Head of Threat Research, Kaspersky
As Head of Threat Research team, Alexander leads top experts on protection from cyberthreats and is responsible for organizing, conducting researches aimed to obtain valuable cyber threat intelligence. The expertise gained from these researches provides the foundation for the further development of Kaspersky's cybersecurity solutions, enabling instantly response to new threats, providing reliable protection against them across all platforms. Alexander joined Kaspersky in 2006 as a malware analyst in the Packed Objects Analysis Group. Within this role he acquired great experience in reverse engineering and software development. In 2013, he became a leader in the Heuristic Detection Group and, several years later, the group’s manager. The division provided generic detections for all kinds of threats as well as developing malware detection methods. As a lead malware analyst, Alexander designed and developed a number of technologies that currently form the basis of Kaspersky’s anti-virus engine. In 2018, Alexander became Head of the Heuristic Detection and Vulnerability Research Team. The team was responsible for heuristic and generic malware detection, developing new threat protection technologies, static and dynamic exploit detection, vulnerability assessment and patch management, packed objects analysis and format parsers. In 2019, Alexander became Head of Anti-Malware Research. In this position he worked on improving threat detection, creating new technologies for protection against advanced threats, and the development of current malware detection mechanisms. Alexander graduated with honors from the Department of Mechanics and Mathematics at Moscow State University.Эксперты GReAT «Лаборатории Касперского» выявили новую кампанию APT-группы Lazarus, использующую уязвимости в южнокорейском программном обеспечении и тактику watering hole.
Про троянец MysterySnail RAT, приписываемый APT-группе IronHusky, не писали с 2021 года. Недавно эксперты Kaspersky GReAT выявили новые версии этого импланта в государственных учреждениях Монголии и России.
Исследователи «Лаборатории Касперского» анализируют кампанию, которую APT-группа GOFFEE проводила во второй половине 2024 года: обновленную схему заражения, новый имплант PowerModul и переход на бинарный агент для Mythic.
Эксперты Kaspersky GReAT обнаружили новую APT-кампанию, в которой используются эксплойты нулевого дня в Google Chrome.