{"id":11723,"date":"2018-03-13T15:46:57","date_gmt":"2018-03-13T23:46:57","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/03\/13\/news-5493\/"},"modified":"2018-03-13T15:46:57","modified_gmt":"2018-03-13T23:46:57","slug":"news-5493","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/03\/13\/news-5493\/","title":{"rendered":"Poisoned peer-to-peer app kicked off Dofoil coin miner outbreak"},"content":{"rendered":"<p><strong>Credit to Author: Windows Defender Research| Date: Tue, 13 Mar 2018 22:27:06 +0000<\/strong><\/p>\n<p>On March 7, we reported that a <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/03\/07\/behavior-monitoring-combined-with-machine-learning-spoils-a-massive-dofoil-coin-mining-campaign\/\">massive Dofoil campaign<\/a> attempted to install malicious cryptocurrency miners on hundreds of thousands of computers. Windows Defender Antivirus, with its behavior monitoring, machine learning technologies, and <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2017\/12\/11\/detonating-a-bad-rabbit-windows-defender-antivirus-and-layered-machine-learning-defenses\/\">layered approach to security<\/a> detected and blocked the attack within milliseconds.<a href=\"https:\/\/www.microsoft.com\/en-us\/windows\/windows-10-s?ocid=cx-blog-mmpc\">Windows 10 S<\/a>, a special configuration of Windows 10 providing Microsoft-verified security, was not vulnerable to this attack.<\/p>\n<p>&#10;<\/p>\n<p>Immediately upon discovering the attack, we looked into the source of the huge volume of infection attempts. Traditionally, <a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=TrojanDownloader:Win32\/Dofoil.AB\">Dofoil<\/a> (also known as Smoke Loader) is distributed in multiple ways, including spam email and exploit kits. In the outbreak, which began in March 6, a pattern stood out: most of the malicious files were written by a process called <em>mediaget.exe<\/em>.<\/p>\n<p>&#10;<\/p>\n<p>This process is related to MediaGet, a BitTorrent client that we classify as <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-defender-antivirus\/detect-block-potentially-unwanted-apps-windows-defender-antivirus\">potentially unwanted application (PUA)<\/a>. MediaGet is often used by people looking to download programs or media from websites with dubious reputation. Downloading through peer-to-peer file-sharing apps like this can increase the risk of downloading malware.<\/p>\n<p>&#10;<\/p>\n<p>During the outbreak, however, Dofoil didnt seem to be coming from torrent downloads. We didnt see similar patterns in other file-sharing apps. The process mediaget.exe always wrote the Dofoil samples to the %TEMP% folder using the file name my.dat. The most common source of infection was the file <em>%LOCALAPPDATA%MediaGet2mediaget.exe<\/em> (SHA-1<em>: 3e0ccd9fa0a5c40c2abb40ed6730556e3d36af3c<\/em>).<\/p>\n<p>&#10;<\/p>\n<h2>Tracing the infection timeline<\/h2>\n<p>&#10;<\/p>\n<p>Our continued investigation on the Dofoil outbreak revealed that the March 6 campaign was a carefully planned attack with initial groundwork dating back to mid-February. To set the stage for the outbreak, attackers performed an update poisoning campaign that installed a trojanized version of MediaGet on computers. The following timeline shows the major events related to the Dofoil outbreak.<\/p>\n<p>&#10;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-80822\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/03\/fig1-timeline.png\" alt=\"\" width=\"800\" height=\"265\" \/><\/p>\n<p>&#10;<\/p>\n<p><em>Figure 1.MediaGet-related malware outbreak timeline (all dates in UTC).