Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

666+ Articles
118+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Payouts King Ransomware Uses QEMU Virtual Machines to Bypass Endpoint Security
Payouts King Ransomware Uses QEMU Virtual Machines to Bypass Endpoint Security
NEWS

Payouts King Ransomware Uses QEMU Virtual Machines to Bypass Endpoint Security

The Payouts King ransomware group is deploying the QEMU open-source emulator as a covert reverse SSH backdoor, spinning up hidden virtual machines on compromised hosts to evade endpoint detection and response tools.

Dylan H.

News Desk

April 17, 2026
5 min read

Overview

A ransomware threat actor tracked as Payouts King has adopted a novel evasion technique: using the legitimate open-source QEMU emulator to deploy hidden virtual machines on compromised systems and establish reverse SSH backdoors that operate outside the visibility of endpoint detection and response (EDR) tools.

The technique — previously documented in isolated incidents — represents a significant escalation in ransomware evasion sophistication. By embedding a functional QEMU VM within the target environment, Payouts King creates a covert communication channel that bypasses host-based security controls without requiring any kernel-level exploits or driver manipulation.

The QEMU Virtualization Evasion Technique

QEMU is a widely used, legitimate open-source machine emulator and virtualizer. Because it is a signed, trusted binary used in development and testing environments, many EDR solutions and allowlisting tools do not flag its execution.

Payouts King's method works as follows:

Evasion Chain:
1. Attacker gains initial access via phishing or vulnerability exploitation
2. QEMU binary is dropped to disk alongside a minimal VM disk image
3. QEMU is launched with a stripped-down Linux guest OS
4. The guest OS establishes an outbound reverse SSH tunnel to attacker C2
5. All C2 traffic flows through the SSH tunnel — invisible to host EDR
6. Ransomware payload is staged inside or alongside the VM
7. Encryption operations launched once lateral movement is complete

The guest VM runs entirely in user space on the compromised host, meaning no kernel driver installation or hypervisor privileges are required. The QEMU process appears in process listings as a legitimate system binary, making behavioral detection difficult.

Why QEMU Defeats Traditional EDR

Traditional endpoint detection approaches that Payouts King's QEMU technique evades include:

EDR CapabilityWhy It Fails
Process monitoringQEMU is a signed, trusted binary — not flagged
Network traffic inspectionC2 traffic is tunneled over SSH inside QEMU's network stack
File system monitoringVM disk image resembles a legitimate development artifact
Kernel driver detectionQEMU runs entirely in user space — no kernel hooks needed
Behavioral analysisRansomware runs inside the VM, not directly on the host

Payouts King Profile

Payouts King is an emerging ransomware-as-a-service (RaaS) operation first observed in early 2026. The group:

  • Targets mid-market enterprises in financial services, healthcare, and logistics
  • Demands ransoms in the range of $250,000–$2.5M depending on victim revenue
  • Operates a data leak site threatening double extortion
  • Uses QEMU-based VMs as a C2 mechanism — a technique distinguishing them from larger, more conventional RaaS groups

The QEMU technique is not entirely new — researchers previously documented similar approaches by other threat actors — but its adoption by a ransomware group represents a commoditization of the evasion method.

Detection Strategies

Despite the evasion sophistication, defenders have several detection opportunities:

Process-Based Detection

# Look for QEMU processes with unusual arguments (no legitimate user/admin should run QEMU with network forwarding)
ps aux | grep qemu
# Flag: -net user,hostfwd or -nic user configurations suggesting tunneling
# Flag: QEMU launched from non-standard paths (temp dirs, AppData, user home)

Network-Based Detection

# Monitor for outbound SSH connections from unexpected processes
# QEMU VM guest SSH traffic exits via the QEMU process — look for:
# - Persistent outbound TCP 22 connections from QEMU processes
# - High-volume, long-duration SSH sessions from workstations
# - SSH connections to unusual or non-whitelisted external hosts

File System Indicators

Look for QEMU-related artifacts in unusual locations:

  • QEMU binary dropped to %TEMP%, %APPDATA%, or user home directories
  • .qcow2, .img, or .raw disk image files in non-virtualization directories
  • QEMU configuration files (.conf, .sh wrappers) in temp directories

EDR Rule Recommendations

# Sigma-style detection rule concept:
title: QEMU Execution with Network Forwarding Outside Virtualization Context
condition:
  process_name: qemu-system-*.exe OR qemu-system-x86_64
  commandline_contains: "-net user" OR "hostfwd" OR "-nic user"
  parent_process_not_in: [hypervisor_management_software_list]
  path_not_in: [C:\Program Files\QEMU, /usr/bin, /usr/local/bin]

Recommendations

  1. Alert on QEMU execution outside approved software paths — any QEMU process running from temp directories or user profiles is suspicious
  2. Enforce application allowlisting — block QEMU from executing on workstations and servers where virtualization software is not authorized
  3. Monitor outbound SSH from unexpected processes — workstations should not be establishing outbound SSH connections
  4. Deploy network-layer controls — block outbound TCP 22 from workstations at the firewall unless explicitly required
  5. Hunt for QEMU disk images — proactively search file systems for .qcow2 or .img files in non-standard locations
  6. Implement privileged access workstations (PAW) — restrict what software can execute on admin systems to reduce post-exploitation options
  7. Review lateral movement paths — Payouts King relies on lateral movement before deploying encryption; strong segmentation limits blast radius

References

  • BleepingComputer: Payouts King Ransomware Uses QEMU VMs
  • MITRE ATT&CK T1564.006: Hide Artifacts — Run Virtual Instance
  • QEMU Official Documentation
#Ransomware#QEMU#EDR Bypass#Virtualization#Endpoint Security#Cybercrime

Related Articles

Dutch Hospitals Disrupted After Ransomware Hits Healthcare IT Provider ChipSoft

A ransomware attack on Dutch healthcare software vendor ChipSoft has forced hospitals and patients across the Netherlands offline, disrupting the HiX...

4 min read

Healthcare IT Solutions Provider ChipSoft Hit by Ransomware Attack

Dutch healthcare software vendor ChipSoft has been struck by a ransomware attack, forcing the company to take its website and digital patient services...

3 min read

Healthcare IT Provider ChipSoft Hit by Ransomware, Services Taken Offline

Dutch healthcare software vendor ChipSoft has been struck by a ransomware attack, forcing the company to take its website and digital patient services...

4 min read
Back to all News