Research Article

Focusing on the Weakest Link: A Similarity Analysis on Phishing Campaigns Based on the ATT&CK Matrix

Table 7

Similarity of phishing campaigns conducted by Kimsuky.

 TA0001TA0002TA0003TA0004TA0005TA0006TA0007TA0008TA0009TA0011TA0010TA0040

(K1, K2)10.978810.89440.95080.89440.961300.98960.998900
(K1, K3)10.58220.894400.686810.749900.4352000
(K1, K4)10.50830.894400.686810.850400.4352000
(K1, K5)10.6509100.415010.545800.4352000
(K1, K6)10.6509100.289910.696700.4352000
(K2, K3)10.65080.894400.57260.89440.693100.3203000
(K2, K4)10.56820.894400.58920.89440.770400.3203000
(K2, K5)10.7276100.38450.89440.477700.3203000
(K2, K6)10.7276100.32340.89440.648400.3203000
(K3, K4)10.97780.999910.800310.9476010.894400
(K3, K5)10.89440.894400.492410.7505010.992300
(K3, K6)10.89440.894400.492410.7505010.992300
(K4, K5)10.78090.894400.738910.6577010.943000
(K4, K6)10.78090.894400.556310.8521010.9600
(K5, K6)11110.925610.8701010.998500
Avg.10.75840.94370.19300.59370.96480.748100.66740.518600