23, 2018.
  14. Tsarfaty, Y. (2018, July 25). Micropsia Malware. Retrieved November 13, 2018.
  15. Grunzweig, J.. (2017, April 20). Cardinal RAT Active for Over Two Years. Retrieved December 8, 2018.
  16. Chen, J. and Hsieh, M. (2017, November 7). REDBALDKNIGHT/BRONZE BUTLER’s Daserf Backdoor Now Using Steganography. Retrieved December 27, 2017.
  17. Counter Threat Unit Research Team. (2017, October 12). BRONZE BUTLER Targets Japanese Enterprises. Retrieved January 4, 2018.
  18. Mandiant. (n.d.). Appendix C (Digital) - The Malware Arsenal. Retrieved July 18, 2016.
  19. Baumgartner, K. and Garnaeva, M.. (2014, November 3). BE2 custom plugins, router abuse, and target profiles. Retrieved March 24, 2016.
  20. Falcone, R. and Miller-Osborn, J.. (2016, January 24). Scarlet Mimic: Years-Long Espionage Campaign Targets Minority Activists. Retrieved February 10, 2016.
  21. Yadav, A., et al. (2016, January 29). Malicious Office files dropping Kasidet and Dridex. Retrieved March 24, 2016.
  22. Cylance. (2014, December). Operation Cleaver. Retrieved September 14, 2017.
  23. Lancaster, T., Cortes, J. (2018, January 29). VERMIN: Quasar RAT and Custom Malware Used In Ukraine. Retrieved July 5, 2018.
  24. Doaty, J., Garrett, P.. (2018, September 10). We’re Seeing a Resurgence of the Demonic Astaroth WMIC Trojan. Retrieved April 17, 2019.
  25. Legezo, D. (2019, January 30). Chafer used Remexi malware to spy on Iran-based foreign diplomatic entities. Retrieved April 17, 2019.
  26. Livelli, K, et al. (2018, November 12). Operation Shaheen. Retrieved May 1, 2019.
  27. Gannon, M. (2019, February 11). With Upgrades in Delivery and Support Infrastructure, Revenge RAT Malware is a Bigger Threat. Retrieved May 1, 2019.
  28. Fidelis Cybersecurity. (2013, June 28). Fidelis Threat Advisory #1009: "njRAT" Uncovered. Retrieved June 4, 2019.
  29. Pascual, C. (2018, November 27). AutoIt-Compiled Worm Affecting Removable Media Delivers Fileless Version of BLADABINDI/njRAT Backdoor. Retrieved June 4, 2019.
  30. Scott-Railton, J., et al. (2016, August 2). Group5: Syria and the Iranian Connection. Retrieved September 26, 2016.
  31. Guarnieri, C., Schloesser M. (2013, June 7). KeyBoy, Targeted Attacks against Vietnam and India. Retrieved June 14, 2019.
  32. ESET. (2019, July). MACHETE JUST GOT SHARPER Venezuelan government institutions under attack. Retrieved September 13, 2019.
  33. Kaspersky Global Research and Analysis Team. (2014, August 20). El Machete. Retrieved September 13, 2019.
  34. Bryan Lee and Rob Downs. (2016, February 12). A Look Into Fysbis: Sofacy’s Linux Backdoor. Retrieved September 10, 2017.
  35. Fraser, N., et al. (2019, August 7). Double DragonAPT41, a dual espionage and cyber crime operation APT41. Retrieved September 23, 2019.
  36. Allievi, A., et al. (2014, October 28). Threat Spotlight: Group 72, Opening the ZxShell. Retrieved September 24, 2019.
  37. Lim, M.. (2019, April 26). BabyShark Malware Part Two – Attacks Continue Using KimJongRAT and PCRat . Retrieved October 7, 2019.
  38. Symantec Security Response. (2016, September 6). Buckeye cyberespionage group shifts gaze from US to Hong Kong. Retrieved September 26, 2016.
  39. Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Unraveling the Long Thread of the Sony Attack. Retrieved February 25, 2016.
  40. Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Tools Report. Retrieved March 10, 2016.
  41. FireEye. (2018, October 03). APT38: Un-usual Suspects. Retrieved November 6, 2018.
  42. Symantec Security Response. (2017, November 7). Sowbug: Cyber espionage group targets South American and Southeast Asian governments. Retrieved November 16, 2017.
  43. Davis, S. and Caban, D. (2017, December 19). APT34 - New Targeted Attack in the Middle East. Retrieved December 20, 2017.
  44. Bromiley, M., et al.. (2019, July 18). Hard Pass: Declining APT34’s Invite to Join Their Professional Network. Retrieved August 26, 2019.
  45. Kaspersky Lab's Global Research and Analysis Team. (2014, November). The Darkhotel APT A Story of Unusual Hospitality. Retrieved November 12, 2014.
  46. Khandelwal, S. (2018, June 14). Chinese Hackers Carried Out Country-Level Watering Hole Attack. Retrieved August 18, 2018.
  47. Legezo, D. (2018, June 13). LuckyMouse hits national data center to organize country-level waterholing campaign. Retrieved August 18, 2018.
  48. Vengerik, B. et al.. (2014, December 5). Hacking the Street? FIN4 Likely Playing the Market. Retrieved December 17, 2018.
  49. Vengerik, B. & Dennesen, K.. (2014, December 5). Hacking the Street? FIN4 Likely Playing the Market. Retrieved January 15, 2019.
  50. Lee, B. and Falcone, R. (2017, February 15). Magic Hound Campaign Attacks Saudi Targets. Retrieved December 27, 2017.
  51. Anthe, C. et al. (2015, October 19). Microsoft Security Intelligence Report Volume 19. Retrieved December 23, 2015.
  52. Smallridge, R. (2018, March 10). APT15 is alive and strong: An analysis of RoyalCli and RoyalDNS. Retrieved April 4, 2018.
  53. ASERT team. (2018, December 5). STOLEN PENCIL Campaign Targets Academia. Retrieved February 5, 2019.
  54. United States District Court Southern District of New York (USDC SDNY) . (2018, December 17). United States of America v. Zhu Hua and Zhang Shilong. Retrieved April 17, 2019.
  55. Alyac. (2019, April 3). Kimsuky Organization Steals Operation Stealth Power. Retrieved August 13, 2019.
  56. Tarakanov , D.. (2013, September 11). The “Kimsuky” Operation: A North Korean APT?. Retrieved August 13, 2019.