Product
Kaspersky Threat Attribution Engine
An unrivaled malware analysis tool providing insights into the origin of malware and its possible authors
Prior knowledge as a strategic advantage
While conducting their operations, hackers normally follow a set of tactics, techniques and procedures. Cyber security experts are able to identify threat actors by studying these elements. Effective and efficient attribution always involves a highly-skilled team of researchers with experience in forensics and investigation, and is based on many years’ worth of accumulated data. This kind of database become a valuable resource that can be shared as a tool.
Threat
AttributionQuickly links a new attack to known Advanced Persistent Threat (APT) malware, helping to see the high-risk threat among less serious incidents and take timely protective measures.
Timely
ResponseEnables effective investigation, containment and response based on knowledge of the tactics, techniques and procedures specific to the threat actor.
Self-learning Engine
Allows security teams to add private actors and objects to its database and ‘educate’ the product to detect samples that are similar to files in their private collections.
Privacy and Compliance
Can be deployed in secure, air-gapped environments to protect your systems and data as well as meet any compliance requirements.
White Papers
Learn more, with thought leadership from our globally renowned cybersecurity experts