Starting today, Microsoft Defender for Endpoint is expanding its use of Intel Threat Detection Technology (Intel TDT) beyond the accelerated memory scanning capabilities to activate central processing unit (CPU)-based cryptomining machine-learning detection.
This move accelerates endpoint detection and response for millions of customers without compromising experience.
Understanding Intel TDT
Intel TDT is part of Intel Hardware Shield’s suite of advanced capabilities on Intel vPro (also available on Intel Core platforms), equips endpoint detection and response (EDR) solutions with CPU heuristics for advanced memory scanning, cryptojacking, and ransomware detection.
With nearly a billion Intel TDT-capable PCs in the market, these are the only CPU-based malware behavior-monitoring capabilities in market that go beyond signature and file-based techniques.
“Intel is unlocking capabilities in its system on a chip that fundamentally change the rules of the game,” explained Frank Dickson, program VP of Security and Trust at IDC. “The silicon-level telemetry and functionality enable the hardware compute platform to play an active role in threat defense against ‘above-the-OS’ attacks. Clearly, the goal is to empower Intel-based systems of today and tomorrow to be fundamentally more secure and have lower malware infection rates than AMD, Apple and other ARM-based processor systems.”
Why it matters
In April 2020, nearly 5,400 cryptocurrencies with a total market capitalization of $201 billion were traded. Since then, the market value has increased as cryptocurrency is making its way into the mainstream. The financial rewards of cryptocurrency create new threats and risks.
As their value rises, cybercriminals shift their focus from ransomware to cryptojacking.
Cryptojacking is malicious cryptomining where cybercriminals install malware into business and personal computers, laptops and mobile devices. This malware uses the computer’s power and resources to mine for cryptocurrencies or steal cryptocurrency wallets that can slow computers dramatically and keep them from operating normally.
Some cryptojacking scripts have worming capabilities that allow them to infect other devices and servers on a network.
How Intel TDT works
Intel TDT helps endpoint security solutions harness CPU telemetry and hardware acceleration to help identify threats and detect anomalous activity. It uses a combination of CPU telemetry and machine learning (ML) heuristics to detect specific behavior.
The CPU performance monitoring unit (PMU) sits below the applications, operating system and virtualized layers to provide a greater view into active threats across the stack. Intel TDT bolsters EDR solutions and improves visibility where it has historically been a challenge, including the increasing trend of malware attempts to cloak itself in a virtual machine.
“This partnership is one example of our ongoing investment and deep collaboration with technology partners across the industry. We work closely with chipmakers to explore and adopt new hardware-based defenses that deliver robust and resilient protection against cyberthreats,” Karthik Selvaraj, principal security research manager at Microsoft. “As organizations look to simplify their security investments, built-in platform-based security technologies, such as the integration of Intel TDT with Microsoft Defender for Endpoint, combine best-of-breed in a streamlined solution.”
As threats are detected, Intel TDT sends a high-fidelity signal that triggers remediation workflows of EDR solutions to help protect the infected PC and prevent lateral movement across the corporate fleet. The telemetry and ML heuristics are seamlessly incorporated as part of the endpoint solution and multiple concurrent detectors can run in parallel.
This advanced threat detection doesn’t create a performance hit requiring IT leaders to make a tradeoff between better security or a good user experience. Intel TDT can offload performance-intensive security workloads to the integrated graphics controller and return performance back to the CPU, allowing for increased scanning and reduced impacts to the computing experience.
Filed Under: News
Questions related to this article?
👉Ask and discuss on Electro-Tech-Online.com and EDAboard.com forums.
Tell Us What You Think!!
You must be logged in to post a comment.