
Image by Oberon Copeland @veryinformed.com, from Unsplash
Teens Must Verify Age To Access Roblox’s New Private Chat Feature
- Written by Kiara Fabbri Former Tech News Writer
- Fact-Checked by Sarah Frazier Former Content Manager
Roblox is rolling out a new age verification process to allow teenage users who want to access private and unfiltered chat functions.
In a rush? Here are the quick facts:
- Roblox requires facial scans or ID to unlock unfiltered chats for teens.
- Teens must verify adults as trusted connections with QR or contact import.
- New privacy tools include Do Not Disturb and teen screen time limits.
The move is part of the company’s new “Trusted Connections” system, which replaces the old “Friends” feature and allows users with unrestricted chat as long as they prove they are over 13, as first reported by The Verge.
To gain access, users must choose between taking a video selfie for age estimation through facial recognition, or uploading their government-issued identification. The facial scan tool, operated by Persona, uses AI to verify user ages and deletes biometric data after 30 days, unless legal requirements demand its retention.
“If the system is not able to estimate the user’s age with high confidence, then the user’s age will remain unconfirmed and the user won’t be able to access Trusted Connections,” said Roblox Chief Safety Officer Matt Kaufman, as reported by The Verge .
Teens aged 13 and 17 can connect with peers without restrictions, but must verify their relationships with adults (18+) through Trusted Connections. They can do this only if they have met in real life. The Verge reports that in order to do this, users need to verify their connections to the adult through a QR code scan or by using Roblox’s Contact Importer feature.
The update also follows legal pressure for stronger age checks. “Features that we really believe are something that should be limited to an older audience — 13 and over,” said Kaufman, explaining the reason behind the new requirement, as reported by CNBC . Ryan Ebanks, Roblox’s social products manager, added, “confirm[ing] the age of our users” helps offer “tailored and age-appropriate features.”
While users can chat more freely with Trusted Connections, Roblox will continue to monitor conversations for “critical harm,” including grooming and inappropriate sexual behavior, despite offering users more free chat capabilities, as noted by CNBC. The company implemented new privacy tools that include Do Not Disturb mode, online status controls, and teen-driven screen time limits.

Image by Gabriel Benois, from Unsplash
Hackers Use Teams Calls To Hijack Systems
- Written by Kiara Fabbri Former Tech News Writer
- Fact-Checked by Sarah Frazier Former Content Manager
The dangerous malware loader Matanbuchus has evolved into version 3.0, which enables attackers to conduct stealthy operations, resulting in ransomware infections.
In a rush? Here are the quick facts:
- Matanbuchus 3.0 spreads via fake Microsoft Teams IT support calls.
- It collects system data and security software details.
- Commands are sent back from hackers through encrypted traffic.
Matanbuchus has existed as a Malware-as-a-Service (MaaS) since 2021, enabling cybercriminals to penetrate Windows systems before installing additional destructive malware.
The latest version has added powerful tools. “Matanbuchus 3.0 was introduced with significant updates to its arsenal,” researchers at Morphisec said. The updated version includes new delivery methods, enhanced communication protocols, memory-hiding capabilities, and security system evasion features. It even mimics apps like Skype to hide its activity.
Morphisec report notes that one alarming case happened in July 2025. An attacker impersonated IT support through a fake Microsoft Teams call. The attacker tricked an employee into executing a script, which secretly deployed Matanbuchus.
Morphisec explains that the script unpacked a zip file with a renamed Notepad++ updater and a corrupted configuration file. This version tricked users using a nearly identical domain: instead of the real site ‘notepad-plus-plus.org’, attackers used ‘notepad-plus-plu[.]org’.
Once installed, the malware performs a system check to verify it operates on a genuine computer instead of a testing environment. The malware steals system data, including username information, security software details, and operating system specifications. Attackers receive encrypted stolen data, through which they choose their next course of action, including malware or ransomware deployment.
The Matanbuchus 3.0 malware costs $10,000 for the HTTP version, while the DNS version requires a $15,000 investment, as reported by Morphisec. The codebase allows users to execute commands through CMD, PowerShell, and WQL, gather installed applications and updates, and perform deep system-level operations, including process injection.
With its advanced stealth and wide range of tools, experts at Morphisec warn Matanbuchus 3.0 is “a significant risk to compromised systems.” Cybersecurity teams are urged to stay alert for signs of this malware and educate staff about social engineering threats.