Head of Global Research & Analysis Team, Russia
Yury joined the Kaspersky Global Research and Analysis Team (GReAT) in July 2011. He specializes in analyzing advanced persistent threats and attacks against banks and financial institutions, as well as malware data collection and analysis. He is also involved in research into mobile threats and malware and web application security issues. He constantly reviews general changes to malware trends. Yury started his career at Kaspersky in 2007 as a virus analyst and was promoted to senior virus analyst after one year. In 2009 he was instrumental in a project, where he developed statistical services for the Kaspersky Security Network (KSN) as senior developer-analyst. After finishing this project, he moved to the education unit of Kaspersky Research and Development as project manager, where he organized and conducted training on IT Security for different organizations including universities, financial organizations and law enforcement agencies. In 2015 Yury was promoted to the position of Head of GReAT in Russia.“Лаборатория Касперского” выявила новую кампанию EastWind, нацеленную на российские организации и использующую CloudSourcerer и инструменты APT31 и APT27.
«Лаборатория Касперского» обнаружила новую APT-угрозу CloudSorcerer, нацеленную на российские государственные организации и использующую облачные службы в качестве командных серверов аналогично APT CloudWizard.
Продолжаем рассказывать об APT-группе ToddyCat. В этой статье поговорим о туннелировании трафика, сохранении доступа к скомпрометированной инфраструктуре и краже данных.
Разбираем фреймворк StripedFly для целевых атак, использовавший собственную версию эксплойта EternalBlue и успешно прикрывавшийся майнером.