Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Launches Project Ire to Autonomously Classify Malware Using AI Tools

Posted on August 6, 2025August 6, 2025 By CWS

Aug 06, 2025Ravie LakshmananArtificial Intelligence / Menace Detection
Microsoft on Tuesday introduced an autonomous synthetic intelligence (AI) agent that may analyze and classify software program with out help in an effort to advance malware detection efforts.
The big language mannequin (LLM)-powered autonomous malware classification system, at present a prototype, has been codenamed Undertaking Ire by the tech big.
The system “automates what is taken into account the gold commonplace in malware classification: absolutely reverse engineering a software program file with none clues about its origin or function,” Microsoft stated. “It makes use of decompilers and different instruments, critiques their output, and determines whether or not the software program is malicious or benign.”
Undertaking Ire, per the Home windows maker, is an effort to allow malware classification at scale, speed up menace response, and scale back the handbook efforts that analysts should undertake to be able to look at samples and decide if they’re malicious or benign.

Particularly, it makes use of specialised instruments to reverse engineer software program, conducting evaluation at varied ranges, starting from low-level binary evaluation to manage movement reconstruction and high-level interpretation of code habits.
“Its tool-use API allows the system to replace its understanding of a file utilizing a variety of reverse engineering instruments, together with Microsoft reminiscence evaluation sandboxes primarily based on Undertaking Freta (opens in new tab), customized and open-source instruments, documentation search, and a number of decompilers,” Microsoft stated.
Undertaking Freta is a Microsoft Analysis initiative that permits “discovery sweeps for undetected malware,” comparable to rootkits and superior malware, in reminiscence snapshots of dwell Linux methods throughout reminiscence audits.

The analysis is a multi-step course of –

Automated reverse engineering instruments determine the file sort, its construction, and potential areas of curiosity
The system reconstructs the software program’s management movement graph utilizing frameworks like angr and Ghidra
The LLM invokes specialised instruments by way of an API to determine and summarize key capabilities
The system calls a validator software to confirm its findings in opposition to proof used to succeed in the decision and classify the artifact

The summarization leaves an in depth “chain of proof” log that particulars how the system arrived at its conclusion, permitting safety groups to evaluate and refine the method in case of a misclassification.
In checks carried out by the Undertaking Ire crew on a dataset of publicly accessible Home windows drivers, the classifier has been discovered to accurately flag 90% of all recordsdata and incorrectly determine solely 2% of benign recordsdata as threats. A second analysis of practically 4,000 “hard-target” recordsdata rightly labeled practically 9 out of 10 malicious recordsdata as malicious, with a false optimistic fee of solely 4%.

“Primarily based on these early successes, the Undertaking Ire prototype can be leveraged inside Microsoft’s Defender group as Binary Analyzer for menace detection and software program classification,” Microsoft stated.
“Our objective is to scale the system’s pace and accuracy in order that it could actually accurately classify recordsdata from any supply, even on first encounter. Finally, our imaginative and prescient is to detect novel malware immediately in reminiscence, at scale.”
The event comes as Microsoft stated it awarded a document $17 million in bounty awards to 344 safety researchers from 59 nations by way of its vulnerability reporting program in 2024.
A complete of 1,469 eligible vulnerability studies had been submitted between July 2024 and June 2025, with the very best particular person bounty reaching $200,000. Final 12 months, the corporate paid $16.6 million in bounty awards to 343 safety researchers from 55 nations.

The Hacker News Tags:Autonomously, Classify, Ire, Launches, Malware, Microsoft, Project, Tools

Post navigation

Previous Post: Black Hat USA 2025 – Summary of Vendor Announcements (Part 2)
Next Post: Microsoft’s New AI Agent Project to Detect Malware with Reverse Engineering Tools

Related Posts

RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks The Hacker News
ClickFix Malware Campaign Exploits CAPTCHAs to Spread Cross-Platform Infections The Hacker News
China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian Telecom The Hacker News
New FileFix Method Emerges as a Threat Following 517% Rise in ClickFix Attacks The Hacker News
AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar The Hacker News
CERT-UA Warns of HTA-Delivered C# Malware Attacks Using Court Summons Lures The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • PLoB: A Behavioral Fingerprinting Framework to Hunt for Malicious Logins
  • Threat Actors Weaponize Smart Contracts to Drain User Crypto Wallets of More Than $900k
  • Trend Micro Patches Apex One Vulnerabilities Exploited in Wild
  • Threat Actors Leveraging GenAI for Phishing Attacks Impersonating Government Websites
  • Microsoft Paid Out $17 Million in Bug Bounties in Past Year

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • PLoB: A Behavioral Fingerprinting Framework to Hunt for Malicious Logins
  • Threat Actors Weaponize Smart Contracts to Drain User Crypto Wallets of More Than $900k
  • Trend Micro Patches Apex One Vulnerabilities Exploited in Wild
  • Threat Actors Leveraging GenAI for Phishing Attacks Impersonating Government Websites
  • Microsoft Paid Out $17 Million in Bug Bounties in Past Year

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News