An Attribute Extraction for Automated Malware Attack Classification and Detection Using Soft Computing Techniques
Table 1
List of MacOS malware.
S. no.
Name of the malware
Function
1
Devnull
It downloads and executes commands, followed by compressed executable code.
2
Hajime
It makes an effort to secure assets.
3
Linux Spike Trojan
It infiltrates networks and ultimately spreads to certain other networks, resulting in DDoS assaults, MITM attacks, data theft, as well as other kinds of attacks.
4
Linux.Daelloz
By abusing PHP, It infects networks, video surveillance, and set-top boxes.
5
Staog
It uses kernel flaws to get access to residents.
6
Mirai
It is capable of infecting consumer electronics including Webcams and edge routers.