⚡ Rocket.net – Managed WordPress Hosting

MiltonMarketing.com  Powered by Rocket.net – Managed WordPress Hosting

Bernard Aybouts - Blog - MiltonMarketing.com

Approx. read time: 2.5 min.

Post: New detection method identifies cryptomining and other fileless malware attacks

New detection method identifies cryptomining and other fileless malware attacks. SentinelOne and Intel announced a new method to detect cryptomining and cryptojacking attacks using hardware-based detection technology.

Cryptomining and cryptojacking attacks have been on the rise since 2018, largely supplanting ransomware as the attack method of choice for malicious actors. The potential income from a pool of devices mining for cryptocurrency is higher than that from ransomware. This increased popularity coincides with improved obfuscation methods used by criminals to avoid detection.

New detection method identifies cryptomining and other fileless malware attacks. SentinelOne and Intel announced a new method for detecting these attacks on Wednesday. Using a combination of Intel’s silicon-level Threat Detection Technology (TDT) security technology and SentinelOne’s autonomous endpoint protection console. A joint press release touts the new memory-based attack detection method as:

“a 10x improvement in scanning time with no increase in CPU usage,”

This translates to a significant increase in detection rates.

At first glance, this may seem underwhelming. The tendency of cryptomining attacks to consume the resources of an entire CPU core, combined with the performance degradation for legitimate tasks this entails, makes manually identifying these attacks relatively simple. Viewing and stopping a mysterious, resource-consuming task in Windows Task Manager or Linux equivalents such as top is relatively trivial.

However, the level of obfuscation utilized by malicious actors makes this approach less than straightforward. Memory-based attacks—also known as fileless malware—make manual detection and traditional dictionary-based antimalware strategies less effective. “Malware, especially cryptominers, continually evolves to avoid detection, often hiding in memory or delivering malicious code directly into the memory of a system,” said Intel Security general manager Jim Gordon in a press release.

Intel TDT was first announced at the 2018 RSA security conference. Presently, TDT comprises two security products: Accelerated Memory Scanning, which uses the integrated graphics system to scan for malware in memory, and Advanced Platform Telemetry, which attempts to combine diagnostic information with machine learning to more reliably detect threats. TDT is available on 6th generation (Skylake) and newer processors.

About the Author: Bernard Aybout (Virii8)

Avatar of Bernard Aybout (Virii8)
I am a dedicated technology enthusiast with over 45 years of life experience, passionate about computers, AI, emerging technologies, and their real-world impact. As the founder of my personal blog, MiltonMarketing.com, I explore how AI, health tech, engineering, finance, and other advanced fields leverage innovation—not as a replacement for human expertise, but as a tool to enhance it. My focus is on bridging the gap between cutting-edge technology and practical applications, ensuring ethical, responsible, and transformative use across industries. MiltonMarketing.com is more than just a tech blog—it's a growing platform for expert insights. We welcome qualified writers and industry professionals from IT, AI, healthcare, engineering, HVAC, automotive, finance, and beyond to contribute their knowledge. If you have expertise to share in how AI and technology shape industries while complementing human skills, join us in driving meaningful conversations about the future of innovation. 🚀