Microsoft Defender now blocks cryptojacking malware using Intel TDT

April 26, 2021
Microsoft Defender for Endpoint, Microsoft’s endpoint security tool, can now block cryptojacking malware via Intel’s Threat Detection Technology, according to BleepingComputer.

Cryptojacking malware enables cryptocurrency mining on infected devices without the knowledge of the victim and could sometimes use important system resources that significantly affects the performance of the infected machine.

Intel TDT provides endpoint detection and response capabilities for cryptojacking, ransomware detection and advanced memory scanning. It does not use code injection or hypervisor introspection to bypass malware creators’ detection evasion techniques and employs low-level hardware telemetry for cryptomining malware detection.

“This partnership is one example of our ongoing investment and deep collaboration with technology partners across the industry. We work closely with chipmakers to explore and adopt new hardware-based defenses that deliver robust and resilient protection against cyberthreats. As organizations look to simplify their security investments, built-in platform-based security technologies, such as the integration of Intel TDT with Microsoft Defender for Endpoint, combine best of breed in a streamlined solution,” said Karthik Selvaraj, Microsoft 365 Defender Research Team’s principal research manager.
Jill Aitoro

SC Media Editor in Chief Jill Aitoro has 20 years of experience editing and reporting on technology, business and policy. She also serves as editorial director at SC Media’s parent company, CyberRisk Alliance. Prior to joining CRA, she worked at Sightline Media as editor of Defense News and executive editor of the Business-to-Government Group. She previously worked at Washington Business Journal and Nextgov, covering federal technology, contracting and policy, as well as CMP Media’s VARBusiness and CRN and Penton Media’s iSeries News.

prestitial ad