Payouts King Ransomware Uses QEMU VMs to Bypass Endpoint Security

What Happened

Sophos researchers documented a threat actor deploying QEMU virtual machines on compromised Windows hosts as part of the Payouts King ransomware operation. The attack chain uses QEMU to run a hidden Alpine Linux VM that executes attacker tooling — completely invisible to host-based endpoint security. The campaigns, tracked as STAC4713 and STAC3725, also exploit CitrixBleed 2 (CVE-2025-5777) and SolarWinds Web Help Desk (CVE-2025-26399) for initial access. Payouts King is suspected to have origins in former BlackBasta affiliates.

Why It Matters

This is not theoretical. Running malware inside a VM means your EDR, antivirus, and host logging all blind spot the payload entirely. The VM traffic looks like legitimate QEMU process activity. The exfiltration traffic looks like standard SSH. Traditional controls were not designed to detect tooling running inside an emulated guest OS, and most SIEM playbooks do not account for it. This is a material gap in defensive architecture.

What Defenders Should Do

Audit for QEMU installations on endpoints — particularly on servers and VPN gateways. Check for scheduled tasks running as SYSTEM with names like "TPMProfiler". Review outbound SSH connections from servers, especially on non-standard ports. Monitor for ADNotificationManager.exe being used for DLL sideloading, a technique observed in these campaigns. For NetScaler environments, ensure CVE-2025-5777 is patched. For SonicWall VPNs, verify firmware is current and the management interface is not internet-facing.

What It Signals

The bar for bypassing endpoint security has dropped to commodity tooling. QEMU is open source, well-documented, and the techniques are not new — 3AM ransomware used this before, and LoudMiner before that. The pattern is clear: adversaries will continue abusing virtualization to operate under the radar. Defense-in-depth is not optional here. If your monitoring stack cannot see inside VMs, assume the adversary can use them with impunity.

References

Sophos: QEMU Abused to Evade Detection and Enable Ransomware Delivery

Zscaler: Payouts King Takes Aim at Ransomware Throne

BleepingComputer: Payouts King Ransomware Uses QEMU VMs

CISA: Apache ActiveMQ (Related Context)

Read more