Profile

Konstantin Klinger

Senior Security Research Engineer at Proofpoint

Konstantin Klinger is a senior security research engineer at Proofpoint on the Threat Research & Detection team. He’s punching phishing and malware miscreants by employing static and dynamic signatures, while also engaging in the active development of the sandbox. His primary objective is to automate Detection, Detonation, and Configuration Extraction (DDX) on a large scale. With a background in government intelligence, he dedicated years to Network Security Monitoring. Before returning to Proofpoint, he acquired valuable Incident Response experience at Apple. Working with Suricata and the OISF community has been the constant in his career across various roles.

AllSessions

Day 1
May 9, 2024
2:00 pm

A Pivot to Pika: The Saga of TA577, A Notorious Qbot Distributor

9 May
Time:  2:00 pm - 2:30 pm
Location: 

Among all the major cybercriminal threat actors currently operating today, one stands out for its creativity, sophistication, and frustration to defenders: TA577. In our talk, we will discuss the history of this unique actor, tips for tracking and creating detections to defend against them, how law enforcement activity impacted its malware distribution, and why it’s one of the most difficult actors to defend against currently in operation.

TA577 was one of two prominent distributors of the Qbot botnet. In fact, the success and spread of Qbot was due in large part to the efforts of TA577. This actor demonstrates the ability to rapidly develop and iterate attack chains, and frequently paves the way for other threat actors to follow their novel techniques. With a combination of campaign volume; evasion techniques; unwavering persistence; and the turnaround to ransomware, TA577 remains one of the biggest threats in the ecrime landscape.

But what happened when global law enforcement disrupted Qbot in August 2023, which was this group’s most useful means of conducting large-scale cybercrime? It pivoted.

Proofpoint observed TA577 return in the fall of 2023 to deliver DarkGate – an unusual payload that took the ecrime landscape by storm in September and October – before eventually appearing to settle on Pikabot. Pikabot’s main objective is to download additional payloads, though it also has information gathering capabilities. TA577 may not write its own malware, but the malware it uses is sure to have significant impacts.