Head of Threat Research, Kaspersky
As Head of Threat Research team, Alexander leads top experts on protection from cyberthreats and is responsible for organizing, conducting researches aimed to obtain valuable cyber threat intelligence. The expertise gained from these researches provides the foundation for the further development of Kaspersky's cybersecurity solutions, enabling instantly response to new threats, providing reliable protection against them across all platforms. Alexander joined Kaspersky in 2006 as a malware analyst in the Packed Objects Analysis Group. Within this role he acquired great experience in reverse engineering and software development. In 2013, he became a leader in the Heuristic Detection Group and, several years later, the group’s manager. The division provided generic detections for all kinds of threats as well as developing malware detection methods. As a lead malware analyst, Alexander designed and developed a number of technologies that currently form the basis of Kaspersky’s anti-virus engine. In 2018, Alexander became Head of the Heuristic Detection and Vulnerability Research Team. The team was responsible for heuristic and generic malware detection, developing new threat protection technologies, static and dynamic exploit detection, vulnerability assessment and patch management, packed objects analysis and format parsers. In 2019, Alexander became Head of Anti-Malware Research. In this position he worked on improving threat detection, creating new technologies for protection against advanced threats, and the development of current malware detection mechanisms. Alexander graduated with honors from the Department of Mechanics and Mathematics at Moscow State University.While investigating an incident involving the BellaCiao .NET malware, Kaspersky researchers discovered a C++ version they dubbed “BellaCPP”.
Lazarus targets employees of a nuclear-related organization with a bunch of malware, such as MISTPEN, LPEClient, RollMid, CookieTime and a new modular backdoor CookiePlus.
Kaspersky researchers analyze 2019, 2022 and 2024 attacks attributed to Careto APT with medium to high confidence.
The report features the most significant developments relating to APT groups in Q3 2024, including hacktivist activity, new APT tools and campaigns.