<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Qemu — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/qemu/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 18 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/qemu/feed.xml" rel="self" type="application/rss+xml"/><item><title>Payouts King Ransomware Abusing QEMU VMs for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2026-04-payouts-king-qemu/</link><pubDate>Sat, 18 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-payouts-king-qemu/</guid><description>The Payouts King ransomware is leveraging QEMU VMs as a reverse SSH backdoor to execute payloads, store malicious files, and establish covert remote access tunnels, bypassing endpoint security measures.</description><content:encoded><![CDATA[<p>The Payouts King ransomware, associated with the GOLD ENCOUNTER threat group, is utilizing QEMU, an open-source CPU emulator, to run hidden Alpine Linux virtual machines (VMs) on compromised Windows systems, effectively bypassing endpoint security solutions. This technique allows attackers to execute malicious payloads, store sensitive data, and create covert remote access tunnels over SSH without being detected by host-based security tools. Observed since November 2025 (tracked as STAC4713), this campaign initially exploited exposed SonicWall VPNs and the SolarWinds Web Help Desk vulnerability (CVE-2025-26399). More recent attacks have leveraged exposed Cisco SSL VPNs and Microsoft Teams phishing campaigns to deliver payloads. The attackers are likely tied to former BlackBasta affiliates based on similar initial access methods. This tactic enables persistence, elevated privileges, and data exfiltration while evading detection.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> Attackers gain initial access through exposed SonicWall VPNs, Cisco SSL VPNs, or by exploiting the SolarWinds Web Help Desk vulnerability (CVE-2025-26399). Alternatively, they use Microsoft Teams phishing, tricking employees into downloading and executing malicious files via QuickAssist.</li>
<li><strong>Payload Delivery:</strong> In some instances, a legitimate ADNotificationManager.exe binary is used to sideload a Havoc C2 payload (vcruntime140_1.dll).</li>
<li><strong>QEMU Deployment:</strong> A scheduled task named ‘TPMProfiler’ is created to launch a hidden QEMU VM as SYSTEM, utilizing virtual disk files disguised as databases and DLL files.</li>
<li><strong>VM Configuration:</strong> The QEMU VM runs Alpine Linux (version 3.22.0), containing attacker tools such as AdaptixC2, Chisel, BusyBox, and Rclone.</li>
<li><strong>Reverse SSH Tunnel:</strong> Port forwarding is set up to establish a reverse SSH tunnel, providing covert access to the infected host.</li>
<li><strong>Credential Access:</strong> Attackers use VSS (vssuirun.exe) to create a shadow copy, then use the print command over SMB to copy NTDS.dit, SAM, and SYSTEM hives to temp directories.</li>
<li><strong>Data Exfiltration:</strong> Rclone is leveraged to exfiltrate data to a remote SFTP location or other exfiltration methods, such as FTP, are used.</li>
<li><strong>Encryption and Extortion:</strong> The Payouts King ransomware encrypts systems using AES-256 (CTR) with RSA-4096 with intermittent encryption for larger files. Ransom notes are dropped, directing victims to leak sites on the dark web.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful Payouts King ransomware attacks can result in significant data loss, system downtime, and financial repercussions for victim organizations. The use of QEMU VMs provides an additional layer of stealth, making detection and remediation more challenging. Targeted sectors are not specified in this report, but the use of exposed VPNs and phishing suggests a broad targeting scope. The ransom demands and potential data leaks on the dark web further compound the damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for unauthorized QEMU installations and suspicious scheduled tasks running with SYSTEM privileges, as these are key indicators of compromise (see Overview).</li>
<li>Implement network monitoring to detect unusual SSH port forwarding and outbound SSH tunnels on non-standard ports, which could indicate a reverse SSH tunnel (see Attack Chain).</li>
<li>Deploy the Sigma rule &ldquo;Detect ADNotificationManager Sideloading Havoc C2&rdquo; to identify instances where ADNotificationManager.exe is used to sideload the Havoc C2 payload (vcruntime140_1.dll) (see Rules).</li>
<li>Review and patch CVE-2025-26399 in SolarWinds Web Help Desk and apply necessary security measures for exposed SonicWall and Cisco SSL VPNs to prevent initial access (see Attack Chain).</li>
<li>Monitor for processes creating shadow copies (vssuirun.exe) followed by unusual file access patterns (NTDS.dit, SAM, SYSTEM hives) via SMB, indicative of credential theft (see Attack Chain).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>payouts-king</category><category>ransomware</category><category>qemu</category><category>vm</category><category>defense-evasion</category></item><item><title>QEMU Hypervisor Escape via virtio-snd 0-Day</title><link>https://feed.craftedsignal.io/briefs/2026-03-qemu-escape/</link><pubDate>Thu, 19 Mar 2026 05:19:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-qemu-escape/</guid><description>An unpatched vulnerability in QEMU's virtio-snd component allows for a hypervisor escape due to an uncontrolled heap overflow.</description><content:encoded><![CDATA[<p>A recently disclosed vulnerability in the QEMU virtualization platform allows a malicious guest operating system to escape the hypervisor and potentially execute code on the host system. The vulnerability resides in the <code>virtio-snd</code> component, which emulates a sound card for virtual machines. The root cause is an uncontrolled heap overflow that can be triggered by a specially crafted audio stream sent from the guest to the host. While specific details of the vulnerability and its exploitation are not provided in the source document, it is important for defenders to understand the potential impact of such a vulnerability and take appropriate measures to mitigate the risk. Successfully exploiting this type of vulnerability would allow an attacker to gain complete control over the underlying host system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a guest virtual machine (VM) through a compromised application or vulnerable service running within the VM.</li>
<li>The attacker leverages their access within the guest VM to send a specially crafted audio stream to the emulated <code>virtio-snd</code> device.</li>
<li>The crafted audio stream triggers an uncontrolled heap overflow within the QEMU process on the host system.</li>
<li>The heap overflow corrupts memory on the host system, potentially overwriting critical data structures or code.</li>
<li>The attacker carefully manipulates the heap overflow to overwrite function pointers or other execution control data within the QEMU process.</li>
<li>When the QEMU process attempts to execute the overwritten function pointer, control is redirected to attacker-controlled code.</li>
<li>The attacker&rsquo;s code executes within the context of the QEMU process on the host system, allowing them to bypass the VM&rsquo;s isolation.</li>
<li>The attacker escalates privileges to gain root access on the host and compromise the entire system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this QEMU hypervisor escape vulnerability allows a malicious guest operating system to gain complete control over the host system. This can lead to data theft, system compromise, and further lateral movement within the network. The potential impact is significant, especially in cloud environments where multiple VMs share the same physical hardware. Even though specific victim numbers are unavailable, the wide deployment of QEMU implies a broad scope of potential targets across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events on the hypervisor host for QEMU processes spawning child processes with unexpected command-line arguments, as this could indicate exploitation (see rule: &ldquo;Detect QEMU Process Spawning Shell&rdquo;).</li>
<li>Enable network connection logging for QEMU processes on the hypervisor host to detect connections to unusual or malicious IP addresses, which may be used for command and control after a hypervisor escape (see rule: &ldquo;Detect QEMU Outbound Network Connection&rdquo;).</li>
<li>Investigate any unusual or suspicious behavior within guest VMs, such as unexpected resource utilization or network activity, as this may indicate an attempt to exploit the <code>virtio-snd</code> vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>virtualization</category><category>hypervisor</category><category>qemu</category><category>virtio-snd</category><category>heap overflow</category><category>hypervisor escape</category></item></channel></rss>