Research Article

Focusing on the Weakest Link: A Similarity Analysis on Phishing Campaigns Based on the ATT&CK Matrix

Figure 2

Vectorization of Tactic Initial Access. When techniques of Phishing and Supply Chain Compromise are used, they are expressed as 1. On the other hand, unused techniques are expressed as 0.