Security News > 2020 > June > New Kaspersky Tool Helps Attribute Malware to Threat Actors
Kaspersky this week released a threat intelligence solution designed to help with the attribution of malware samples to known advanced persistent threat groups.
The new Kaspersky Threat Attribution Engine, a commercial product available globally, uses a proprietary method to match malicious code against a malware database and link it to APT groups or campaigns based on code similarities.
The new tool is meant to automate the classification and identification of sophisticated malware.
Kaspersky Threat Attribution Engine incorporates a database of APT malware samples and clean files gathered over a 22-year period, and can quickly link new attacks to known APT malware, targeted incidents and hacking groups.
It allows customers to create their own database of malware samples found by in-house analysts, so that the tool can attribute malware based on that information but keep the data confidential.