{"id":28402,"date":"2020-11-14T04:11:53","date_gmt":"2020-11-13T17:11:53","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/great-ama-2020-recap\/28402\/"},"modified":"2020-11-14T04:11:53","modified_gmt":"2020-11-13T17:11:53","slug":"great-ama-2020-recap","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/great-ama-2020-recap\/28402\/","title":{"rendered":"Recapping the GReAT AMA"},"content":{"rendered":"<p>When your company hosts an AMA on Reddit, you have to be ready for all possibilities. About four years ago, we were a bit apprehensive heading into <a href=\"https:\/\/www.kaspersky.com\/blog\/great-ama\/12637\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">our Global Research and Analysis Team (GReAT)\u2019s first AMA<\/a> and then <a href=\"https:\/\/www.kaspersky.com\/blog\/eugene-kaspersky-ask-me-anything\/14820\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">the one with Eugene Kaspersky<\/a> \u2014 but like Boy Scouts, we prepared. And despite the expected trolls (more on them in a bit), both events went off without a hitch for the most part.<\/p>\n<p>You know, working with a global team and getting everyone on the same page was challenging even before COVID. Nevertheless, it had been a while, and we wanted to get the gang \u2014 plus a few more \u2014 back together.<\/p>\n<p>Yesterday, we logged on to a virtual room for the AMA with Costin Raiu, Vitaly Kamluk, Brian Bartholomew, Noushin Shabab, Aseel Kayal, Ivan Kwiatkowski, Maria Namestnikova, Dmitry Bestuzhev, Ariel Jungheit, Dan Demeter, Igor Kuznetsov, and Kurt Baumgartner to kick off <a href=\"https:\/\/www.reddit.com\/r\/IAmA\/comments\/jstt6g\/we_are_kasperskys_global_research_analysis_team\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">our second Reddit AMA<\/a>. The event was slated to last 2 hours, but the team had so much fun, it lasted almost three times as long. Below are some of my favorite question threads of the chat.<\/p>\n<h2>What\u2019s up with Antidrone?<\/h2>\n<p>I was glad to see the recent news of our <a href=\"https:\/\/eugene.kaspersky.com\/2020\/11\/09\/drones-no-more-airport-interruption-scandals-were-here-to-ground-you\/\" target=\"_blank\" rel=\"noopener noreferrer\">antidrone technology<\/a> caught some Reddit users\u2019 eyes. The question and answer were pretty good.<\/p>\n<p><em>There was a story recently about a <a href=\"https:\/\/www.reddit.com\/r\/IAmA\/comments\/jstt6g\/we_are_kasperskys_global_research_analysis_team\/gc1k9xn\/?utm_source=reddit&amp;utm_medium=web2x&amp;context=3\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">\u201cdrone detector\u201d<\/a> originating from Kaspersky. Is that really a threat for some orgs, or is this primarily a Russian hobby?<\/em><\/p>\n<p><strong>Maria here:<\/strong> My neighbor has a drone, and he is Russian. So maybe it\u2019s a Russian hobby, I don\u2019t know. But a drone is, in many cases, just a flying camera that can make photos of anything the owner wants, be it what\u2019s inside someone\u2019s house or in the office, say on the monitors of the computers. So it seems there is something to worry about.<\/p>\n<p><strong>Brian here:<\/strong> Drones are definitely a threat to many organizations. For instance, prisons in the US are using anti-drone technology to help prevent the smuggling of contraband. The tech is also used in many public spaces, such as sporting events, large crowd gatherings, etc. for protection and monitoring. Some organizations are also concerned with corporate espionage through the use of drones.<\/p>\n<h2>How to learn YARA<\/h2>\n<p>As many a reader of this blog knows, YARA is a crucial tool for our research team as well as for many other threat hunters around the world. I\u2019m glad to see people becoming interested in using it professionally.<\/p>\n<p><em><a href=\"https:\/\/www.reddit.com\/r\/IAmA\/comments\/jstt6g\/we_are_kasperskys_global_research_analysis_team\/gc1qr18\/?utm_source=reddit&amp;utm_medium=web2x&amp;context=3\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">I was hoping to learn Yara<\/a>, but before doing that, what prerequisites should I be aware of? Do I need to know assembly, C &amp; reverse engineering? My background is in network security.