Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

WhatsApp Removes 6.8M Scam Accounts

August 7, 2025
Reading Time: 3 mins read
in News
WhatsApp Removes 6.8M Scam Accounts

Microsoft is spearheading a significant advancement in cybersecurity with the development of an autonomous artificial intelligence agent designed to revolutionize malware detection. Codenamed “Project Ire,” this large language model (LLM)-powered prototype is capable of analyzing and classifying software without human intervention. The system automates what has long been considered the “gold standard” in malware classification—the arduous process of fully reverse engineering a software file to determine its purpose. By doing so, Project Ire seeks to accelerate threat response, reduce the manual labor required of security analysts, and enable malware classification at a massive scale.

The technical foundation of Project Ire lies in its ability to leverage a suite of specialized tools for reverse engineering. The system conducts a multi-level analysis, beginning with low-level binary analysis and progressing to control flow reconstruction and high-level interpretation of code behavior. A key component of its architecture is a tool-use API, which allows the system to interact with various reverse engineering tools, including Microsoft’s own memory analysis sandboxes based on Project Freta, custom and open-source tools, and multiple decompilers. This extensive toolkit enables the AI to build a comprehensive understanding of a file, much like a human analyst would, but with a speed and efficiency that is difficult for humans to match.

The process of classifying a file is a multi-step, systematic approach. First, automated reverse engineering tools identify the file type and structure.

The system then reconstructs the software’s control flow graph, providing a map of its logical pathways. Following this, the LLM utilizes its API to invoke specialized tools that identify and summarize key functions within the code. Finally, a validator tool is called to verify the system’s findings against the evidence gathered, leading to a definitive classification. This entire process culminates in a detailed “chain of evidence” log, which meticulously documents how the system arrived at its conclusion. This log is a critical feature, as it allows human security teams to review and refine the process, particularly in the event of a misclassification, thereby fostering trust and transparency.

Early evaluations of Project Ire have yielded promising results. In one test on a dataset of publicly accessible Windows drivers, the system correctly flagged 90% of all files, with a low false positive rate of only 2%. A second, more rigorous evaluation involving nearly 4,000 “hard-target” files demonstrated similar success, with the system correctly identifying almost 9 out of 10 malicious files while maintaining a false positive rate of just 4%. These early successes have prompted Microsoft to integrate the Project Ire prototype into its Defender organization, where it will be leveraged as a Binary Analyzer for enhanced threat detection and software classification.

Looking ahead, Microsoft’s vision for Project Ire is to further scale its speed and accuracy, with the ultimate goal of detecting novel malware directly in memory, at scale.

The company aims for the system to be capable of correctly classifying files from any source, even on first encounter. This development is part of a broader commitment to cybersecurity, which was also highlighted by the company’s recent announcement of a record $17 million in bounty awards to security researchers. Project Ire represents a significant leap forward in the use of AI to automate and fortify the digital defenses against an ever-evolving threat landscape.

Reference:

  • WhatsApp Cracks Down on 6.8 Million Scam Accounts in Global Takedown
Tags: August 2025Cyber NewsCyber News 2025Cyber threats
ADVERTISEMENT

Related Posts

Two Arrested Over Nursery Cyber Attack

Two Arrested Over Nursery Cyber Attack

October 8, 2025
Two Arrested Over Nursery Cyber Attack

Y2K38 Bug Is A Security Vulnerability

October 8, 2025
Two Arrested Over Nursery Cyber Attack

Filigran Raises 58 Million Series C

October 8, 2025
Security Firm Exposes Beijing Institute

Zeroday Cloud Hacking Contest Offers $4.5M

October 7, 2025
Security Firm Exposes Beijing Institute

Security Firm Exposes Beijing Institute

October 7, 2025
Security Firm Exposes Beijing Institute

LinkedIn Sues ProAPIs Over Fake Accounts

October 7, 2025

Latest Alerts

Microsoft Ties Storm 1175 To Medusa

Google Chrome RCE Flaw Details Leak

Redis Use After Free Bug Enables RCE

XWorm 6.0 Returns With New Plugins

Steam And Microsoft Warn Of Unity Flaw

Rhadamanthys Stealer Evolves Again

Subscribe to our newsletter

    Latest Incidents

    DraftKings Warns Of Account Breaches

    Doctors Imaging Data Breach Hits 171K

    Salesforce Refuses To Pay Ransom

    Red Hat Data Breach Escalates Further

    FC Barcelona Instagram Hacked By Scam

    Threat Actors Claim Huawei Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial