BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
NERF
The Vault
Threat Actors
Privacy Threats
Malware IoC
Dashboard
CVEs
Tags
Intel
NERFThe VaultThreat ActorsPrivacy ThreatsMalware IoCDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
Threat Actors/TA571
🏴

TA571

Also known as: TA571

cybercrime
Nation
🏴 Unknown
Active Since
2019
Targets
Financial ServicesTechnologyGovernmentManufacturingHealthcare
Known Tools
QakBotDarkGatePikabotWasabiSeedScreenConnect
MITRE ATT&CK
T1566.001T1204.002T1059.001T1059.007T1027T1071.001T1105T1218
References
Proofpoint - TA571Proofpoint - DarkGate

Background

TA571 is a spam distributor that operates as an initial access broker, sending high-volume email campaigns that deliver various malware payloads on behalf of other cybercriminal actors. The group adapted rapidly after the FBI''s takedown of QakBot in August 2023, pivoting to distribute DarkGate and Pikabot as replacement loaders.

TA571 is notable for its adaptability and role in the malware distribution ecosystem — the group serves as a critical distribution channel, quickly adopting new malware families when existing ones are disrupted by law enforcement.

Notable Campaigns

Post-QakBot Pivot (2023-2024) — After QakBot''s disruption, TA571 rapidly adopted DarkGate and Pikabot as primary payloads, maintaining their role in the initial access market without significant operational downtime.

HTML Smuggling Campaigns (2024) — TA571 adopted HTML smuggling techniques to bypass email security gateways, embedding malicious payloads within HTML attachments that assemble the malware client-side in the browser.

Tactics, Techniques & Procedures

TA571 sends high-volume campaigns using thread-hijacked and themed emails with malicious attachments. The group has evolved from macro documents to using HTML smuggling, Windows Script Files (.wsf), and OneNote files as delivery mechanisms, adapting to Microsoft''s macro-blocking policies.

Tools & Malware

DarkGate — MaaS loader providing remote access, credential theft, cryptocurrency mining, and reverse shell capabilities.

Pikabot — Modular loader developed as a QakBot replacement, providing system reconnaissance and payload delivery.

WasabiSeed — VBScript-based first-stage loader used to download secondary payloads.

Indicators & Detection

Monitor for HTML smuggling patterns — HTML attachments that trigger file downloads or JavaScript execution upon opening. Block .wsf and .vbs file execution through Group Policy. Implement email filtering for thread-hijacked messages with unusual attachment types.

All Threat Actors