Andreas Petker

I have been working for several years as a Senior Analyst in the Cyber Threat Intelligence (CTI) department at Deutsche Telekom Security. In this role I am deeply involved in analyzing attack methods and profiling threat actors. A particular focus of my work is the investigation of botnet structures—especially those associated with so called residential proxies, VPN providers, and ORB networks.


Session

04-17
15:00
30min
When One Botnet Leads to Another: Pivoting from Quad7-like Activity to Unknown Proxy Networks on Embedded Devices
Fabian Marquardt, Andreas Petker

In November 2025, our Threat Hunting team identified a low-volume credential stuffing campaign targeting authentication attempts associated with the Microsoft Azure PowerShell application in Entra ID. While these attempts were largely unsuccessful due to enforced MFA, the request patterns strongly resembled activity previously associated with the Quad7 botnet.
The purpose of this presentation is to disclose details of our ongoing investigation that pivoted from cloud-based authentication abuse to compromised embedded devices, uncovering multiple botnet components and distinct actor activity on real-world customer-owned hardware.
We identified a shared embedded-device ecosystem in which at least two independent actors operated in parallel: one aligned with previously documented Quad7 activity, and another leveraging compromised devices as residential proxy and ORB infrastructure. This overlap illustrates how mass-compromised network devices blur traditional distinctions between state-aligned operations and eCrime-driven proxy ecosystems.
At the time of writing, we are not aware of any prior public disclosure of these findings.

Main conference
Amphitheater