Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cybercriminals Exploit QEMU for Hidden Attacks

Cybercriminals Exploit QEMU for Hidden Attacks

Posted on April 20, 2026 By CWS

QEMU Weaponized for Covert Cyber Attacks

Recent investigations have revealed that cybercriminals are increasingly leveraging QEMU, a legitimate open-source emulator, to conduct hidden attacks on enterprise environments. This trend showcases how trusted software is being repurposed for malicious activities, allowing attackers to steal credentials and deploy ransomware while evading detection by security systems.

Why QEMU is a Target for Abuse

QEMU is widely used for hardware virtualization and software testing, making it an attractive tool for exploitation. Its ability to run virtual machines (VMs) allows attackers to operate below the radar of most endpoint security measures. Malicious activities within these VMs remain largely invisible, presenting significant challenges for real-time detection and response.

According to Sophos analysts, recent attacks utilizing QEMU have left minimal forensic evidence, complicating efforts to investigate and mitigate these intrusions. Two prominent campaigns, STAC4713 and STAC3725, have been identified, both employing virtualization as a core strategy to evade security controls.

Details of Recent Attack Campaigns

The STAC4713 campaign, detected in November 2025, is linked to the PayoutsKing ransomware operation, attributed to the threat group GOLD ENCOUNTER. Unlike typical ransomware operations, PayoutsKing executes attacks independently, without relying on affiliates. This campaign specifically targets hypervisor environments and utilizes custom encryptors for VMware and ESXi platforms.

The STAC3725 campaign, first identified in February 2026, exploits the CitrixBleed2 vulnerability (CVE-2025-5777) as its initial access point. Attackers use this vulnerability to install a malicious ScreenConnect client and deploy a QEMU VM for credential theft from Active Directory systems.

Inside the Attacks: Techniques and Tools

In STAC4713, attackers initiate the attack by creating a scheduled task named “TPMProfiler” to execute the QEMU executable under the SYSTEM account. This task uses a virtual hard disk image with obscure file extensions to avoid detection. The attackers also configure port forwarding to facilitate hidden remote access.

Conversely, STAC3725 attackers compile their attack suite within the VM, using tools like Impacket, KrbRelayX, and Metasploit. Their operations include credential harvesting, Active Directory reconnaissance, and payload staging, utilizing a variety of supporting libraries.

Defensive Measures and Recommendations

Organizations are urged to audit systems for unauthorized QEMU installations and suspicious scheduled tasks, particularly those running under the SYSTEM account. Monitoring for unusual outbound SSH tunnels and flagging virtual disk images with uncommon extensions are also recommended.

Implementing multi-factor authentication on all remote access platforms and applying patches for known vulnerabilities like CitrixBleed2 can significantly reduce exposure to these threats. Additionally, network-level detection rules should be established to identify unusual port forwarding activities.

Stay updated with the latest cybersecurity news by following us on Google News, LinkedIn, and X, and set CSN as a preferred source on Google for timely updates.

Cyber Security News Tags:CitrixBleed2, credential theft, Cybersecurity, endpoint security, PayoutsKing, QEMU, Ransomware, Sophos, Threat Actors, virtual machines

Post navigation

Previous Post: Cybercriminals Exploit Microsoft Tools in New Phishing Scheme
Next Post: Critical SGLang Vulnerability Allows Remote Code Execution

Related Posts

Google Sued BadBox 2.0 Malware Botnet Operators That Infects 10 Million+ Devices Google Sued BadBox 2.0 Malware Botnet Operators That Infects 10 Million+ Devices Cyber Security News
Critical Vulnerability in Carmaker Portal Let Hackers Unlock the Car Remotely Critical Vulnerability in Carmaker Portal Let Hackers Unlock the Car Remotely Cyber Security News
Open-Source C2 Platform AdaptixC2 Released With Enhanced Stability, Performance, and Speed Open-Source C2 Platform AdaptixC2 Released With Enhanced Stability, Performance, and Speed Cyber Security News
New Cyber Attack Weaponizes DeskSoft to Deploy Malware Leveraging RDP Access to Execute Commands New Cyber Attack Weaponizes DeskSoft to Deploy Malware Leveraging RDP Access to Execute Commands Cyber Security News
SysUpdate Malware Variant Targets Linux with Encrypted C2 SysUpdate Malware Variant Targets Linux with Encrypted C2 Cyber Security News
Threat Actors Leverage Several RMM Tools in Phishing Attack to Maintain Remote Access Threat Actors Leverage Several RMM Tools in Phishing Attack to Maintain Remote Access Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • North Korean Hackers Exploit Fake Meetings to Target Crypto Experts
  • Critical SGLang Vulnerability Allows Remote Code Execution
  • Cybercriminals Exploit QEMU for Hidden Attacks
  • Cybercriminals Exploit Microsoft Tools in New Phishing Scheme
  • Iranian Cyber Campaign Uses Multiple Hacker Personas

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • North Korean Hackers Exploit Fake Meetings to Target Crypto Experts
  • Critical SGLang Vulnerability Allows Remote Code Execution
  • Cybercriminals Exploit QEMU for Hidden Attacks
  • Cybercriminals Exploit Microsoft Tools in New Phishing Scheme
  • Iranian Cyber Campaign Uses Multiple Hacker Personas

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark