Microsoft and Intel join forces to defend against cryptojacking
The companies are using machine learning for advanced memory scanning, cryptojacking and ransomware detection
Microsoft’s Defender for Endpoint is expanding its use of Intel’s Threat Detect Technology (TDT) to activate CPU-based crypto-mining machine learning detection.
The two companies have partnered to combat the rising threat of cryptojacking, also known as malicious crypto-mining, where cyber criminals install malware onto devices to use their power and resources to mine for cryptocurrencies or steal cryptocurrency wallets. This attack method can also slow computers dramatically and keep them from operating normally.
Intel TDT equips endpoint detection and response solutions with CPU telemetry and machine learning heuristics for advanced memory scanning, cryptojacking and ransomware detection. The company claims these are the only CPU-based malware behaviour-monitoring capabilities in the market that go beyond signature and file-based techniques.
Karthik Selvaraj, principal security research manager at Microsoft, pointed out that cryptocurrency mining has been on the rise in recent years, thanks to the increasing value of virtual currencies, the growth of popularity of different kinds of cryptocurrency and the volatility of these new markets.
Taking a proactive approach to cyber security
A complete guide to penetration testingDownload now
“As cryptocurrency prices rise, many opportunistic attackers now prefer to use cryptojacking over ransomware,” he said. “The risks for organizations have increased, as attackers deploy coin miners as a payload for malware campaigns.”
The threat detection capabilities are native to Intel Core and vPro platforms and operate seamlessly with EDR solutions without the need for installation or deployment configuration.
Earlier this month, Microsoft announced the Surface Laptop 4 will ship with either an 11th-gen Intel Core chip or an AMD Ryen Microsoft Surface Edition processor, following a decision taken by the company in March to support configurations from multiple hardware vendors. The machine, which has been designed for hybrid working, was reportedly up to 70% faster than the Surface Laptop 3.
The ultimate law enforcement agency guide to going mobile
Best practices for implementing a mobile device programFree download
The business value of Red Hat OpenShift
Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShiftFree download
Managing security and risk across the IT supply chain: A practical approach
Best practices for IT supply chain securityFree download
Digital remote monitoring and dispatch services’ impact on edge computing and data centres
Seven trends redefining remote monitoring and field service dispatch service requirementsFree download