Friday, July 19, 2024
EHA

Windows Defender Antivirus Now Run Within a Sandbox To Isolate the Advanced Threats

Microsoft has moved ahead into a new milestone for its Windows Defender Antivirus and now it is running within Sandbox environment in order to isolate the malicious actions to protect the system.

Microsoft offers Windows Defender as an inbuilt Antivirus for Windows users to protect various cyber threat and protect from critical cyber attacks.

This new future offered by the result of analyzing it from the various security industry and the research community by running Windows Defender Antivirus in a restrictive process execution environment.

Microsoft believes that it was the right investment and the next step in our innovation journey and requested users to test this future and provide the feed to finetune this future and functionality.

Windows Defender Antivirus Sandbox Future 

Inbuilt Windows Defender Antivirus always running within the operating system within high privilege environment that contains so many risks from emerging threats.

Previously known attacks are continuously targeting Windows Defender Antivirus and windows security research team immediately fix it and always hardening windows along with general attacks.

Running Windows Defender Antivirus in Sandbox allow let sophisticated malware and other malicious actions are running in an isolated environment.

This protection ensures the high security for the windows users and this is part of Microsoft’s continued investment to stay ahead of attackers through security innovations.

Sandbox Implementation

First Major effort of this future is layering Windows Defender Antivirus’s inspection capabilities that provides a complete privilege and every testing components must run under the sandbox environment.

Microsoft says The goal for the sandboxed components was to ensure that they encompassed the highest risk functionality like scanning untrusted input, expanding containers, and so on.

In order to focus on the performance issue since the antivirus products need to take a lot of processes to inspect file operations and processing and aggregating or matching large numbers of runtime events.

“To balance this process, In this Sandbox future minimize the number of interactions between the sandbox and the privileged process, and at the same time, only perform these interactions in key moments where their cost would not be significant, for example, when IO is being performed.”

Files will be running in a Sandbox environment in read-only at runtime since there are some potential risk involved at runtime cost of passing data/content between the processes also to avoid duplication and preserve strong security guarantee.

Enable sandboxing for Windows Defender Antivirus Users can also force the sandboxing implementation to be enabled by setting a machine-wide environment variable (setx /M MP_FORCE_USE_SANDBOX 1) and restarting the machine. This is currently supported on Windows 10, version 1703 or later.

Also Reaa

New Adwind RAT Attack Linux, Windows and Mac via DDE Code Injection Technique by Evading Antivirus Software

Hackers Spreading New Malware with Powerful Obfuscation Technique to Bypass Antivirus Software

Malicious Payload Evasion Techniques to Bypass Antivirus with Advanced Exploitation Frameworks

Website

Latest articles

Hackers Claiming Dettol Data Breach: 453,646 users Impacted

A significant data breach has been reported by a threat actor known as 'Hana,'...

CrowdStrike Update Triggers Widespread Windows BSOD Crashes

A recent update from cybersecurity firm CrowdStrike has caused significant disruptions for Windows users,...

Operation Spincaster Disrupts Approval Phishing Technique that Drains Victim’s Wallets

Chainalysis has launched Operation Spincaster, an initiative to disrupt approval phishing scams that have...

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal

Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which...

TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs

Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and...

macOS Users Beware Of Weaponized Meeting App From North Korean Hackers

Meeting apps are often targeted and turned into weapons by hackers as they are...

Hackers Exploiting Legitimate RMM Tools With BugSleep Malware

Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS, has...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles