{"id":120119,"date":"2022-08-18T10:00:00","date_gmt":"2022-08-18T17:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=120119"},"modified":"2023-09-11T16:07:24","modified_gmt":"2023-09-11T23:07:24","slug":"hardware-based-threat-defense-against-increasingly-complex-cryptojackers","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/18\/hardware-based-threat-defense-against-increasingly-complex-cryptojackers\/","title":{"rendered":"Hardware-based threat defense against increasingly complex cryptojackers"},"content":{"rendered":"\n
Even with the dip in the value of cryptocurrencies in the past few months, cryptojackers \u2013 trojanized coin miners that attackers distribute to use compromised devices\u2019 computing power for their objectives \u2013 continue to be widespread. In the past several months, Microsoft Defender Antivirus detected cryptojackers on hundreds of thousands of devices every month. These threats also continue to evolve: recent cryptojackers have become stealthier, leveraging living-off-the-land binaries (LOLBins) to evade detection.<\/p>\n\n\n\n