Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cybercriminals Exploit QEMU for Stealthy Attacks

Cybercriminals Exploit QEMU for Stealthy Attacks

Posted on April 20, 2026 By CWS

Recent reports from Sophos highlight a surge in cybercriminal activities leveraging QEMU, a versatile machine emulator, to conduct ransomware attacks and deploy remote access tools. These threat actors use QEMU to run guest virtual machines on host operating systems, facilitating covert operations.

Increased Abuse of QEMU

QEMU, known for enabling cross-platform emulation, has become a favored tool among hackers. Over recent years, its use in malicious campaigns has been documented extensively. By late 2025, Sophos noted an increase in instances where QEMU was used to establish hidden communication channels and deploy backdoors.

Among these campaigns, one notable attack observed in November 2025, identified as STAC4713, involved the deployment of ransomware linked to PayoutsKing. The attackers utilized QEMU as a reverse SSH backdoor, facilitating payload delivery and credential theft.

Exploitation Techniques and Vulnerabilities

Initially, attackers targeted SonicWall VPNs without multi-factor authentication. They later exploited the CVE-2025-26399 vulnerability in SolarWinds Web Help Desk, allowing remote code execution. By creating scheduled tasks, attackers launched QEMU VMs with elevated privileges to maintain persistence within compromised systems.

Once inside, these cybercriminals used QEMU to create reverse SSH tunnels, granting them direct access to virtual machines. They then executed various activities, such as copying Active Directory databases and conducting network reconnaissance using built-in Windows tools.

Continuing Threats and Defensive Measures

In early 2026, Sophos discovered another campaign, STAC3725, where attackers exploited the CitrixBleed2 vulnerability, CVE-2025-5777, to gain initial access. A malicious ScreenConnect client was used to establish persistence within the compromised environment.

Post-exploitation, attackers installed remote access tools to retrieve QEMU and executed attacks within virtual environments. Activities included credential harvesting, Active Directory reconnaissance, and staging payloads for exfiltration.

Sophos suggests organizations monitor for unauthorized QEMU installations and look for rogue scheduled tasks and unusual network behaviors. Identifying these indicators can help uncover potential compromises and protect against future threats.

Staying vigilant and implementing robust security measures is crucial as cybercriminals continue to evolve their techniques, leveraging tools like QEMU to bypass defenses and infiltrate systems.

Security Week News Tags:Backdoors, credential harvesting, CVE, cyber threats, Cybersecurity, defense evasion, Hacking, Malware, QEMU, Ransomware, ransomware attacks, remote access, Sophos, virtual machines, VMware

Post navigation

Previous Post: Why AI Projects Often Falter Post-Demo
Next Post: Android Malware Alert: MiningDropper’s Dangerous Impact

Related Posts

Chilean Cybercrime Suspect Extradited to the US Chilean Cybercrime Suspect Extradited to the US Security Week News
SimpleHelp Vulnerability Exploited Against Utility Billing Software Users SimpleHelp Vulnerability Exploited Against Utility Billing Software Users Security Week News
FBI Probes Cyber Incident on Sensitive Surveillance System FBI Probes Cyber Incident on Sensitive Surveillance System Security Week News
Mazda Says No Data Leakage or Operational Impact From Oracle Hack Mazda Says No Data Leakage or Operational Impact From Oracle Hack Security Week News
In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed Security Week News
White House Scraps ‘Burdensome’ Software Security Rules  White House Scraps ‘Burdensome’ Software Security Rules  Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Senate Extends Surveillance Program Amidst House Chaos
  • Windows 11 Dev Build Enhances Secure Boot and Storage
  • UK Hacker Admits to Crypto Theft in US Court
  • Android Malware Alert: MiningDropper’s Dangerous Impact
  • Cybercriminals Exploit QEMU for Stealthy Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Senate Extends Surveillance Program Amidst House Chaos
  • Windows 11 Dev Build Enhances Secure Boot and Storage
  • UK Hacker Admits to Crypto Theft in US Court
  • Android Malware Alert: MiningDropper’s Dangerous Impact
  • Cybercriminals Exploit QEMU for Stealthy Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark