(sophos.com) QEMU Virtualization Abused by Threat Actors for Defense Evasion in Two Distinct Ransomware and Espionage CampaignsThreat actors are actively abusing QEMU virtualization to evade endpoint security controls in two distinct campaigns: STAC4713 (PayoutsKing ransomware/GOLD ENCOUNTER) and STAC3725 (CitrixBleed2 exploitation).In brief - Sophos reports QEMU abuse for defense evasion, enabling covert credential harvesting, AD reconnaissance, and ransomware deployment via hidden VMs. Initial access via SonicWall VPN (CVE-2025-26399) and CitrixBleed2 (CVE-2025-5777). Audit for unauthorized QEMU, suspicious scheduled tasks, and port forwarding.Technically - STAC4713 uses a SYSTEM-level scheduled task ('TPMProfiler') to launch QEMU with Alpine Linux 3.22.0 (vault.db/bisrv.dll), establishing reverse SSH tunnels via AdaptixC2/OpenSSH (ports 32567/22022→22). Tools: wg-obfuscator, Chisel, BusyBox, Rclone. Credential theft via VSS snapshots and NTDS.dit/SAM/SYSTEM exfil. STAC3725 deploys ScreenConnect (AppMgmt service) and QEMU (qemu_custom.zip) post-CitrixBleed2 exploitation. Custom Alpine VM hosts Impacket, BloodHound.py, NetExec, Kerbrute, and Metasploit. TTPs include WDigest registry modification, FTK Imager abuse, and vulnerable kernel driver (K7RKScan_1516.sys) deployment.Source: https://www.sophos.com/en-us/blog/qemu-abused-to-evade-detection-and-enable-ransomware-delivery#Cybersecurity #ThreatIntel