Head of Global Research & Analysis Team (GReAT) Russia and CIS Unit
Dmitry Galov serves as the Head of Kaspersky's Global Research & Analysis Team (GReAT) Russia and CIS Unit. In this influential role, he leads the team of experts in charge of researching the most sophisticated cases related to APTs and financially motivated attacks. Dmitry embarked on his journey with Kaspersky in September 2015 as an intern and later joined GReAT in August 2018, gradually progressing to become Senior Security Researcher. Before assuming his current position, he spearheaded the crimeware research group, showcasing his leadership capabilities. Dmitry is an expert with a profound understanding of various threats. His extensive research, covering topics such as non-Windows malware, future connected healthcare, cyber-espionage campaigns, and ransomware, has been published on Securelist.com, a testament to his expertise and contributions. Known for his exceptional public speaking skills, Dmitry frequently represents Kaspersky at global and local events, leaving a lasting impact on audiences. Additionally, he actively participates in the creation of webinars and videos that delve into the realm of cybersecurity.The report features the most significant developments relating to APT groups in Q1 2024, including the new malware campaigns DuneQuixote and Durian, and hacktivist activity.
We continue to report on the APT group ToddyCat. This time, we’ll talk about traffic tunneling, constant access to a target infrastructure and data extraction from hosts.
New unattributed DuneQuixote campaign targeting entities in the Middle East employs droppers disguised as Total Commander installer and CR4T backdoor in C and Go.
In this report Kaspersky researchers provide an analysis of the previously unknown HrServ web shell, which exhibits both APT and crimeware features and has likely been active since 2021.