Research Article
Design of Threat Response Modeling Language for Attacker Profile Based on Probability Distribution
Table 3
In-scope key techniques for the Lazarus Group.
| Tactic | Technique |
| Initial access | Drive-by compromise, phishing | Execution | Command and scripting interpreter, exploitation for client execution, and user execution | Privilege escalation | Account manipulation | Defense evasion | File deletion, modify registry, indicator removal on host, and software packing | Credential access | Input capture, password spraying | Lateral movement | Remote services |
|
|