<\/em><\/p>\n<p><strong>Costin here:<\/strong> Yara\u2019s syntax and strings are similar to C, so that would be a good start. General knowledge of reverse engineering helps, although we know many people who write Yara rules without ever having reversed any samples! A general feel of how malware looks like, how malware works and things like file formats is probably a good start. In case you haven\u2019t seen it yet, do check out this short webinar I did on Yara back in March: https:\/\/securelist.com\/hunting-apts-with-yara\/96386\/<\/p>\n<p>PS: Our PR and sales are kindly asking me to try to sell you this training :) Some people say it\u2019s pretty good actually: https:\/\/xtraining.kaspersky.com\/<\/p>\n<p><strong>Vitaly here:<\/strong> To add to what Costin said and give him some credits, please watch this short presentation written entirely in Yara about Costin using Yara to catch 0-days: https:\/\/www.youtube.com\/watch?v=fbidgtOXvc0<\/p>\n<p>In essence, those skills are not required, but the more you know the more tools you have to create your own perfect Yara rule!<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"Fd5tc93g9i\"><p><a href=\"https:\/\/www.kaspersky.com\/blog\/cybersecurity-expert-training\/36887\/\" target=\"_blank\" rel=\"noopener nofollow\">The Catcher in the YARA \u2014 predicting black swans<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"\u201cThe Catcher in the YARA \u2014 predicting black swans\u201d \u2014 Daily - English - Global - blog.kaspersky.com\" src=\"https:\/\/www.kaspersky.com\/blog\/cybersecurity-expert-training\/36887\/embed\/#?secret=fGqBMS7WdM#?secret=Fd5tc93g9i\" data-secret=\"Fd5tc93g9i\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h2>How to start working in the field<\/h2>\n<p>I was psyched to see a number of questions about how to get into the cybersecurity field. This on stood out in particular and is one that gives me positive feelings for the future.<\/p>\n<p><em><a href=\"https:\/\/www.reddit.com\/r\/IAmA\/comments\/jstt6g\/we_are_kasperskys_global_research_analysis_team\/gc1vref\/?utm_source=reddit&amp;utm_medium=web2x&amp;context=3\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Do you have any idea how can I get remote job as Malware Analyst?<\/a> is such position exist?<\/em><\/p>\n<p>I\u2019m 17 y\/o; have read famous book in subject; currently reversing malware that I had access to (gootkit, remcos, netwalker, \u2026) and reading Advanced Binary DeObfuscation Material<\/p>\n<p><strong>Ivan here:<\/strong> If you\u2019re reversing those samples at 17 years old, I have the feeling that finding a job will not be an issue :) Just keep doing what you\u2019re doing and companies will be fighting for your services in no time!<\/p>\n<p><strong>Maria here:<\/strong> I totally agree with Ivan:) Just today we\u2019ve hired an intern who is 18 and who is reversing samples and is really interested in the cybersecurity topic just like you are. So There is a way to start your career path really soon and even working remotely. Gogogo!:)<\/p>\n<h2>Good ol\u2019 trolling<\/h2>\n<p>Of course, we expected some challenges, and sure enough, Reddit came through. Some people still cannot get over the false narrative that Kaspersky is run by the Russian Federation \u2014 seriously, that joke is old. Our folks replied in earnest, but it seemed that people wanted to dish it out, not take it. Come on \u2014 it\u2019s Reddit!<\/p>\n<p><em><a href=\"https:\/\/www.reddit.com\/r\/IAmA\/comments\/jstt6g\/we_are_kasperskys_global_research_analysis_team\/gc1fska\/?utm_source=reddit&amp;utm_medium=web2x&amp;context=3\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Still working for the Russian government?<\/a><\/em><\/p>\n<p><strong>Costin here:<\/strong> Of course! From the banya, when we are not riding bears to the beach. We also run a chocolate factory 6 miles north of the Kremlin<\/p>\n<p><strong>Ariel here:<\/strong> If it ain\u2019t broken, don\u2019t fix it.<\/p>\n<p><strong>Ivan here:<\/strong> I\u2019ve been trying for years, but as a French citizen they just won\u2019t let me.<\/p>\n<p><strong>Brian here:<\/strong> Secretly for the Americans, with the Russians<\/p>\n<p><strong>Dan here:<\/strong> Privet!<\/p>\n<p>At least some people got our point.<\/p>\n<h2>Hacker movies<\/h2>\n<p>The age-old question about hacker movies was sure to come, and our researchers had some good answers.<\/p>\n<p><em><a href=\"https:\/\/www.reddit.com\/r\/IAmA\/comments\/jstt6g\/we_are_kasperskys_global_research_analysis_team\/gc1hle8\/?utm_source=reddit&amp;utm_medium=web2x&amp;context=3\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">What\u2019s your favourite hacker movie?<\/a><\/em><\/p>\n<p><strong>Igor<\/strong> Hackers, 1995<\/p>\n<p><strong>Ariel here:<\/strong> I\u2019m a fan of the TRON universe.