{"id":120119,"date":"2022-08-18T10:00:00","date_gmt":"2022-08-18T17:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=120119"},"modified":"2023-09-11T16:07:24","modified_gmt":"2023-09-11T23:07:24","slug":"hardware-based-threat-defense-against-increasingly-complex-cryptojackers","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/18\/hardware-based-threat-defense-against-increasingly-complex-cryptojackers\/","title":{"rendered":"Hardware-based threat defense against increasingly complex cryptojackers"},"content":{"rendered":"\n

Even with the dip in the value of cryptocurrencies in the past few months, cryptojackers \u2013 trojanized coin miners that attackers distribute to use compromised devices\u2019 computing power for their objectives \u2013 continue to be widespread. In the past several months, Microsoft Defender Antivirus detected cryptojackers on hundreds of thousands of devices every month. These threats also continue to evolve: recent cryptojackers have become stealthier, leveraging living-off-the-land binaries (LOLBins) to evade detection.<\/p>\n\n\n\n

\"Column
Figure 1. Chart showing number of devices on which Microsoft Defender Antivirus detected cryptojackers from January to July 2022.<\/em><\/figcaption><\/figure>\n\n\n\n

To provide advanced protection against these increasingly complex and evasive threats, Microsoft Defender Antivirus uses various sensors and detection technologies, including its integration with Intel\u00ae Threat Detection Technology (TDT)<\/a>, which applies machine learning to low-level CPU telemetry to detect threats even when the malware is obfuscated and can evade security tools.<\/p>\n\n\n\n

Using this silicon-based threat detection, Defender analyzes signals from the CPU performance monitoring unit (PMU) to detect malware code execution \u201cfingerprint\u201d at run time and gain unique insights into malware at their final execution point, the CPU. The combined actions of monitoring at the hardware level, analyzing patterns of CPU usage, and using threat intelligence and machine learning at the software level enable the technology to defend against cryptojacking effectively.<\/p>\n\n\n\n

In this blog post, we share details from our monitoring and observation of cryptojackers and how the integration of Intel TDT and Microsoft Defender Antivirus detects and blocks this complex threat.<\/p>\n\n\n\n

Looking at the current cryptojacker landscape<\/h2>\n\n\n\n

There are many ways to force a device to mine cryptocurrency without a user\u2019s knowledge or consent. The three most common approaches used by cryptojackers are the following:<\/p>\n\n\n\n