BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
Threat Actors/TA577
🏴

TA577

cybercrime
Nation
🏴 Unknown
Active Since
2020
Targets
FinanceManufacturingTransportationHealthcareGovernmentTechnology
Known Tools
QakBotPikabotCobalt StrikeIcedIDSystemBCISFB/Ursnif
MITRE ATT&CK
T1566.001T1566.002T1059.001T1027T1204.002T1071.001T1055T1105T1204.001T1539
References
Proofpoint TA577 ProfileCISA QakBot Advisory AA23-243AProofpoint QakBot Threat Actor AnalysisFBI QakBot Takedown (Duck Hunt)

Background

TA577 is a financially motivated threat actor tracked by Proofpoint that operates as one of the most prolific high-volume malware distribution actors targeting enterprise environments globally. The group serves as an initial access broker and malware delivery service, distributing commodity malware including QakBot, Pikabot, and IcedID through large-volume phishing campaigns against organizations across all sectors.

The group's primary operational role is distributing initial access malware that is then used by ransomware and other cybercrime operations to deploy payloads. TA577 was among the most significant QakBot distributors, making it a key enabler of multiple ransomware operations including Black Basta, ProLock, and Egregor. Following the FBI's August 2023 takedown of the QakBot infrastructure (Operation Duck Hunt), TA577 adapted rapidly, switching to Pikabot distribution within weeks.

The group is notable for its operational agility: it consistently innovates delivery techniques to evade email security controls, including the use of thread-hijacking (replying to stolen email conversations), HTML smuggling, PDF and ZIP-based delivery chains, and abuse of legitimate services for payload hosting. TA577 operates at exceptional scale, with campaigns distributing millions of malicious emails per operation.

Notable Campaigns

QakBot Thread Hijacking Campaigns (2021-2023): TA577 was a leading adopter of email thread hijacking, where stolen email conversations are used to send malicious replies from compromised accounts. This technique dramatically increased click rates as recipients trusted familiar conversation contexts. The group distributed QakBot through thread-hijacked emails at scale throughout 2021-2023, affecting organizations across all sectors.

NTLM Credential Theft Campaign (February 2024): Proofpoint identified TA577 conducting a novel attack using specially crafted ZIP archive attachments containing Windows Search (.search-ms) files. When opened, these files triggered SMB connections to attacker-controlled servers, capturing NTLM authentication hashes without user interaction beyond opening the file. This zero-click credential theft technique bypassed conventional malware delivery protections.

Pikabot Distribution (Post-QakBot, 2023-2024): Following the QakBot takedown, TA577 rapidly adopted Pikabot, a sophisticated QakBot successor with similar capabilities. The group was among the first to incorporate Pikabot into high-volume campaigns, demonstrating its access to or influence over malware developers.

HTML Smuggling Campaigns (2022-2023): TA577 deployed HTML smuggling techniques to bypass email security gateways, encoding malicious payloads within HTML attachments that reconstitute the payload client-side using JavaScript, evading content scanning at the mail gateway level.

Tactics, Techniques & Procedures

TA577 specializes in email-based initial access delivery (T1566.001, T1566.002) using multiple delivery mechanisms. The group has historically used document- based delivery (weaponized Office files with macros), but has adapted to Microsoft's Office macro blocking policies by shifting to URL-based delivery, LNK files, ISO archives, and HTML smuggling techniques.

Thread hijacking is a signature TA577 technique, where previously stolen email content from compromised accounts is used to craft highly contextual malicious replies. This technique leverages existing trust relationships and conversation context to improve delivery and click rates.

Post-delivery, TA577's malware (primarily QakBot and Pikabot) establishes persistent C2 communications, harvests credentials and browser data, and facilitates handoff to ransomware or other post-exploitation operators. The group itself does not typically conduct post-compromise operations — it functions as an access provider that sells or leases access to downstream criminal actors.

Tools & Malware

  • QakBot (QBot): Sophisticated banking trojan and botnet platform used extensively by TA577 until the August 2023 takedown. Provided initial access, credential theft, and Cobalt Strike delivery capabilities.
  • Pikabot: QakBot successor with similar modular architecture, deployed by TA577 following the QakBot infrastructure disruption.
  • IcedID (BokBot): Banking trojan distributed by TA577 as an alternative initial access payload.
  • Cobalt Strike: Post-exploitation framework delivered via QakBot/Pikabot infections, used by downstream ransomware operators.
  • SystemBC: SOCKS5 proxy delivered as part of multi-stage payload chains for persistent C2.
  • ISFB/Ursnif: Banking trojan used in earlier TA577 campaigns targeting financial sector organizations.

Indicators & Detection

Email security is the primary defensive layer against TA577. Implement advanced email security gateways with sandbox detonation for all attachment types, including HTML, PDF, ZIP, and ISO files. Enable Microsoft's Office macro blocking policies and disable AutoOpen macros enterprise-wide. Alert on HTML smuggling indicators such as HTML files containing obfuscated JavaScript with base64-encoded embedded files.

For thread hijacking detection, flag incoming emails that reply to internal conversations but originate from external or unexpected mail servers. Monitor for Reply-To header manipulation and mismatches between the From address and the email's routing path.

Endpoint detection should identify QakBot and Pikabot behavioral patterns: process injection into legitimate Windows processes (wermgr.exe, AtBroker.exe), scheduled task creation for persistence, and DNS queries to recently registered domains. Following the QakBot takedown, monitor specifically for Pikabot's characteristic anti-analysis techniques and its use of unique process injection methods distinct from its predecessor.

All Threat Actors