Kaspersky was at the forefront when it came to researching and containing cybersecurity threats. It now offers some of its tools to open source to make it easier for others to integrate these advanced security features. The
company has announced that Kaspersky Lab's KLara malware detection
software is now available as a threat detection tool in an open source
on the official Kaspersky Lab
Github page
Cyber-threat detection requires tools and systems that can effectively hunt for malware, especially when tracking targeted threat campaigns through months or even years of activity. KLara has been created to help us chase threats better and faster, and Kaspersky wants to share them with the rest of the security community so everyone can enjoy the benefits of this tool
KLara is an internally generated tool to speed up the search for samples of related malware, in an open-source domain for everyone. KLara relies on YARA, one of the most popular malware search programs used by security researchers to detect Advanced Persistent Threat (APT) and suspicious activity effects in a cloud or computing system. Compared to traditional YARA implementations, the KLara tool is fast and capable of running a series of threat-finding commands that include multiple rules and data sets to remove malicious code as well as identify security threats.
The KLara tool was developed using Python and can be deployed on any compatible software system, be it Windows or UNIX. Kaspersky Lab revealed that KLara is capable of detecting malware and threats from scratch, and with distributed system architecture, it can apply YARA search rules to multiple data sets to search for threats. Once the scan is complete, the KLara tool will be sent via e-mail or through the connected web interface, with notification of completion of the scan results.The Klara tool is available through Kaspersky Lab's official GitHub account
Github page
Cyber-threat detection requires tools and systems that can effectively hunt for malware, especially when tracking targeted threat campaigns through months or even years of activity. KLara has been created to help us chase threats better and faster, and Kaspersky wants to share them with the rest of the security community so everyone can enjoy the benefits of this tool
KLara is an internally generated tool to speed up the search for samples of related malware, in an open-source domain for everyone. KLara relies on YARA, one of the most popular malware search programs used by security researchers to detect Advanced Persistent Threat (APT) and suspicious activity effects in a cloud or computing system. Compared to traditional YARA implementations, the KLara tool is fast and capable of running a series of threat-finding commands that include multiple rules and data sets to remove malicious code as well as identify security threats.
The KLara tool was developed using Python and can be deployed on any compatible software system, be it Windows or UNIX. Kaspersky Lab revealed that KLara is capable of detecting malware and threats from scratch, and with distributed system architecture, it can apply YARA search rules to multiple data sets to search for threats. Once the scan is complete, the KLara tool will be sent via e-mail or through the connected web interface, with notification of completion of the scan results.The Klara tool is available through Kaspersky Lab's official GitHub account