Research Article

Design of Threat Response Modeling Language for Attacker Profile Based on Probability Distribution

Table 3

In-scope key techniques for the Lazarus Group.

TacticTechnique

Initial accessDrive-by compromise, phishing
ExecutionCommand and scripting interpreter, exploitation for client execution, and user execution
Privilege escalationAccount manipulation
Defense evasionFile deletion, modify registry, indicator removal on host, and software packing
Credential accessInput capture, password spraying
Lateral movementRemote services