Research Article
Focusing on the Weakest Link: A Similarity Analysis on Phishing Campaigns Based on the ATT&CK Matrix
Table 7
Similarity of phishing campaigns conducted by Kimsuky.
| ā | TA0001 | TA0002 | TA0003 | TA0004 | TA0005 | TA0006 | TA0007 | TA0008 | TA0009 | TA0011 | TA0010 | TA0040 |
| (K1, K2) | 1 | 0.9788 | 1 | 0.8944 | 0.9508 | 0.8944 | 0.9613 | 0 | 0.9896 | 0.9989 | 0 | 0 | (K1, K3) | 1 | 0.5822 | 0.8944 | 0 | 0.6868 | 1 | 0.7499 | 0 | 0.4352 | 0 | 0 | 0 | (K1, K4) | 1 | 0.5083 | 0.8944 | 0 | 0.6868 | 1 | 0.8504 | 0 | 0.4352 | 0 | 0 | 0 | (K1, K5) | 1 | 0.6509 | 1 | 0 | 0.4150 | 1 | 0.5458 | 0 | 0.4352 | 0 | 0 | 0 | (K1, K6) | 1 | 0.6509 | 1 | 0 | 0.2899 | 1 | 0.6967 | 0 | 0.4352 | 0 | 0 | 0 | (K2, K3) | 1 | 0.6508 | 0.8944 | 0 | 0.5726 | 0.8944 | 0.6931 | 0 | 0.3203 | 0 | 0 | 0 | (K2, K4) | 1 | 0.5682 | 0.8944 | 0 | 0.5892 | 0.8944 | 0.7704 | 0 | 0.3203 | 0 | 0 | 0 | (K2, K5) | 1 | 0.7276 | 1 | 0 | 0.3845 | 0.8944 | 0.4777 | 0 | 0.3203 | 0 | 0 | 0 | (K2, K6) | 1 | 0.7276 | 1 | 0 | 0.3234 | 0.8944 | 0.6484 | 0 | 0.3203 | 0 | 0 | 0 | (K3, K4) | 1 | 0.9778 | 0.9999 | 1 | 0.8003 | 1 | 0.9476 | 0 | 1 | 0.8944 | 0 | 0 | (K3, K5) | 1 | 0.8944 | 0.8944 | 0 | 0.4924 | 1 | 0.7505 | 0 | 1 | 0.9923 | 0 | 0 | (K3, K6) | 1 | 0.8944 | 0.8944 | 0 | 0.4924 | 1 | 0.7505 | 0 | 1 | 0.9923 | 0 | 0 | (K4, K5) | 1 | 0.7809 | 0.8944 | 0 | 0.7389 | 1 | 0.6577 | 0 | 1 | 0.9430 | 0 | 0 | (K4, K6) | 1 | 0.7809 | 0.8944 | 0 | 0.5563 | 1 | 0.8521 | 0 | 1 | 0.96 | 0 | 0 | (K5, K6) | 1 | 1 | 1 | 1 | 0.9256 | 1 | 0.8701 | 0 | 1 | 0.9985 | 0 | 0 | Avg. | 1 | 0.7584 | 0.9437 | 0.1930 | 0.5937 | 0.9648 | 0.7481 | 0 | 0.6674 | 0.5186 | 0 | 0 |
|
|