Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cybercriminals Exploit QEMU for Stealthy Attacks

Cybercriminals Exploit QEMU for Stealthy Attacks

Posted on April 20, 2026 By CWS

Recent reports from Sophos highlight a surge in cybercriminal activities leveraging QEMU, a versatile machine emulator, to conduct ransomware attacks and deploy remote access tools. These threat actors use QEMU to run guest virtual machines on host operating systems, facilitating covert operations.

Increased Abuse of QEMU

QEMU, known for enabling cross-platform emulation, has become a favored tool among hackers. Over recent years, its use in malicious campaigns has been documented extensively. By late 2025, Sophos noted an increase in instances where QEMU was used to establish hidden communication channels and deploy backdoors.

Among these campaigns, one notable attack observed in November 2025, identified as STAC4713, involved the deployment of ransomware linked to PayoutsKing. The attackers utilized QEMU as a reverse SSH backdoor, facilitating payload delivery and credential theft.

Exploitation Techniques and Vulnerabilities

Initially, attackers targeted SonicWall VPNs without multi-factor authentication. They later exploited the CVE-2025-26399 vulnerability in SolarWinds Web Help Desk, allowing remote code execution. By creating scheduled tasks, attackers launched QEMU VMs with elevated privileges to maintain persistence within compromised systems.

Once inside, these cybercriminals used QEMU to create reverse SSH tunnels, granting them direct access to virtual machines. They then executed various activities, such as copying Active Directory databases and conducting network reconnaissance using built-in Windows tools.

Continuing Threats and Defensive Measures

In early 2026, Sophos discovered another campaign, STAC3725, where attackers exploited the CitrixBleed2 vulnerability, CVE-2025-5777, to gain initial access. A malicious ScreenConnect client was used to establish persistence within the compromised environment.

Post-exploitation, attackers installed remote access tools to retrieve QEMU and executed attacks within virtual environments. Activities included credential harvesting, Active Directory reconnaissance, and staging payloads for exfiltration.

Sophos suggests organizations monitor for unauthorized QEMU installations and look for rogue scheduled tasks and unusual network behaviors. Identifying these indicators can help uncover potential compromises and protect against future threats.

Staying vigilant and implementing robust security measures is crucial as cybercriminals continue to evolve their techniques, leveraging tools like QEMU to bypass defenses and infiltrate systems.

Security Week News Tags:Backdoors, credential harvesting, CVE, cyber threats, Cybersecurity, defense evasion, Hacking, Malware, QEMU, Ransomware, ransomware attacks, remote access, Sophos, virtual machines, VMware

Post navigation

Previous Post: Why AI Projects Often Falter Post-Demo
Next Post: Android Malware Alert: MiningDropper’s Dangerous Impact

Related Posts

Chrome 140 Update Patches Sixth Zero-Day of 2025 Chrome 140 Update Patches Sixth Zero-Day of 2025 Security Week News
Chrome Zero-Day Exploitation Linked to Hacking Team Spyware Chrome Zero-Day Exploitation Linked to Hacking Team Spyware Security Week News
Mesh Security Raises  Million for CSMA Platform Mesh Security Raises $12 Million for CSMA Platform Security Week News
Opti Raises  Million for Identity Security Platform Opti Raises $20 Million for Identity Security Platform Security Week News
‘Kimwolf’ Android Botnet Ensnares 1.8 Million Devices ‘Kimwolf’ Android Botnet Ensnares 1.8 Million Devices Security Week News
Aikido Security Raises  Million at  Billion Valuation Aikido Security Raises $60 Million at $1 Billion Valuation Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical SGLang Vulnerability Allows Remote Code Execution
  • Cybercriminals Exploit QEMU for Hidden Attacks
  • Cybercriminals Exploit Microsoft Tools in New Phishing Scheme
  • Iranian Cyber Campaign Uses Multiple Hacker Personas
  • Vulnerabilities in Serial-to-IP Converters Threaten Critical Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical SGLang Vulnerability Allows Remote Code Execution
  • Cybercriminals Exploit QEMU for Hidden Attacks
  • Cybercriminals Exploit Microsoft Tools in New Phishing Scheme
  • Iranian Cyber Campaign Uses Multiple Hacker Personas
  • Vulnerabilities in Serial-to-IP Converters Threaten Critical Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark