Hardware-based threat defense against increasingly complex cryptojackers

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Thu, 18 Aug 2022 17:00:00 +0000

To provide advanced protection against increasingly complex and evasive cryptojackers, Microsoft Defender Antivirus integrates with Intel® Threat Detection Technology (TDT) that applies machine learning to low-level CPU telemetry in detecting cryptojackers, even when the malware is obfuscated and can evade security tools.

The post Hardware-based threat defense against increasingly complex cryptojackers appeared first on Microsoft Security Blog.

Read more

The state of malicious cryptomining

Credit to Author: Jérôme Segura| Date: Mon, 26 Feb 2018 16:08:03 +0000

From malware coin miners to drive-by mining, we review the state of malicious cryptomining in the past few months by looking at the most notable incidents and our own telemetry stats.

Categories:

Tags:

(Read more…)

The post The state of malicious cryptomining appeared first on Malwarebytes Labs.

Read more

Bogus hack apps hack users back for cryptocash

Credit to Author: Nathan Collier| Date: Wed, 07 Feb 2018 19:30:00 +0000

Recently, we discovered a gold mine of fake hack apps that mine for Monero cryptocurrency and serve up annoying adware.

Categories:

Tags:

(Read more…)

The post Bogus hack apps hack users back for cryptocash appeared first on Malwarebytes Labs.

Read more

A coin miner with a “Heaven’s Gate”

Credit to Author: hasherezade| Date: Wed, 17 Jan 2018 16:00:00 +0000

The Heaven’s Gate technique has been around since 2009. But now coin miners are using it to maximize their performance in the target architecture.

Categories:

Tags:

(Read more…)

The post A coin miner with a “Heaven’s Gate” appeared first on Malwarebytes Labs.

Read more