Lead data scientist, Kaspersky
Alexey joined Kaspersky in 2010. In his current role, he leads the Detection Methods Analysis Group (DMAG). The group researches up-to-date machine learning techniques and implements these to detect security threats. Alexey has developed a variety of models for detecting executable files, created locality-sensitive hashing for PE files, and designed models for detecting intrusion methods. He holds patents to many of these innovations. Alexey also conducts research in the field of ML model security. His expertise is backed by a Ph.D. degree in the field of mathematics and software engineering for computers, complexes, and computer networks.Kaspersky GReAT experts discovered a complex APT attack on Russian organizations dubbed Operation ForumTroll, which exploits zero-day vulnerabilities in Google Chrome.
In this article, we discuss the tools and TTPs used in the SideWinder APT’s attacks in H2 2024, as well as shifts in its targets, such as an increase in attacks against the maritime and logistics sectors.
Kaspersky researchers analyze EAGERBEE backdoor modules, revealing a possible connection to the CoughingDown APT actor.
While investigating an incident involving the BellaCiao .NET malware, Kaspersky researchers discovered a C++ version they dubbed “BellaCPP”.