Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

CrowdStrike Beefs Up Exploit Detection With Intel CPU Telemetry

Anti-malware giant CrowdStrike says it is using telemetry from Intel processors to help detect and thwart sophisticated software exploits that bypass traditional OS-based defenses.

Anti-malware giant CrowdStrike says it is using telemetry from Intel processors to help detect and thwart sophisticated software exploits that bypass traditional OS-based defenses.

CrowdStrike said the CPU telemetry is powering a new Hardware Enhanced Exploit Detection feature in its Falcon platform and will help detect complex attack techniques that are notoriously hard to identify and expand memory safety protections on older PCs that lack modern anti-exploit mitigations.

“Once activated, the new feature detects exploits by analyzing suspicious operations associated with exploit techniques, such as shellcode injection, return-oriented programming,” CrowdStrike said.

The new detection technology has been fitted into version 6.27 of CrowdStrike’s Falcon sensor and is available on systems with Intel CPUs, sixth generation or newer, running Windows 10 RS4 or later.

[ READ: Microsoft Launches ‘Super Duper Secure Mode’ Browser Experiment  ]

According to a note from CrowdStike security engineers, the new tech uses Intel Processor Trace (Intel PT), a CPU feature that delivers extensive telemetry useful for the detection and prevention of code reuse exploits. 

Intel PT records code execution on the processor and is typically used for performance diagnosis and analysis but CrowdStrike has found a way to leverage the telemetry to spot previously undetectable signs of malicious activity.

“Intel PT allows the CPU to continuously write information about the currently executing code into a memory buffer, which can be used to reconstruct the exact control flow. The primary usage scenario is to trace an executable while it runs, store the trace on the disk and afterward analyze it to reproduce the exact sequence of instructions that has been executed. The program behavior visibility provided by this feature makes it useful for security exploit detection and investigation as well,” CrowdStrike explained.

[READ: Intel Tackles ROP Attacks With New Technology ]

On machines with Intel Processor Trace enabled and supported, CrowdStrike said its Falcon sensor will enable execution tracing for a selected set of programs. “Whenever the program executes a critical system service (like creating a new process), the sensor will analyze the captured trace to look for suspicious operations.

CrowdStrike said the new approach is already proving valuable and has detected several return-oriented programming-based (ROP) exploit chains.

By capturing the execution trace of an application, CrowdStrike says that security software running in the kernel can now look for code reuse attacks by parsing the captured trace packets together with the executed instructions in the address space of the application.  

“Many CPU features, such as Intel PT, are underutilized and can be efficiently leveraged to detect and prevent exploit.”

Related: CrowdStrike and the Battle to Control Enterprise Security Data Lakes

Related: New Security Tech in Intel CPUs Protects Systems Against Malware Attacks 

Related: Intel Tackles ROP Attacks With New Technology

Related: Microsoft Launches JIT-Free ‘Super Duper Secure Mode’ Edge Browser Experiment

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Nation-State

The North Korean APT tracked as TA444 is either moonlighting from its previous primary purpose, expanding its attack repertoire, or is being impersonated by...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.