Lead data scientist, Kaspersky
Alexey joined Kaspersky in 2010. In his current role, he leads the Detection Methods Analysis Group (DMAG). The group researches up-to-date machine learning techniques and implements these to detect security threats. Alexey has developed a variety of models for detecting executable files, created locality-sensitive hashing for PE files, and designed models for detecting intrusion methods. He holds patents to many of these innovations. Alexey also conducts research in the field of ML model security. His expertise is backed by a Ph.D. degree in the field of mathematics and software engineering for computers, complexes, and computer networks.Kaspersky researchers discovered previously unidentified commercial Dante spyware developed by Memento Labs (formerly Hacking Team) and linked it to the ForumTroll APT attacks.
Kaspersky GReAT experts describe the latest Mysterious Elephant APT activity. The threat actor exfiltrates data related to WhatsApp and employs tools such as BabShell and MemLoader HidenDesk.
According to Kaspersky, Librarian Ghouls APT continues its series of attacks on Russian entities. A detailed analysis of a malicious campaign utilizing RAR archives and BAT scripts.
Kaspersky GReAT experts uncovered a new campaign by Lazarus APT that exploits vulnerabilities in South Korean software products and uses a watering hole approach.