Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft’s New AI Agent Project to Detect Malware with Reverse Engineering Tools

Posted on August 6, 2025August 6, 2025 By CWS

Microsoft has unveiled Undertaking Ire, an autonomous AI agent able to reverse engineering and classifying malware at an unprecedented scale. 

The breakthrough system achieved a precision fee of 0.98 and a recall of 0.83 throughout testing on Home windows drivers, marking a major development in cybersecurity automation. 

Undertaking Ire represents the primary AI system to writer a conviction case robust sufficient for automated malware blocking, efficiently figuring out superior persistent risk (APT) samples that Microsoft Defender has since blocked throughout their billion-device community.

Key Takeaways1.  Undertaking Ire mechanically analyzes and identifies malware utilizing superior decompilation instruments.2. Achieved 98% precision in testing with solely 4% false positives on difficult real-world samples.3. Deploying throughout Microsoft Defender’s 1 billion machine community to automate risk detection.

Automated Malware Evaluation

Undertaking Ire operates by way of a complicated toolkit of reverse engineering devices, together with the angr framework, Ghidra decompiler, and Microsoft’s proprietary reminiscence evaluation sandboxes primarily based on Undertaking Freta. 

The system constructs detailed management move graphs to map software program habits, enabling complete binary evaluation with out human intervention. 

By means of its tool-use API, Undertaking Ire can invoke specialised features to look at file constructions, reconstruct execution paths, and determine malicious code patterns.

The AI agent employs iterative perform evaluation, systematically inspecting every part whereas constructing a “chain of proof” for auditable decision-making. 

This strategy permits the system to deal with advanced samples like Trojan:Win64/Rootkit.EH!MTB (SHA256: 86047bb1969d1db455493955fd450d18c62a3f36294d0a6c3732c88dfbcc4f62), the place it efficiently recognized kernel-level rootkit behaviors together with course of termination features and HTTP command-and-control communications.

Throughout analysis in opposition to almost 4,000 “hard-target” recordsdata that stumped automated programs, Undertaking Ire achieved 0.89 precision with only a 4% false constructive fee. 

The system appropriately categorised samples like HackTool:Win64/KillAV!MTB (SHA256: b6cb163089f665c05d607a465f1b6272cdd5c949772ab9ce7227120cf61f971a), figuring out features that terminate antivirus processes by looking for particular executable names, together with ‘avp.exe’ and ‘360Tray.exe’.

Undertaking Ire’s validator device cross-references findings in opposition to professional data, making certain accuracy in advanced eventualities. 

When analyzing anti-debugging mechanisms involving software program interrupts (int 0x29 and int 0x3), the system appropriately flagged unsure claims for human overview, demonstrating subtle uncertainty dealing with.

Integration Into Microsoft Defender 

The prototype can be deployed as Binary Analyzer inside Microsoft’s Defender group, addressing analyst burnout and standardizing risk classification throughout international operations. 

Constructed on the identical agentic basis as GraphRAG and Microsoft Discovery, Undertaking Ire leverages giant language fashions with specialised safety experience.

Microsoft’s collaboration with Emotion Labs contributed essential improvements in cyber autonomy, whereas the system incorporates a number of open-source instruments, together with decompilers and binary evaluation frameworks. 

The last word purpose includes detecting novel malware immediately in reminiscence at a worldwide scale, reworking how organizations defend in opposition to evolving cyber threats by way of autonomous AI-driven evaluation.

Equip your SOC with full entry to the most recent risk knowledge from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Agent, Detect, Engineering, Malware, Microsofts, Project, Reverse, Tools

Post navigation

Previous Post: Microsoft Launches Project Ire to Autonomously Classify Malware Using AI Tools
Next Post: AI Slashes Workloads for vCISOs by 68% as SMBs Demand More – New Report Reveals

Related Posts

New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access Cyber Security News
New Phishing Attack Abusing Blob URLs to Bypass SEGs and Evade Analysis Cyber Security News
Microsoft Releases Mitigations and Threat Hunting Queries for SharePoint Zero-Day Cyber Security News
A New Tool that Automates GitHub Device Code Phishing Attack Cyber Security News
DragonForce Ransomware Empowers Affiliates with Modular Toolkit to Create Custom Ransomware Payloads Cyber Security News
Threat Actors Turning Job Offers Into Traps, Over $264 Million Lost in 2024 Alone Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actors Leveraging GenAI for Phishing Attacks Impersonating Government Websites
  • Microsoft Paid Out $17 Million in Bug Bounties in Past Year
  • Over 1 Million Impacted by DaVita Data Breach
  • Akira Ransomware Uses Windows Drivers to Bypass AV/EDR in SonicWall Attacks
  • Flaws Expose 100 Dell Laptop Models to Implants, Windows Login Bypass

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actors Leveraging GenAI for Phishing Attacks Impersonating Government Websites
  • Microsoft Paid Out $17 Million in Bug Bounties in Past Year
  • Over 1 Million Impacted by DaVita Data Breach
  • Akira Ransomware Uses Windows Drivers to Bypass AV/EDR in SonicWall Attacks
  • Flaws Expose 100 Dell Laptop Models to Implants, Windows Login Bypass

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News