<\/em><\/p>\n<p>&#10;<\/p>\n<h2>MediaGet update poisoning<\/h2>\n<p>&#10;<\/p>\n<p>The update poisoning campaign that eventually led to the outbreak is described in the following diagram. A signed <em>mediaget.exe<\/em> downloads an <em>update.exe<\/em> program and runs it on the machine to install a new <em>mediaget.exe<\/em>. The new <em>mediaget.exe<\/em> program has the same functionality as the original but with additional backdoor capability.<\/p>\n<p>&#10;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-80828\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/03\/fig2-update-poisoning-flow.png\" alt=\"\" width=\"350\" height=\"644\" \/><em>Figure 2. Update poisoning flow<\/em><\/p>\n<p>&#10;<\/p>\n<p>The malicious update process is recorded by Windows Defender ATP. The following alert process tree shows the original mediaget.exe dropping the poisoned signed update.exe.<\/p>\n<p>&#10;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-80831 aligncenter\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/03\/fig3-update-poisoning-flow-edr-1024x469.png\" alt=\"\" width=\"1024\" height=\"469\" \/><em>Figure 3. Windows Defender ATP detection of malicious update process<\/em><\/p>\n<p>&#10;<\/p>\n<h2>Poisoned update.exe<\/h2>\n<p>&#10;<\/p>\n<p>The dropped <em>update.exe<\/em> is a packaged InnoSetup SFX which has an embedded trojanized <em>mediaget.exe<\/em>, update.exe. When run, it drops a trojanized unsigned version of <em>mediaget.exe<\/em>.<\/p>\n<p>&#10;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-80897 aligncenter\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/03\/fig4-cert.png\" alt=\"\" width=\"808\" height=\"518\" \/><\/p>\n<p>&#10;<\/p>\n<p><em>Figure 4.Certificate information of the poisoned update.exe<\/em><\/p>\n<p>&#10;<\/p>\n<p>Update.exe is signed by a third-party developer company completely unrelated with MediaGet and probably also victim of this plot; <em>update.exe<\/em> was code signed with a different cert just to pass the signing requirement verification as seen in the original <em>mediaget.exe<\/em>. The update code will check the certificate information to verify whether it is valid and signed. If it is signed, it will check that the hash value matches the value retrieved from the hash server located in mediaget.com infrastructure. The figure below shows a code snippet that checks for valid signatures on the downloaded update.exe.<\/p>\n<p>&#10;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-80846 aligncenter\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/03\/fig-5-update.png\" alt=\"\" width=\"513\" height=\"259\" \/><em>Figure 5. mediaget.exe update code<\/em><\/p>\n<p>&#10;<\/p>\n<h2>Trojanized <em>mediaget.exe<\/em><\/h2>\n<p>&#10;<\/p>\n<p>The trojanized <em>mediaget.exe<\/em> file, detected by Windows Defender AV as Trojan:Win32\/Modimer.A, shows the same functionality as the original one, but it is not signed by any parties and has additional backdoor functionality. This malicious binary has 98% similarity to the original, clean MediaGet binary. The following PE information shows the different PDB information and its file path left in the executable.<\/p>\n<p>&#10;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-80849 aligncenter\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/03\/fig6-PDB-comparison.png\" alt=\"\" width=\"621\" height=\"159\" \/><em>Figure 6. PDB path comparison of signed and trojanized executable<\/em><\/p>\n<p>&#10;<\/p>\n<p>When the malware starts, it builds a list of command-and-control (C&amp;C) servers.