Security News > 2021 > April > Microsoft Defender now blocks cryptojacking malware using Intel TDT
Microsoft today announced that Microsoft Defender for Endpoint, the enterprise version of its Windows 10 Defender antivirus, now comes with support for blocking cryptojacking malware using Intel's silicon-based Threat Detection Technology.
Intel TDT is part of the Hardware Shield's suite of capabilities available on Intel vPro and Intel Core platforms, providing endpoint detection and response capabilities for advanced memory scanning, cryptojacking, and ransomware detection via CPU-based heuristics.
Intel TDT couples low-level hardware telemetry collected from the CPU's performance monitoring unit with machine learning to detect cryptomining malware at execution time.
Microsoft also wants to use Intel TDT in the future to detect and stop other malware strains and attack techniques such as ransomware and side-channel attacks.
The new capability is available for all customers using Intel Core processors and the Intel vPro platform, 6th Generation or later.
"As organizations look to simplify their security investments, built-in platform-based security technologies, such as the integration of Intel TDT with Microsoft Defender for Endpoint, combine best of breed in a streamlined solution."
News URL
Related news
- CISA warns of Microsoft Streaming bug exploited in malware attacks (source)
- DarkGate Malware Exploited Recently Patched Microsoft Flaw in Zero-Day Attack (source)
- Microsoft fixes two Windows zero-days exploited in malware attacks (source)
- Microsoft lifts Windows 11 block on some Intel systems after 2 years (source)
- GitHub comments abused to push malware via Microsoft repo URLs (source)