Kaspersky Analyst Summit 2011

Twice every year, analysts from Kaspersky meet for a couple of days to brainstorm over ongoing security issues, think about new ways to protect the users and fight against new breeds of threats.

The first summit for 2011 took place earlier in February, and brought together over 100 people from various departments inside the company. Although the exact subjects of the talks are secret as usual, the discussions revolved around subjects such as Android threats, targeted attacks, allowlisting and digital certificates.

One of the highlights of the meeting was having an external guest for an afternoon of a different kind of brainwork – the ancient game of chess. It was a great privilege to meet and talk to Grandmaster Anatoly Karpov, former World Chess Champion and one of the greatest chess players to have ever lived.

Mr Karpov was kind to play a simul against 10 chess players from Kaspersky Lab. All the games ended predictably with 1-0 (Mr Karpov played white at all the tables), except for the game with KL’s CTO Nikolay Grebennikov, who was agreed to a draw, after the black was in a winning position but blundered resulting in an equal endgame.

You can see GM Karpov in the picture above, with some of the KAS participants that you might recognize.

The next issue of KAS will take place in June, at a warmer, though undisclosed (for now) location.

Kaspersky Analyst Summit 2011

Your email address will not be published. Required fields are marked *



APT trends report Q2 2021

This is our latest summary of advanced persistent threat (APT) activity, focusing on significant events that we observed during Q2 2021: attacks against Microsoft Exchange servers, APT29 and APT31 activities, targeting campaigns, etc.

LuminousMoth APT: Sweeping attacks for the chosen few

We recently came across unusual APT activity that was detected in high volumes, albeit most likely aimed at a few targets of interest. Further analysis revealed that the actor, which we dubbed LuminousMoth, shows an affinity to the HoneyMyte group, otherwise known as Mustang Panda.

WildPressure targets the macOS platform

We found new malware samples used in WildPressure campaigns: newer version of the C++ Milum Trojan, a corresponding VBScript variant with the same version number, and a Python script working on both Windows and macOS.

Ferocious Kitten: 6 years of covert surveillance in Iran

Ferocious Kitten is an APT group that has been targeting Persian-speaking individuals in Iran. Some of the TTPs used by this threat actor are reminiscent of other groups, such as Domestic Kitten and Rampant Kitten. In this report we aim to provide more details on these findings.

Subscribe to our weekly e-mails

The hottest research right in your inbox