Hackers Abuse QEMU for Defense Evasion

Summary

Threat actors are reportedly abusing QEMU, a machine emulator, to evade defenses in at least two distinct campaigns. This abuse has been observed in conjunction with the distribution of both ransomware and remote access tools.

IFF Assessment

FOE

The article describes how attackers are exploiting a legitimate tool (QEMU) for malicious purposes, indicating a new technique that defenders must contend with.

Defender Context

This development highlights the need for security teams to monitor for unusual or unauthorized use of virtualization and emulation software like QEMU within their environments. Defenders should also focus on improving their ability to detect process injection, suspicious fileless activity, and lateral movement patterns, as these could be indicators of QEMU abuse.

Read Full Story →