{"id":35465,"date":"2019-12-01T20:40:53","date_gmt":"2019-12-02T01:40:53","guid":{"rendered":"https:\/\/www.opensource.im\/uncategorized\/microsoft-reveals-how-it-caught-mutating-monero-mining-malware-with-machine-learning-the-next-web.php"},"modified":"2019-12-01T20:40:53","modified_gmt":"2019-12-02T01:40:53","slug":"microsoft-reveals-how-it-caught-mutating-monero-mining-malware-with-machine-learning-the-next-web","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/machine-learning\/microsoft-reveals-how-it-caught-mutating-monero-mining-malware-with-machine-learning-the-next-web.php","title":{"rendered":"Microsoft reveals how it caught mutating Monero mining malware with machine learning &#8211; The Next Web"},"content":{"rendered":"<p><p>Microsofts antivirus and malware division recently opened the bonnet on a malicious mutating cryptocurrency miner. The Washington-based big tech firm revealed how machine learning was crucial in putting a stop to it spreading further.<\/p>\n<p>According to the Microsoft Defender Advanced Threat Protection team, a new malware dubbed Dexphot has been infecting computers since last year, but since June 2019 has been burning out thanks to machine learning.<\/p>\n<p>Dexphot used a number of techniques such as encryption, obfuscation layers, and randomized files names, to disguise itself and hijack legitimate systems. If successful, the malware would run a cryptocurrency miner on the device. Whats more, a re-infection would be triggered if system admins detected it and attempt to uninstall it.<\/p>\n<p>Microsoft says Dexphot always uses a cryptocurrency miner, but doesnt always use the same one. XMRig and JCE Miner were shown to be used over the course of Microsofts research.<\/p>\n<p>At its peak in June this year, 80,000 machines are believed to have displayed malicious behavior after being infected by Dexphot.<\/p>\n<p>Detecting and protecting against malware like Dexphot is challenging as it is polymorphic. This means that the malware can change its identifiable characteristics to sneak past definition-based antivirus software.<\/p>\n<p>While Microsoft claims it was able to prevent infections in most cases, it also says its behavior-based machine learning models acted as a safety net when infections slipped through a systems primary defenses.<\/p>\n<p>In simple terms, the machine learning model works by analyzing the behavior of a potentially infected system rather than scanning it for known infected files  a safeguard against polymorphic malware. This means systems can be partly protected against unknown threats that use mechanics similar to other known attacks.<\/p>\n<p>On a very basic level, system behaviors like high CPU usage could be a key indicator that a device has been infected. When this is spotted, antivirus software can take appropriate action to curtail the threat.<\/p>\n<p>In the case of Dexphot, Microsoft says its machine learning-based detections blocked malicious system DLL (dynamic link library) files to prevent the attack in its early stages.<\/p>\n<p>Microsoft has not released any information on how much cryptocurrency was earned as a result of the Dexphot campaign. But thanks to Microsofts machine learning strategy it seems to be putting a lid on it, as infections have dropped by over 80 percent.<\/p>\n<p>It seems as long as there is cryptocurrency, bad actors will attempt to get their hands on it.<\/p>\n<p>Just yesterday, Hard Fork reported that the Stantinko botnet, thats infected 500,000 devices worldwide, has added a cryptocurrency miner to its batch of malicious files.<\/p>\n<p>                                    Published November 27, 2019  09:27 UTC                                <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the rest here:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/thenextweb.com\/hardfork\/2019\/11\/27\/microsoft-machine-learning-monero-mutating-miner-dexphot-malware\/\" title=\"Microsoft reveals how it caught mutating Monero mining malware with machine learning - The Next Web\">Microsoft reveals how it caught mutating Monero mining malware with machine learning - The Next Web<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Microsofts antivirus and malware division recently opened the bonnet on a malicious mutating cryptocurrency miner. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[27373],"tags":[],"class_list":["post-35465","post","type-post","status-publish","format-standard","hentry","category-machine-learning"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/35465"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=35465"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/35465\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=35465"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=35465"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=35465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}