Kaspersky’s security experts share their knowledge in the new ‘GReAT Ideas Green Tea Edition’ community talkBy Staff Writer 16 February 2021 | Categories: news
Kaspersky continues thematic-based GReAT Ideas, a series of online events created to support the cybersecurity community and share the company’s latest threat research findings and hands-on expertise.
On February 25, the GReAT Ideas Green Tea Edition will host experts from the Global Research and Analysis Team (GReAT) in Korea, Japan and Singapore, who will talk about the latest cyber-incidents, new Asia-based advanced persistent threat (APT) campaigns and give a workshop on reverse engineering.
GReAT Ideas is a series of talks that provide the inside scoop on the inner workings of Kaspersky’s Global Research and Analysis Team. Inspired by the regular team meet-ups held internally, as well as by the Security Analyst Summit’s friendly atmosphere of exchanging knowledge, these events are intended to empower viewers with information about the threat landscape. This includes details on the most recently found threat cases and techniques used in the cybersecurity world, directly from the GReAT experts.
The event will kick start with a fireside chat between Brian Bartholomew, principal security researcher in Kaspersky’s GReAT, and John Hultquist, vice-president, Threat Intelligence at FireEye who will discuss the notable cyber-incidents that have taken place in 2021.
Seongsu Park, Kaspersky’s GReAT senior security researcher, will explore the ThreatNeedle malware cluster developed by Lazarus group and associated with attacks targeting the defense industry and security researchers. During the talk, Seongsu will share his insights into the sophisticated multi-stage infection schemes used by ThreatNeedle alongside the targets, post-exploitation processes and infrastructures.
His session will be followed by Suguru Ishimaru, Kaspersky’s GReAT security researcher, alongside representatives of ITOCHU Corporation, TeamT5 and Macnica Networks. They will present their results of tracking down the activity of the A41APT campaign linked to the Chinese-speaking APT10. The campaign – tracked over the course of 2019-2020 – targeted multiple industries, including the Japanese manufacturing industry and its overseas bases, in order to steal classified information.
The event will conclude with a reverse engineering exercise by Vitaly Kamlyuk, the head of Kaspersky’s GReAT in APAC. During the 20-minute session, Vitaly will unpack two heavy packers, demonstrating how to handle virtualisation-based packers with ease.
“Cyberspace is largely an international field where borders hardly matter, and this is especially true when it comes to targeted attacks. In such context, it is especially important to have a good oversight of what goes on in the world in terms of APT activities,” explained Sergey Novikov, the deputy director of Kaspersky’s GReAT.
“Asia has been a hotspot of APT activities, with threat actors actively updating and diversifying their tools, moving to new types of targets, and even expanding beyond espionage to activities such as ransomware. We hope that with this thematic ‘regional’ talk we will provide an opportunity for the researchers from other regions to get acquainted with some of the APT activities in Asia and have a chance to speak to people who work to protect against it – and get some valuable insights,” he concluded.
The event will take place on February 25 at 14:00 GMT. You can register for the webinar free here: https://kas.pr/hp6d. In the meantime, take a look at recent Insights from the Experts with Kaspersky on how cybersecurty and artificial intelligence can assist businesses here and here.
Most Read Articles
Have Your Say
What new tech or developments are you most anticipating this year?