<\/p>\n<p><strong>Vitaly here:<\/strong> How about Mr Robot? Of course everyone knows it. But I was once surprised to see something I missed. It was Defcon Movie Night where they screened \u201c23\u201d and it was pretty cool! Check it out: <a href=\"https:\/\/en.wikipedia.org\/wiki\/23_%28film%29\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https:\/\/en.wikipedia.org\/wiki\/23_%28film%29<\/a><\/p>\n<p><strong>Brian here:<\/strong> Matrix series<\/p>\n<p><strong>Kurt here:<\/strong> Matrix ++<\/p>\n<p><strong>Noushin here:<\/strong> Ghost In The Shell anime, Cyber City Oedo 808<\/p>\n<p><strong>Maria here:<\/strong> Code Mercury. Bruce Willis is the best<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"KDsC632c9L\"><p><a href=\"https:\/\/www.kaspersky.com\/blog\/hackers-movie\/37028\/\" target=\"_blank\" rel=\"noopener nofollow\">A modern take on the movie Hackers<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"\u201cA modern take on the movie Hackers\u201d \u2014 Daily - English - Global - blog.kaspersky.com\" src=\"https:\/\/www.kaspersky.com\/blog\/hackers-movie\/37028\/embed\/#?secret=ToNDL5JUUP#?secret=KDsC632c9L\" data-secret=\"KDsC632c9L\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h2>AV as a target<\/h2>\n<p>Here\u2019s an interesting question about whether AV is a tempting target for attackers.<\/p>\n<p><em><a href=\"https:\/\/www.reddit.com\/r\/IAmA\/comments\/jstt6g\/we_are_kasperskys_global_research_analysis_team\/gc1ip93\/?utm_source=reddit&amp;utm_medium=web2x&amp;context=3\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">What is your take on the argument that antivirus programs are juicy targets for exploits<\/a>, in the sense that they are widely installed, are huge, complex, closed-source code bases which have a large attack surface area and generally run with high privileges?<\/em><\/p>\n<p>Also, do you encounter and have to fend off attacks of this nature on a regular basis, or is it rare?<\/p>\n<p><strong>Ariel here:<\/strong> It\u2019s a bold move to target antivirus software, not something your average attacker does. Antivirus software runs in a high privilege context in order to be able to detect and stop attacks from threats that are also executing with high privileges. There is easier software that is more widely used\u2014word processors for example. Take a look at the exploits available for Antivirus products in the recent year\u2014the number is so small it\u2019s not a good reason not to use them :)<\/p>\n<p><strong>Kurt here:<\/strong> It\u2019s rare. Take a look at what is really getting exploited \u2013 it\u2019s not anti-malware. There is no shame; Careto had a thing for our product several years back. Although, Blackhat presenters might get more high-fives for exploiting an \u201cAV\u201d than Chrome.<\/p>\n<p>Well, those were my favorite moments from the AMA. Take a look and let us know on Twitter what yours were.\u00a0If everyone thinks it was fun, we may jump in again with the team or maybe some other members of Kaspersky \u2014 maybe we won\u2019t have to wait four years for the next one. Until then, see you on the social webs!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jeff\u2019s favorite questions and answers from Kaspersky\u2019s Global Research and Analysis Team\u2019s recent Reddit AMA session.<\/p>\n","protected":false},"author":636,"featured_media":28403,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2647],"tags":[1716,3371,605,28,1130,1717,2781],"class_list":{"0":"post-28402","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-special-projects","8":"tag-ama","9":"tag-antidrone","10":"tag-great","11":"tag-kaspersky","12":"tag-movies","13":"tag-reddit","14":"tag-yara"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/great-ama-2020-recap\/28402\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/great-ama-2020-recap\/22096\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/great-ama-2020-recap\/17574\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/great-ama-2020-recap\/23669\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/great-ama-2020-recap\/21801\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/great-ama-2020-recap\/9034\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/great-ama-2020-recap\/37632\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/great-ama-2020-recap\/28225\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/great\/","name":"GReAT"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/28402","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=28402"}],"version-history":[{"count":0,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/28402\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/28403"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=28402"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=28402"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=28402"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}