{"id":45528,"date":"2026-04-18T04:00:39","date_gmt":"2026-04-17T20:00:39","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/18\/payouts-king-ransomware-uses-qemu-vms-to-bypass-endpoint-security\/"},"modified":"2026-04-18T04:00:39","modified_gmt":"2026-04-17T20:00:39","slug":"payouts-king-ransomware-uses-qemu-vms-to-bypass-endpoint-security","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/18\/payouts-king-ransomware-uses-qemu-vms-to-bypass-endpoint-security\/","title":{"rendered":"Payouts King ransomware uses QEMU VMs to bypass endpoint security"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2024\/12\/10\/hacker-box.jpg\" width=\"1600\" alt=\"Payouts King ransomware uses QEMU VMs to bypass endpoint security\"><\/p>\n<p>The Payouts King ransomware is using the QEMU emulator as a reverse SSH backdoor to run hidden virtual machines on compromised systems and bypass endpoint security.<\/p>\n<p>QEMU is an open-source CPU emulator and system virtualization tool that allows users to run operating systems on a host computer as virtual machines (VMs).<\/p>\n<p>Since security solutions on the host cannot scan inside the VMs, attackers can use them to execute payloads, store malicious files, and create <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-abuse-qemu-to-covertly-tunnel-network-traffic-in-cyberattacks\/\" rel=\"nofollow noopener\">covert remote access tunnels<\/a> over SSH.<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.adaptivesecurity.com\/demo\/security-awareness-training?utm_source=display_network&amp;utm_medium=paid_display&amp;utm_campaign=2026_04_display_bleepingcomputer&amp;utm_id=701Rd00000fE8REIA0&amp;utm_content=970x250\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/a\/as-tour-the-platform-970-x250.jpg\" style=\"margin-top: 0px;\" alt=\"Payouts King ransomware uses QEMU VMs to bypass endpoint security\"><\/a> <\/div>\n<p>For these reasons, QEMU has been abused in past operations from multiple threat actors, including the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/3am-ransomware-uses-spoofed-it-calls-email-bombing-to-breach-networks\/\" rel=\"nofollow noopener\">3AM ransomware group<\/a>, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/linux-cryptominer-uses-virtual-machines-to-attack-windows-macos\/\" rel=\"nofollow noopener\">LoudMiner cryptomining<\/a>, and <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/windows-infected-with-backdoored-linux-vms-in-new-phishing-attacks\/\" rel=\"nofollow noopener\">&lsquo;CRON#TRAP&rsquo; phishing<\/a>.<\/p>\n<p>Researchers at cybersecurity company Sophos documented two campaigns where attackers deployed QEMU as part of their arsenal and to collect domain credentials.<\/p>\n<p>One campaign that Sophos tracks as STAC4713 was first observed in November 2025 and has been linked to the Payouts King ransomware operation.<\/p>\n<p>The other, tracked as STAC3725, has been spotted in February this year and exploits the CitrixBleed 2 (CVE&#8209;2025&#8209;5777) vulnerability in NetScaler ADC and Gateway instances.<\/p>\n<h3>Running Alpine Linux VMs<\/h3>\n<p>Researchers note that the threat actors behind the STAC4713 campaign are associated with the GOLD ENCOUNTER threat group, which is known to target hypervisors and encryptors for VMware and ESXi environments.<\/p>\n<p>According to Sophos, the malicious actor creates a scheduled task named &lsquo;TPMProfiler&rsquo; to launch a hidden QEMU VM as SYSTEM.<\/p>\n<p>They use virtual disk files disguised as databases and DLL files, and set up port forwarding to provide covert access to the infected host via a reverse SSH tunnel.<\/p>\n<p>The VM runs Alpine Linux version 3.22.0 that includes attacker tools such as AdaptixC2, Chisel, BusyBox, and Rclone.<\/p>\n<p><a href=\"https:\/\/www.sophos.com\/en-us\/blog\/qemu-abused-to-evade-detection-and-enable-ransomware-delivery\" rel=\"nofollow noopener\">Sophos notes<\/a> that initial access was achieved via exposed SonicWall VPNs, while exploitation of the SolarWinds Web Help Desk vulnerability CVE-2025-26399 was observed in more recent attacks.<\/p>\n<p>In the post-infection phase, the threat actors used VSS (vssuirun.exe) to create a shadow copy, then used the print command over SMB to copy NTDS.dit, SAM, and SYSTEM hives to temp directories.<\/p>\n<p>More recently observed incidents attributed to the threat actor relied on other initial access vectors. The researchers say that in an attack in February,&nbsp;GOLD ENCOUNTER used an exposed Cisco SSL VPN, and in March they posed as IT staff and tricked employees over Microsoft Teams into downloading and installing QuickAssist.<\/p>\n<div style=\"background:#eeeeee; border:1px solid #cccccc; padding:5px 10px\">\n<p>&#8220;In both instances, the threat actors used the legitimate ADNotificationManager.exe binary to sideload a Havoc C2 payload (vcruntime140_1.dll) and then leveraged Rclone to exfiltrate data to a remote SFTP location&#8221; &#8211; <a href=\"https:\/\/www.sophos.com\/en-us\/blog\/qemu-abused-to-evade-detection-and-enable-ransomware-delivery\" target=\"_blank\" rel=\"nofollow noopener\">Sophos<\/a><\/p>\n<\/p><\/div>\n<p>According to a <a href=\"https:\/\/www.zscaler.com\/blogs\/security-research\/payouts-king-takes-aim-ransomware-throne\" rel=\"nofollow noopener\">Zscaler report<\/a> this week, Payouts King is likely tied to former BlackBasta affiliates, based on its use of similar initial access methods like spam bombing, <a href=\"https:\/\/www.google.com\/url?client=internal-element-cse&amp;cx=partner-pub-0920899300397823:3529943228&amp;q=https:\/\/www.bleepingcomputer.com\/news\/security\/black-basta-ransomware-poses-as-it-support-on-microsoft-teams-to-breach-networks\/&amp;sa=U&amp;ved=2ahUKEwjD8LO_i_WTAxVHcKQEHV__NWsQFnoECAYQAg&amp;usg=AOvVaw2E_bbaHRqhKd_5aAjxKnWX\" rel=\"nofollow noopener\">Microsoft Teams phishing<\/a>, and <a href=\"https:\/\/www.google.com\/url?client=internal-element-cse&amp;cx=partner-pub-0920899300397823:3529943228&amp;q=https:\/\/www.bleepingcomputer.com\/news\/security\/windows-quick-assist-abused-in-black-basta-ransomware-attacks\/&amp;sa=U&amp;ved=2ahUKEwiIj_7Gi_WTAxV0VqQEHUb_LjQQFnoECAUQAg&amp;usg=AOvVaw1zssIFjNVIatuWuHE8GKB_\" rel=\"nofollow noopener\">Quick Assist abuse<\/a>.<\/p>\n<p>The strain employs heavy obfuscation and anti-analysis mechanisms, establishes persistence via scheduled tasks, and terminates security tools using low-level system calls.<\/p>\n<p>Payouts King encryption scheme uses AES-256 (CTR) with RSA-4096 with intermittent encryption for larger files. The dropped ransom notes point victims to leak sites on the dark web.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"473\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/April\/payouts.jpg\" width=\"900\" alt=\"Payouts King ransomware uses QEMU VMs to bypass endpoint security\"><figcaption><strong>Payouts King ransomware extortion portal<\/strong><br \/><em>Source: BleepingComputer<\/em><\/figcaption><\/figure>\n<\/div>\n<p>The second campaign that Sophos observed (STAC3725), has been active since February and exploits the CitrixBleed 2 vulnerability to gain initial access to target environments.<\/p>\n<p>After compromising NetScaler devices, the attackers deploy a ZIP archive containing a malicious executable that installs a service named &lsquo;AppMgmt,&rsquo; creates a new local admin user (CtxAppVCOMService), and installs a ScreenConnect client for persistence.<\/p>\n<p>The ScreenConnect client connects to a remote relay server and establishes a session with system privileges, then drops and extracts a QEMU package that runs a hidden Alpine Linux VM using a custom.qcow2 disk image.<\/p>\n<p>Instead of using a pre-built toolkit, the attackers manually install and compile their tools, including Impacket, KrbRelayx, Coercer, BloodHound.py, NetExec, Kerbrute, and Metasploit, inside the VM.<\/p>\n<p>Observed activity includes credential harvesting, Kerberos username enumeration, Active Directory reconnaissance, and staging data for exfiltration via FTP servers.<\/p>\n<p>Sophos recommends that organizations look for unauthorized QEMU installations, suspicious scheduled tasks running with SYSTEM privileges, unusual SSH port forwarding, and outbound SSH tunnels on non-standard ports.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 220px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/hubs.li\/Q04crVgD0\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/payouts-king-ransomware-uses-qemu-vms-to-bypass-endpoint-security\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.bleepstatic.com\/c\/p\/autonomous-validation2.jpg\" alt=\"Payouts King ransomware uses QEMU VMs to bypass endpoint security\"><\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/hubs.li\/Q04crVgD0\" target=\"_blank\" rel=\"noopener sponsored\">99% of What Mythos Found Is Still Unpatched.<\/a><\/h2>\n<p>AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.<\/p>\n<p>At the Autonomous Validation Summit (May 12 &amp; 14), see how autonomous, context-rich validation finds what&#8217;s exploitable, proves controls hold, and closes the remediation loop.<\/p>\n<p>          <button><a href=\"https:\/\/hubs.li\/Q04crVgD0\" target=\"_blank\" rel=\"noopener sponsored\">Claim Your Spot<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/leaknet-ransomware-uses-clickfix-and-deno-runtime-for-stealthy-attacks\/\">LeakNet ransomware uses ClickFix, Deno runtime in stealthy attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/signed-software-abused-to-deploy-antivirus-killing-scripts\/\">Signed software abused to deploy antivirus-killing scripts<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/healthcare-it-solutions-provider-chipsoft-hit-by-ransomware-attack\/\">Healthcare IT solutions provider ChipSoft hit by ransomware attack<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks\/\">Microsoft links Medusa ransomware affiliate to zero-day attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/german-authorities-identify-revil-and-gangcrab-ransomware-bosses\/\">German authorities identify REvil and GandCrab ransomware bosses<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Payouts King ransomware is using the QEMU emulator  [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-45528","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45528","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45528"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45528\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45528"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45528"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45528"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}