In our study, we relied on the tactics, techniques, and procedures of MITRE ATT&CK to define the malware capabilities and characteristics of IoT Linux malware. We describe our findings and how IoT malware has been evolving.
Article Link: The Evolution of IoT Linux Malware Based on MITRE ATT&CK TTPs