Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Cisco Partner Summit Digital 2020 Lenovo Tech World Newsroom HPE Zone The Business Continuity Center Masergy Zenith Partner Program Newsroom Dell Technologies Newsroom Fortinet Secure Network Hub Hitachi Vantara Digital Newsroom IBM Newsroom Juniper Newsroom The IoT Integrator Lenovo Channel-First NetApp Data Fabric Intel Tech Provider Zone

What Is Kaspersky's GReAT?

Kaspersky's Global Research and Analysis Team, manned by 40 security experts worldwide, is always on the hunt for the latest malware.

The malware that modifies a hard drive's firmware to create hidden space where stolen data and maybe even encryption keys for later retrieval was discovered by GReAT, or the Global Research and Analysis Team, part of Moscow-based security technology developer Kaspersky Lab's Threat Research unit.

GReAT was established in 2008 to combat malware and has more than 40 security experts worldwide, according to Kaspersky. Many of its capabilities are similar to those offered by advanced research labs from other security vendors, including Symantec Research Labs or McAfee Labs.

The organization partners with international organizations to assist in investigations and countermeasures to combat malware operations, as well as with large third-party IT vendors such as Adobe, Google and Microsoft to investigate vulnerabilities.

[Related: Hard Drive Malware Hack Opens A Pandora's Box, But Storage Vendors Have Been Closed Off On The Implications]

The malware that infects hard drive firmware is only one of several recent discoveries from GReAT. Others include:

The Fanny worm: Fanny's goal is to map air-gapped networks, or those systems that cannot be reached via normal attacks because they are not connected to an outside network. Fanny works via a USB stick with a hidden storage area infected with the worm. When the USB stick is connected to an air-gapped system, it can surreptitiously collect basic system data and send it on when connected to a network. The USB stick can also carry secret commands to the air-gapped systems.

Interdiction techniques: Attackers can intercept physical goods and replace them with versions featuring malware. For instance, malware can be placed on CDs handed out at conferences that will spread the malware when used.

This article originally appeared as an exclusive on the CRN Tech News App for iOS and Windows 8.

Back to Top



trending stories

sponsored resources