advertisement
Facebook
X
LinkedIn
WhatsApp
Reddit

Kaspersky can now link malware to threat actors

Malware can sow havoc on a company’s systems and Kaspersky has a new tool which might make it easier to understand who is behind the attack.

Dubbed the Kaspersky Threat Attribution Engine, the firm says that this technology can give decision makers greater insight by using data.

The Kaspersky Threat Attribution Engine breaks down malware into its smallest components and analyses each component against a database. This database contains more than 60 000 advanced persistent threat related files and gives Kaspersky’s tech the ability to spot similarities.

The Kaspersky Threat Attribution Engine then highlights the malware’s possible origin and author with a short description and links to both private and public resources, outlining the previous campaigns.

Kaspersky says that this sort of insight helps security researchers find out who is behind an attack while not getting bogged down with investigations.

“Our experience shows that the best way is to look for shared code that the samples have in common with others identified in previous incidents or campaigns. Unfortunately, such manual investigation may take days or even months. To automate and speed up this task, we created Kaspersky Threat Attribution Engine, which is now available for the company’s customers,” says director of Global Research & Analysis at Kaspersky, Costin Raiu.

The firm adds that firms can opt to use their own database containing malware samples if they wish to keep their information confidential.

The solution is secure and Kaspersky says it maintains absolute privacy and confidentiality to avoid exposing sensitive information.

You can find out more about Kaspersky Threat Attribution Engine over on the official website.

[Image – CC 0 Pixabay]

advertisement

About Author

advertisement

Related News

advertisement