<\/p>\n<p>&#10;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-80855 aligncenter\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/03\/fig7-cnc-server-list.png\" alt=\"\" width=\"435\" height=\"181\" \/><\/p>\n<p>&#10;<\/p>\n<p><em>Figure 7. C&amp;C server list<\/em><\/p>\n<p>&#10;<\/p>\n<p>One notable detail about the embedded C&amp;C list is that the TLD .bit is not an ICANN-sanctioned TLD and is supported via NameCoin infrastructure. NameCoin is a distributed name server system that adopts the concept of blockchain model and provides anonymous domains. Since .bit domains cant be resolved by ordinary DNS servers, the malware embeds a list of 71 IPv4 addresses that serve as NameCoin DNS servers.<\/p>\n<p>&#10;<\/p>\n<p>The malware then uses these NameCoin servers to perform DNS lookups of the .bit domains. From this point these names are in the machine&#8217;s DNS cache and future lookups will be resolved without needing to specify the NameCoin DNS servers.<\/p>\n<p>&#10;<\/p>\n<p>The first contact to the C&amp;C server starts one hour after the program starts.<\/p>\n<p>&#10;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-80858 aligncenter\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/03\/fig8-cnc-start-timer.png\" alt=\"\" width=\"443\" height=\"48\" \/><\/p>\n<p>&#10;<\/p>\n<p><em>Figure 8. C&amp;C connection start timer<\/em><\/p>\n<p>&#10;<\/p>\n<p>The malware picks one of the four C&amp;C servers at random and resolves the address using NameCoin if its a .bit domain. It uses HTTP for command-and-control communication.<\/p>\n<p>&#10;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-80861\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/03\/fig9-cnc-server-connection.png\" alt=\"\" width=\"936\" height=\"56\" \/><\/p>\n<p>&#10;<\/p>\n<p><em>Figure 9. C&amp;C server connection<\/em><\/p>\n<p>&#10;<\/p>\n<p>The backdoor code collects system information and sends them to the C&amp;C server through POST request.<\/p>\n<p>&#10;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-80867 aligncenter\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/03\/fig10-system-information-1024x206.png\" alt=\"\" width=\"1024\" height=\"206\" \/><\/p>\n<p>&#10;<\/p>\n<p><em>Figure 10. System information<\/em><\/p>\n<p>&#10;<\/p>\n<p>The C&amp;C server sends back various commands to the client. The following response shows the <em>HASH<\/em>, <em>IDLE<\/em>, and <em>OK<\/em> commands. The IDLE command makes the process wait a certain time, indicated in seconds (for example, 7200 seconds = 2 hours), before contacting C&amp;C server again.<\/p>\n<p>&#10;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-80870 aligncenter\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/03\/fig11-cnc-commands.png\" alt=\"\" width=\"772\" height=\"378\" \/><em>Figure 11. C&amp;C commands<\/em><\/p>\n<p>&#10;<\/p>\n<p>One of the backdoor commands is a <em>RUN<\/em> command that retrieves a URL from the C&amp;C server command string. The malware then downloads a file from the URL, saves it as <em>%TEMP%my.dat<\/em>, and runs it.<\/p>\n<p>&#10;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-80873 aligncenter\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/03\/fig12-RUN-command.png\" alt=\"\" width=\"737\" height=\"526\" \/><em>Figure 12. RUN command processing code<\/em><\/p>\n<p>&#10;<\/p>\n<p>This <em>RUN<\/em> command was used for the distribution of the Dofoil malware starting March 1 and the malware outbreak on March 6. Windows Defender ATP alert process tree shows the malicious <em>mediaget.exe<\/em> communicating with <em>goshan.online<\/em>, one of the identified C&amp;C servers. It then drops and runs <em>my.dat<\/em> (Dofoil), which eventually leads to the <em>CoinMiner<\/em> component.<\/p>\n<p>&#10;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-80876\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/03\/fig13-coinminer-download-execution.png\" alt=\"\" width=\"750\" height=\"713\" \/><em>Figure 13.Dofoil, CoinMiner download and execution flow<\/em><\/p>\n<p>&#10;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-80891\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/03\/fig14-process-tree-1024x714.png\" alt=\"\" width=\"750\" height=\"523\" \/><em>Figure 14. Windows Defender ATP alert process tree<\/em><\/p>\n<p>&#10;<\/p>\n<p>The malware campaign used Dofoil to deliver CoinMiner, which attempted to use the victims computer resources to mine cryptocurrencies for the attackers. The Dofoil variant used in the attack showed advanced cross-process injection techniques, persistence mechanisms, and evasion methods. Windows Defender ATP can detect these behaviors across the infection chain.<\/p>\n<p>&#10;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-80882\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/03\/fig15-edr-process-hollowing.png\" alt=\"\" width=\"750\" height=\"259\" \/><em>Figure 15. Windows Defender ATP detection for Dofoils process hollowing behavior<\/em><\/p>\n<p>&#10;<\/p>\n<p>We have shared details we uncovered in our investigation with MediaGets developers to aid in their analysis of the incident.<\/p>\n<p>&#10;<\/p>\n<p>We have shared details of the malicious use of code-signing certificate used in update.exe (thumbprint: 5022EFCA9E0A9022AB0CA6031A78F66528848568) with the certificate owner.<\/p>\n<p>&#10;<\/p>\n<h2>Real-time defense against malware outbreaks<\/h2>\n<p>&#10;<\/p>\n<p>The Dofoil outbreak on March 6, which was built on prior groundwork, exemplifies the kind of multi-stage malware attacks that are fast-becoming commonplace. Commodity cybercrime threats are adopting sophisticated methods that are traditionally associated with more advanced cyberattacks. Windows Defender Advanced Threat Protection (Windows Defender ATP) provides the suite of next-gen defenses that protect customers against a wide range of attacks in real-time.<\/p>\n<p>&#10;<\/p>\n<p>Windows Defender AV enterprise customers who have enabled the <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-defender-antivirus\/detect-block-potentially-unwanted-apps-windows-defender-antivirus\">potentially unwanted application (PUA) protection feature<\/a> were protected from the trojanized MediaGet software that was identified as the infection source of the March 6 outbreak.<\/p>\n<p>&#10;<\/p>\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-defender-antivirus\/windows-defender-antivirus-in-windows-10?ocid=cx-blog-mmpc\">Windows Defender AV<\/a> protected customers from the Dofoil outbreak at the onset. Behavior-based detection technologies flagged Dofoils unusual persistence mechanism and immediately sent a signal to the <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-defender-antivirus\/utilize-microsoft-cloud-protection-windows-defender-antivirus\">cloud protection service<\/a>, where multiple machine learning models blocked most instances at first sight.<\/p>\n<p>&#10;<\/p>\n<p>In our in-depth analysis of the outbreak, we also demonstrated that the rich detection libraries in <a href=\"https:\/\/www.microsoft.com\/en-us\/WindowsForBusiness\/windows-atp?ocid=cx-blog-mmpc\">Windows Defender ATP<\/a> flagged Dofoils malicious behaviors throughout the entire infection process. These behaviors include code injection, evasion methods, and dropping a coin mining component. Security operations can use Windows Defender ATP to detect and respond to outbreaks. Windows Defender ATP also integrates protections from Windows Defender AV, Windows Defender Exploit Guard, and Windows Defender Application Guard, providing a seamless security management experience.<\/p>\n<p>&#10;<\/p>\n<p>For enhanced security against Dofoil and others similar coin miners, Microsoft recommends <a href=\"https:\/\/www.microsoft.com\/en-us\/windows\/windows-10-s?ocid=cx-blog-mmpc\">Windows 10 S<\/a>. Windows 10 S exclusively runs apps from the Microsoft Store, effectively blocking malware and applications from unverified sources. Windows 10 S users were not affected by this Dofoil campaign.<\/p>\n<p>&#10;<\/p>\n<p><em>Windows Defender Research<\/em><\/p>\n<p>&#10;<\/p>\n<h2>Indicators of compromise (IOCs)<\/h2>\n<p>&#10;<\/p>\n<table cellpadding=\"10\">&#10;<\/p>\n<tbody>&#10;<\/p>\n<tr bgcolor=\"#dddddd\">&#10;<\/p>\n<td><strong>File name<\/strong><\/td>\n<p>&#10;<\/p>\n<td><strong>SHA-1<\/strong><\/td>\n<p>&#10;<\/p>\n<td><strong>Description<\/strong><\/td>\n<p>&#10;<\/p>\n<td><strong>Signer<\/strong><\/td>\n<p>&#10;<\/p>\n<td><strong>Signing date<\/strong><\/td>\n<p>&#10;<\/p>\n<td><strong>Detection name<\/strong><\/td>\n<p>&#10;<\/tr>\n<p>&#10;<\/p>\n<tr>&#10;<\/p>\n<td valign=\"top\">mediaget.exe<\/td>\n<p>&#10;<\/p>\n<td valign=\"top\"><span style=\"font-size: xx-small\">1038d32974969a1cc7a79c3fc7b7a5ab8d14fd3e<\/span><\/td>\n<p>&#10;<\/p>\n<td valign=\"top\">Offical mediaget.exe executable<\/td>\n<p>&#10;<\/p>\n<td valign=\"top\">GLOBAL MICROTRADING PTE. LTD.<\/td>\n<p>&#10;<\/p>\n<td valign=\"top\">2:04 PM 10\/27\/2017<\/td>\n<p>&#10;<\/p>\n<td valign=\"top\"><a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=PUA%3aWin32%2fMediaGet\">PUA:Win32\/MediaGet<\/a><\/td>\n<p>&#10;<\/tr>\n<p>&#10;<\/p>\n<tr>&#10;<\/p>\n<td valign=\"top\">mediaget.exe<\/td>\n<p>&#10;<\/p>\n<td valign=\"top\"><span style=\"font-size: xx-small\">4f31a397a0f2d8ba25fdfd76e0dfc6a0b30dabd5<\/span><\/td>\n<p>&#10;<\/p>\n<td valign=\"top\">Offical mediaget.exe executable<\/td>\n<p>&#10;<\/p>\n<td valign=\"top\">GLOBAL MICROTRADING PTE. LTD.<\/td>\n<p>&#10;<\/p>\n<td valign=\"top\">4:24 PM 10\/18\/2017<\/td>\n<p>&#10;<\/p>\n<td valign=\"top\"><a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=PUA%3aWin32%2fMediaGet\">PUA:Win32\/MediaGet<\/a><\/td>\n<p>&#10;<\/tr>\n<p>&#10;<\/p>\n<tr>&#10;<\/p>\n<td valign=\"top\">update.exe<\/td>\n<p>&#10;<\/p>\n<td valign=\"top\"><span style=\"font-size: xx-small\">513a1624b47a4bca15f2f32457153482bedda640<\/span><\/td>\n<p>&#10;<\/p>\n<td valign=\"top\">Trojanized updater executable<\/td>\n<p>&#10;<\/p>\n<td valign=\"top\">DEVELTEC SERVICES SA DE CV<\/td>\n<p>&#10;<\/p>\n<td valign=\"top\">N\/A<\/td>\n<p>&#10;<\/p>\n<td valign=\"top\">Trojan:Win32\/Modimer.A<\/td>\n<p>&#10;<\/tr>\n<p>&#10;<\/p>\n<tr>&#10;<\/p>\n<td valign=\"top\">mediaget.exe<\/td>\n<p>&#10;<\/p>\n<td valign=\"top\"><span style=\"font-size: xx-small\">3e0ccd9fa0a5c40c2abb40ed6730556e3d36af3c,<br \/>&#10;fda5e9b9ce28f62475054516d0a9f5a799629ba8<\/span><\/td>\n<p>&#10;<\/p>\n<td valign=\"top\">Trojanized mediaget.exe executable<\/td>\n<p>&#10;<\/p>\n<td valign=\"top\">Not signed<\/td>\n<p>&#10;<\/p>\n<td valign=\"top\">N\/A<\/td>\n<p>&#10;<\/p>\n<td valign=\"top\">Trojan:Win32\/Modimer.A<\/td>\n<p>&#10;<\/tr>\n<p>&#10;<\/p>\n<tr>&#10;<\/p>\n<td valign=\"top\">my.dat<\/td>\n<p>&#10;<\/p>\n<td valign=\"top\"><span style=\"font-size: xx-small\">d84d6ec10694f76c56f6b7367ab56ea1f743d284<\/span><\/td>\n<p>&#10;<\/p>\n<td valign=\"top\">Dropped malicious executable<\/td>\n<p>&#10;<\/p>\n<td valign=\"top\"><\/td>\n<p>&#10;<\/p>\n<td valign=\"top\"><\/td>\n<p>&#10;<\/p>\n<td valign=\"top\"><a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=TrojanDownloader:Win32\/Dofoil.AB\">TrojanDownloader:Win32\/Dofoil.AB<\/a><\/td>\n<p>&#10;<\/tr>\n<p>&#10;<\/p>\n<tr>&#10;<\/p>\n<td valign=\"top\">wuauclt.exe<\/td>\n<p>&#10;<\/p>\n<td valign=\"top\"><span style=\"font-size: xx-small\">88eba5d205d85c39ced484a3aa7241302fd815e3<\/span><\/td>\n<p>&#10;<\/p>\n<td valign=\"top\">Dropped CoinMiner<\/td>\n<p>&#10;<\/p>\n<td valign=\"top\"><\/td>\n<p>&#10;<\/p>\n<td valign=\"top\"><\/td>\n<p>&#10;<\/p>\n<td valign=\"top\"><a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=Trojan:Win32\/CoinMiner.D\">Trojan:Win32\/CoinMiner.D<\/a><\/td>\n<p>&#10;<\/tr>\n<p>&#10;<\/tbody>\n<p>&#10;<\/table>\n<p>&#10;<\/p>\n<hr \/>\n<p>&#10;<\/p>\n<h4><strong>Talk to us<\/strong><\/h4>\n<p>&#10;<\/p>\n<p>Questions, concerns, or insights on this story? Join discussions at the <a target=\"_blank\" href=\"https:\/\/answers.microsoft.com\/en-us\/protect\" rel=\"noopener\">Microsoft community<\/a> and <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\" rel=\"noopener\">Windows Defender Security Intelligence<\/a>.<\/p>\n<p>&#10;<\/p>\n<p>Follow us on Twitter <a target=\"_blank\" href=\"https:\/\/twitter.com\/WDSecurity\" rel=\"noopener\">@WDSecurity<\/a> and Facebook <a target=\"_blank\" href=\"https:\/\/www.facebook.com\/MsftWDSI\/\" rel=\"noopener\">Windows Defender Security Intelligence<\/a>.<\/p>\n<p>&#10;<br \/><a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/03\/13\/poisoned-peer-to-peer-app-kicked-off-dofoil-coin-miner-outbreak\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Windows Defender Research| Date: Tue, 13 Mar 2018 22:27:06 +0000<\/strong><\/p>\n<p>On March 7, we reported that a massive Dofoil campaign attempted to install malicious cryptocurrency miners on hundreds of thousands of computers. Windows Defender Antivirus, with its behavior monitoring, machine learning technologies, and layered approach to security detected and blocked the attack within milliseconds.Windows 10 S, a special configuration of Windows 10 providing Microsoft-verified security, <\/p>\n<p><a class=\"read-more\" title=\"Poisoned peer-to-peer app kicked off Dofoil coin miner outbreak\" aria-label=\"Read more about Poisoned peer-to-peer app kicked off Dofoil coin miner outbreak\" href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/03\/13\/poisoned-peer-to-peer-app-kicked-off-dofoil-coin-miner-outbreak\/\">Read more<\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[17768,17769,11572,16598,4500,17109,12038,17770,17771,16768,10761,17261,10865,17194],"class_list":["post-11723","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-behavior-monitoring","tag-code-injection","tag-coinminer","tag-cryptocurrency-mining","tag-cybersecurity","tag-electroneum","tag-machine-learning","tag-mediaget","tag-namecoin","tag-smoke-loader","tag-windows-10","tag-windows-10-s","tag-windows-defender-atp","tag-windows-defender-av"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11723","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11723"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11723\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11723"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11723"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}