QEMU Abuse - Ransomware Delivery and Evasion Techniques

Sophos analysts report an increase in the abuse of QEMU by threat actors, particularly in campaigns linked to PayoutsKing ransomware, which utilizes hidden virtual machines to evade detection and facilitate data theft.

Malware & RansomwareHIGHUpdated: Published: πŸ“° 3 sources

Original Reporting

SOSophos News

AI Summary

CyberPings AIΒ·Reviewed by Rohit Rana

🎯Hackers are using a tool called QEMU to hide their bad activities inside fake computers, making it really hard for security programs to catch them. This lets them steal information and spread ransomware without being noticed.

The Flaw

The exploitation of QEMU, an open-source machine emulator and virtualizer, has become a favored tactic among cybercriminals. By running malicious operations within hidden virtual machines (VMs), attackers can evade endpoint security measures and conduct their activities with minimal traceability. This method allows them to maintain long-term access to compromised networks, steal credentials, exfiltrate data, and deploy ransomware without detection.

What's at Risk

Two distinct campaigns utilizing QEMU have been identified by Sophos: STAC4713 and STAC3725. The STAC4713 campaign, linked to the PayoutsKing ransomware, leverages QEMU to create covert reverse SSH tunnels and maintain hidden access to victim networks. The STAC3725 campaign exploits the CitrixBleed2 vulnerability (CVE-2025-5777) to gain initial access and deploy malicious tools for reconnaissance and credential theft.

Patch Status

As of now, there are no specific patches available for the abuse of QEMU itself, but organizations are advised to monitor their environments for unauthorized installations and unusual activities related to QEMU usage.

Immediate Actions

Organizations should take proactive measures to protect themselves against these threats:

Detection

  • 1.Audit for unauthorized QEMU installations and suspicious scheduled tasks running with SYSTEM privileges.
  • 2.Monitor for unusual port forwarding rules targeting port 22 and outbound SSH tunnels originating from non-standard ports.

Technical Details

In the STAC4713 campaign, attackers deploy a QEMU VM by creating a scheduled task named β€˜TPMProfiler’ that runs under the SYSTEM account. They disguise virtual disk files as legitimate files (e.g., vault.db or bisrv.dll) and establish persistence through port forwarding. The VM typically runs an Alpine Linux environment, hosting various attacker tools, including AdaptixC2, Chisel, BusyBox, and Rclone.

The STAC3725 campaign employs a similar approach, using a malicious ScreenConnect client for persistence after exploiting the CitrixBleed2 vulnerability. Attackers create a new admin account and deploy a QEMU VM to run their toolkit, which includes tools for credential harvesting and network reconnaissance.

Source Perspectives

  • Technical: Sophos highlights the technical intricacies of using QEMU for stealth operations, emphasizing how attackers leverage its capabilities to bypass traditional security measures. (Source: Sophos)
  • Business Impact: Bill Toulas discusses the implications of these attacks for businesses, noting the potential for significant data loss and operational disruption if organizations do not take preventive measures. (Source: Security Affairs)
  • Policy: The rise of these tactics underscores the need for organizations to review their cybersecurity policies, particularly regarding the use of virtualization technologies and remote access protocols. (Source: Zscaler)

πŸ”’ Pro Insight

The rise in QEMU abuse for ransomware delivery highlights the evolving tactics of cybercriminals, emphasizing the need for organizations to enhance their security posture and monitor for unusual VM activity.

πŸ“… Story Timeline

Story broke by Sophos News

Covered by Security Affairs

Covered by BleepingComputer

Related Pings