Lead data scientist, Kaspersky
Alexey joined Kaspersky in 2010. In his current role, he leads the Detection Methods Analysis Group (DMAG). The group researches up-to-date machine learning techniques and implements these to detect security threats. Alexey has developed a variety of models for detecting executable files, created locality-sensitive hashing for PE files, and designed models for detecting intrusion methods. He holds patents to many of these innovations. Alexey also conducts research in the field of ML model security. His expertise is backed by a Ph.D. degree in the field of mathematics and software engineering for computers, complexes, and computer networks.Kaspersky discloses a 2025 HoneyMyte (aka Mustang Panda or Bronze President) APT campaign, which uses a kernel-mode rootkit to deliver and protect a ToneShell backdoor.
Kaspersky GReAT experts analyze the Evasive Panda APT’s infection chain, including shellcode encrypted with DPAPI and RC5, as well as the MgBot implant.
Kaspersky expert describes new malicious tools employed by the Cloud Atlas APT, including implants of their signature backdoors VBShower, VBCloud, PowerShower, and CloudAtlas.
Kaspersky’s GReAT experts have uncovered a new wave of cyberattacks by the ForumTroll APT group, targeting Russian political scientists and delivering the Tuoni framework to their devices.