Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

WhatsApp Removes 6.8M Scam Accounts

August 7, 2025
Reading Time: 3 mins read
in News
WhatsApp Removes 6.8M Scam Accounts

Microsoft is spearheading a significant advancement in cybersecurity with the development of an autonomous artificial intelligence agent designed to revolutionize malware detection. Codenamed “Project Ire,” this large language model (LLM)-powered prototype is capable of analyzing and classifying software without human intervention. The system automates what has long been considered the “gold standard” in malware classification—the arduous process of fully reverse engineering a software file to determine its purpose. By doing so, Project Ire seeks to accelerate threat response, reduce the manual labor required of security analysts, and enable malware classification at a massive scale.

The technical foundation of Project Ire lies in its ability to leverage a suite of specialized tools for reverse engineering. The system conducts a multi-level analysis, beginning with low-level binary analysis and progressing to control flow reconstruction and high-level interpretation of code behavior. A key component of its architecture is a tool-use API, which allows the system to interact with various reverse engineering tools, including Microsoft’s own memory analysis sandboxes based on Project Freta, custom and open-source tools, and multiple decompilers. This extensive toolkit enables the AI to build a comprehensive understanding of a file, much like a human analyst would, but with a speed and efficiency that is difficult for humans to match.

The process of classifying a file is a multi-step, systematic approach. First, automated reverse engineering tools identify the file type and structure.

The system then reconstructs the software’s control flow graph, providing a map of its logical pathways. Following this, the LLM utilizes its API to invoke specialized tools that identify and summarize key functions within the code. Finally, a validator tool is called to verify the system’s findings against the evidence gathered, leading to a definitive classification. This entire process culminates in a detailed “chain of evidence” log, which meticulously documents how the system arrived at its conclusion. This log is a critical feature, as it allows human security teams to review and refine the process, particularly in the event of a misclassification, thereby fostering trust and transparency.

Early evaluations of Project Ire have yielded promising results. In one test on a dataset of publicly accessible Windows drivers, the system correctly flagged 90% of all files, with a low false positive rate of only 2%. A second, more rigorous evaluation involving nearly 4,000 “hard-target” files demonstrated similar success, with the system correctly identifying almost 9 out of 10 malicious files while maintaining a false positive rate of just 4%. These early successes have prompted Microsoft to integrate the Project Ire prototype into its Defender organization, where it will be leveraged as a Binary Analyzer for enhanced threat detection and software classification.

Looking ahead, Microsoft’s vision for Project Ire is to further scale its speed and accuracy, with the ultimate goal of detecting novel malware directly in memory, at scale.

The company aims for the system to be capable of correctly classifying files from any source, even on first encounter. This development is part of a broader commitment to cybersecurity, which was also highlighted by the company’s recent announcement of a record $17 million in bounty awards to security researchers. Project Ire represents a significant leap forward in the use of AI to automate and fortify the digital defenses against an ever-evolving threat landscape.

Reference:

  • WhatsApp Cracks Down on 6.8 Million Scam Accounts in Global Takedown
Tags: August 2025Cyber NewsCyber News 2025Cyber threats
ADVERTISEMENT

Related Posts

Ukrainian Extradited Over Ransomware

Ukrainian Extradited Over Ransomware

October 31, 2025
Ukrainian Extradited Over Ransomware

Palantir Sues Ex Employees

October 31, 2025
Ukrainian Extradited Over Ransomware

Pixels Vulnerable To Cellebrite Hacking

October 31, 2025
Cities Roll Back License Plate Cameras

Alleged FINTOCH Scam Mastermind Arrestedv

October 30, 2025
Cities Roll Back License Plate Cameras

Vermont Hacker Avoids Jail For Data Theft

October 30, 2025
Cities Roll Back License Plate Cameras

Cities Roll Back License Plate Cameras

October 30, 2025

Latest Alerts

NFC Relay Malware Surge In Europe

Active Exploits Hit Dassault And XWiki

CISA And NSA Warn To Secure Microsoft

PhantomRaven Npm Campaign Hides Bad Code

Cloaked AI Attack Makes Crawlers Cite Lies

Windows Cloud Files Minifilter Exploited

Subscribe to our newsletter

    Latest Incidents

    Ribbon Breached By State Hackers

    EY Data Leak On Microsoft Azure

    Merkle Hit By Major Cyberattack

    Family Health West Hit By Cyberattack

    Canada Warns Hackers Breach Critical ICS

    Tasmanian Gov Agencies Hit By Cyber Attack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial