Security Researcher, GReAT
Leonid joined Kaspersky in 2020 as an intern in the Global Research and Analysis Team (GReAT). In 2021, he was invited to the GReAT as a Junior Security Researcher. In 2023, he was promoted to Security Researcher. In this role, Leonid focuses on open‑source security, reverse engineering and malware analysis. His research includes the analysis of APT campaigns, such as Operation Triangulation and CloudWizard. Additionally, he is actively involved in the development of internal tools and infrastructure. Leonid is currently enrolled in Lomonosov Moscow State University and studies Fundamental Informatics and Information Technology.Cloud Atlas attacks the public sector and diplomatic structures of Russia and Belarus, using ReverseSocks, SSH, and Tor for persistence in infected systems and its new tool, PowerCloud.
Kaspersky researchers analyze a range of new PebbleDash-based tools used in recent Kimsuky campaigns and reveal their connection to the AppleSeed malware cluster.
Kaspersky researchers uncovered malicious wheel packages in PyPI that targeted both Windows and Linux and contained a dropper delivering malware dubbed ZiChatBot. We attribute this activity to OceanLotus APT.
The Silver Fox group is targeting companies in Russia and India by impersonating tax authorities to distribute ValleyRAT and the new ABCDoor backdoor.