Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Hackers Abuse QEMU for Defense Evasion
    Cybersecurity

    Hackers Abuse QEMU for Defense Evasion

    adminBy adminApril 21, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Container
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Threat actors have been abusing QEMU in campaigns leading to the deployment of ransomware and remote access tools, Sophos reports.

    A cross-platform open source machine emulator, QEMU allows users to run a guest VM on top of their operating system (VM host).

    Over the past years, security researchers documented several malicious campaigns using QEMU to establish covert communication channels and deploy backdoors, and Sophos now says it has observed an uptick in abuse since late 2025.

    As part of a campaign first observed in November 2025, tracked as STAC4713 and potentially linked to the PayoutsKing ransomware, threat actors used the machine emulator as a covert reverse SSH backdoor for payload delivery and credential harvesting.

    At first, the hackers targeted exposed SonicWall VPNs that lacked MFA for initial access, but later switched to exploiting CVE-2025-26399, a remote code execution (RCE) vulnerability in SolarWinds Web Help Desk.

    The attackers created a scheduled task to launch a QEMU VM with System privileges and to establish persistence. Upon launch, the virtual hard disk image creates a reverse SSH tunnel, providing the threat actors with direct access to the VM.

    Advertisement. Scroll to continue reading.

    Sophos observed the attackers creating a volume shadow copy snapshot, copying the Active Directory database and the SAM and SYSTEM hives to temporary folders, and performing network share discovery and file access using native Windows tools.

    The cybersecurity firm attributes the attacks to Gold Encounter, a closed hacking group operating the PayoutsKing ransomware. The gang is known to target VMware and ESXi environments for encryption.

    In February 2026, Sophos observed a second campaign abusing QEMU. Tracked as STAC3725, it has been relying on the exploitation of CVE-2025-5777 (the infamous CitrixBleed2 bug) for initial access and on a malicious ScreenConnect client to achieve persistence.

    Following the NetScaler exploitation, the attackers created a start service, installed the remote access tool to retrieve QEMU and a virtual disk image, and manually executed the attack within the VM.

    The hackers were observed deploying roughly a dozen tools and libraries, harvesting credentials, enumerating Kerberos usernames, performing Active Directory reconnaissance, staging payloads, and exfiltrating data.

    “Follow-on activity differed across intrusions, suggesting that initial access brokers originally compromised the victims’ environments and then sold the access to other threat actors,” Sophos notes.

    Organizations are advised to search for unauthorized QEMU installations, rogue scheduled tasks, unusual port forwarding rules, and monitor outbound SSH tunnels, which could reveal potential compromise.

    Related: Next.js Creator Vercel Hacked

    Related: Hackers Fail to Exploit Flaw in Discontinued TP-Link Routers

    Related: Microsoft Paid Out $2.3 Million at Zero Day Quest 2026 Hacking Contest

    Related: 100 Chrome Extensions Steal User Data, Create Backdoor

    Abuse Defense Evasion hackers QEMU
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleWinning Google Ads Campaign Structures For DTC Ecommerce
    Next Article WhatsApp’s paid subscription starts rolling out to some
    admin
    • Website

    Related Posts

    KelpDAO suffers $290 million heist tied to Lazarus hackers

    April 21, 2026

    Vercel Employee’s AI Tool Access Led to Data Breach

    April 21, 2026

    SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files

    April 20, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    The digital PR duplication method: Rinse, reuse, repeat

    April 21, 2026

    Valve’s new Linux VRAM fix almost triples framerates in some games on the 4GB Radeon RX 6500 XT

    April 21, 2026

    KelpDAO suffers $290 million heist tied to Lazarus hackers

    April 21, 2026

    WhatsApp’s paid subscription starts rolling out to some

    April 21, 2026
    Categories
    • Blogging (66)
    • Cybersecurity (1,418)
    • Privacy & Online Earning (174)
    • SEO & Digital Marketing (861)
    • Tech Tools & Mobile / Apps (1,707)
    • WiFi / Internet & Networking (234)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    The digital PR duplication method: Rinse, reuse, repeat

    April 21, 2026

    Valve’s new Linux VRAM fix almost triples framerates in some games on the 4GB Radeon RX 6500 XT

    April 21, 2026

    KelpDAO suffers $290 million heist tied to Lazarus hackers

    April 21, 2026
    Most Popular
    • The digital PR duplication method: Rinse, reuse, repeat
    • Valve’s new Linux VRAM fix almost triples framerates in some games on the 4GB Radeon RX 6500 XT
    • KelpDAO suffers $290 million heist tied to Lazarus hackers
    • WhatsApp’s paid subscription starts rolling out to some
    • Hackers Abuse QEMU for Defense Evasion
    • Winning Google Ads Campaign Structures For DTC Ecommerce
    • You’ll have one last chance to save on these top-tier Google TV projectors before launch
    • Vercel Employee’s AI Tool Access Led to Data Breach
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.