Payouts King ransomware leverages QEMU-based hidden VMs for covert operations and persistence
Summary
Hide ▲
Show ▼
The Payouts King ransomware operation has integrated the QEMU emulator to deploy hidden Alpine Linux virtual machines (VMs) on compromised hosts, enabling attackers to bypass endpoint security controls and execute malicious activities without detection. Using reverse SSH tunnels and scheduled tasks, threat actors associated with the GOLD ENCOUNTER group operate these VMs to harvest credentials, perform Active Directory reconnaissance, and stage data for exfiltration. Initial access vectors include exploitation of SonicWall VPNs, CitrixBleed 2 (CVE-2025-5777), Cisco SSL VPNs, and social engineering via Microsoft Teams phishing. The campaign employs multi-stage encryption, toolchain customization, and anti-analysis techniques to maintain persistence and evade detection.
Timeline
-
17.04.2026 22:10 1 articles · 1h ago
QEMU-based hidden VMs deployed by Payouts King ransomware to bypass security controls
Threat actors associated with the Payouts King ransomware operation have deployed hidden QEMU-based Alpine Linux VMs on compromised hosts to execute malicious payloads, harvest credentials, and conduct reconnaissance without detection. The first observed campaign (STAC4713) since November 2025 uses scheduled tasks and reverse SSH tunnels, while a second campaign (STAC3725) since February 2026 exploits CitrixBleed 2 to deliver QEMU via ScreenConnect before manual tool installation. Both campaigns demonstrate multi-vector initial access and sophisticated evasion techniques targeting enterprise environments.
Show sources
- Payouts King ransomware uses QEMU VMs to bypass endpoint security — www.bleepingcomputer.com — 17.04.2026 22:10
Information Snippets
-
Payouts King ransomware uses QEMU to run hidden Alpine Linux 3.22.0 VMs on compromised systems, facilitating covert operations such as credential harvesting, lateral movement, and data staging.
First reported: 17.04.2026 22:101 source, 1 articleShow sources
- Payouts King ransomware uses QEMU VMs to bypass endpoint security — www.bleepingcomputer.com — 17.04.2026 22:10
-
Threat actors associated with GOLD ENCOUNTER created a scheduled task named 'TPMProfiler' to launch QEMU VMs with SYSTEM privileges, disguising virtual disk files as databases and DLLs.
First reported: 17.04.2026 22:101 source, 1 articleShow sources
- Payouts King ransomware uses QEMU VMs to bypass endpoint security — www.bleepingcomputer.com — 17.04.2026 22:10
-
Initial access vectors include exploitation of SonicWall VPNs, CitrixBleed 2 (CVE-2025-5777) in NetScaler ADC/Gateway, exposed Cisco SSL VPNs, and social engineering via Microsoft Teams phishing to distribute QuickAssist.
First reported: 17.04.2026 22:101 source, 1 articleShow sources
- Payouts King ransomware uses QEMU VMs to bypass endpoint security — www.bleepingcomputer.com — 17.04.2026 22:10
-
Post-infection activities involve VSS shadow copy creation, SMB print command abuse to copy NTDS.dit, SAM, and SYSTEM hives, and use of tools such as AdaptixC2, Chisel, BusyBox, Rclone, Impacket, KrbRelayx, and BloodHound.py.
First reported: 17.04.2026 22:101 source, 1 articleShow sources
- Payouts King ransomware uses QEMU VMs to bypass endpoint security — www.bleepingcomputer.com — 17.04.2026 22:10
-
The ransomware employs AES-256 (CTR) with RSA-4096 for encryption, intermittent encryption for larger files, and drops ransom notes directing victims to dark web leak sites.
First reported: 17.04.2026 22:101 source, 1 articleShow sources
- Payouts King ransomware uses QEMU VMs to bypass endpoint security — www.bleepingcomputer.com — 17.04.2026 22:10
-
A second campaign, STAC3725, exploits CitrixBleed 2 to deploy a malicious 'AppMgmt' service, create a local admin user (CtxAppVCOMService), and install ScreenConnect for persistence before deploying QEMU-based VMs for further operations.
First reported: 17.04.2026 22:101 source, 1 articleShow sources
- Payouts King ransomware uses QEMU VMs to bypass endpoint security — www.bleepingcomputer.com — 17.04.2026 22:10