Lead Security Researcher, Global Research & Analysis Team, ANZ
Noushin Shabab joined Kaspersky in 2016 and is a senior security researcher based in Australia specializing in reverse engineering and targeted attack investigations. Part of the Global Research & Analysis Team (GReAT), her research focuses on advanced cybercriminal activities and targeted attacks in Asia Pacific. Prior to joining Kaspersky, Noushin worked as a senior malware analyst and software developer for a prominent security software company in Middle East. She has first-hand knowledge of rootkit analysis, detection techniques and APT attack investigations. Noushin remains active in the cybersecurity community in Australia, New Zealand and the APAC region, frequently presenting at various local security conferences. Her prominent keynotes include INTERPOL World in Singapore 2017, Ruxcon in Australia 2017, BSides Wellington in 2017 and WICME (Women in Cyber Mentoring) organized by the Australian department of the Prime Minister and Cabinet, and Security Analyst Summit (SAS). She is also a member of the Australian Women in Security Network (AWSN) which aims to support and inspire women in the Australian security industry. Noushin was the first mentor to provide technical workshops and guidance for the AWSN female cadets program, which aims to bridge the skills gap between universities and the security industry.Cloud Atlas attacks the public sector and diplomatic structures of Russia and Belarus, using ReverseSocks, SSH, and Tor for persistence in infected systems and its new tool, PowerCloud.
Kaspersky researchers analyze a range of new PebbleDash-based tools used in recent Kimsuky campaigns and reveal their connection to the AppleSeed malware cluster.
Kaspersky researchers uncovered malicious wheel packages in PyPI that targeted both Windows and Linux and contained a dropper delivering malware dubbed ZiChatBot. We attribute this activity to OceanLotus APT.
The Silver Fox group is targeting companies in Russia and India by impersonating tax authorities to distribute ValleyRAT and the new ABCDoor backdoor.