Head of Global Research & Analysis Team, Russia
Yury joined the Kaspersky Global Research and Analysis Team (GReAT) in July 2011. He specializes in analyzing advanced persistent threats and attacks against banks and financial institutions, as well as malware data collection and analysis. He is also involved in research into mobile threats and malware and web application security issues. He constantly reviews general changes to malware trends. Yury started his career at Kaspersky in 2007 as a virus analyst and was promoted to senior virus analyst after one year. In 2009 he was instrumental in a project, where he developed statistical services for the Kaspersky Security Network (KSN) as senior developer-analyst. After finishing this project, he moved to the education unit of Kaspersky Research and Development as project manager, where he organized and conducted training on IT Security for different organizations including universities, financial organizations and law enforcement agencies. In 2015 Yury was promoted to the position of Head of GReAT in Russia.Продолжаем рассказывать об APT-группе ToddyCat. В этой статье поговорим о туннелировании трафика, сохранении доступа к скомпрометированной инфраструктуре и краже данных.
Разбираем фреймворк StripedFly для целевых атак, использовавший собственную версию эксплойта EternalBlue и успешно прикрывавшийся майнером.
Делимся с сообществом подходами, которые используют азиатские APT-группировки при взломе инфраструктуры, и подробной информацией о тактиках, техниках и процедурах (TTPs) злоумышленников, основанной на методологии MITRE ATT&CK.
Эксперты «Лаборатории Касперского» смогли получить все этапы «Операции Триангуляция»: эксплойты нулевого дня для iOS, валидаторы, имплант TriangleDB и дополнительные модули.