Executive Summary
In April 2026, the Payouts King ransomware group employed QEMU virtual machines (VMs) to evade endpoint security measures. By deploying hidden Alpine Linux VMs on compromised systems, they executed malicious payloads and established covert SSH tunnels, effectively bypassing host-based defenses. Initial access was gained through exposed SonicWall VPNs and exploitation of the SolarWinds Web Help Desk vulnerability (CVE-2025-26399). The attackers utilized tools like AdaptixC2, Chisel, BusyBox, and Rclone within the VMs to facilitate their operations.
This incident underscores a growing trend where threat actors leverage virtualization technologies to circumvent traditional security controls. The use of QEMU VMs for stealthy operations highlights the need for enhanced monitoring and security measures that can detect and mitigate such sophisticated attack vectors.
Why This Matters Now
The Payouts King ransomware's use of QEMU VMs to bypass endpoint security reflects an evolving threat landscape where attackers exploit virtualization to evade detection. Organizations must adapt their security strategies to address these advanced techniques, emphasizing the importance of monitoring virtualized environments and implementing robust access controls.
Attack Path Analysis
The Payouts King ransomware group initiated attacks by exploiting vulnerabilities in exposed VPNs and conducting phishing campaigns to gain initial access. Once inside, they escalated privileges by harvesting domain credentials and creating new administrative accounts. They then moved laterally within the network, deploying QEMU virtual machines to evade detection. For command and control, they established covert SSH tunnels through these VMs. Data exfiltration was achieved using tools like Rclone to transfer sensitive information to external servers. Finally, they encrypted critical files using robust encryption algorithms and demanded ransom payments.
Kill Chain Progression
Initial Compromise
Description
The attackers gained initial access by exploiting vulnerabilities in exposed VPNs and conducting phishing campaigns.
Related CVEs
CVE-2025-5777
CVSS 7.5An out-of-bounds read vulnerability in Citrix NetScaler ADC and Gateway allows unauthenticated attackers to extract sensitive information from memory, potentially leading to session hijacking and bypassing multi-factor authentication.
Affected Products:
Citrix NetScaler ADC – 14.1 before 14.1-43.56, 13.1 before 13.1-58.32, 13.1-FIPS and NDcPP before 13.1-37.235-FIPS and NDcPP, 12.1-FIPS before 12.1-55.328-FIPS
Citrix NetScaler Gateway – 14.1 before 14.1-43.56, 13.1 before 13.1-58.32, 13.1-FIPS and NDcPP before 13.1-37.235-FIPS and NDcPP, 12.1-FIPS before 12.1-55.328-FIPS
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Hardware Additions
Valid Accounts
Virtualization/Sandbox Evasion
Obfuscated Files or Information
Data Encrypted for Impact
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Malicious Software Prevention
Control ID: 6.4.3
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 5
CISA ZTMM 2.0 – Network and Environment Segmentation
Control ID: Pillar 3
NIS2 Directive – Security Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Information Technology/IT
Payouts King ransomware exploiting QEMU virtualization bypasses endpoint security, threatening IT infrastructure through lateral movement and compromised remote access tools.
Health Care / Life Sciences
HIPAA-regulated healthcare systems face critical exposure to QEMU-based attacks targeting east-west traffic and encrypted data, compromising patient information security.
Financial Services
Banking infrastructure vulnerable to zero trust segmentation bypass and egress security failures, with PCI compliance violations from credential harvesting attacks.
Government Administration
Government networks compromised via VPN exploits and Teams phishing face severe data exfiltration risks requiring enhanced multicloud visibility controls.
Sources
- Payouts King ransomware uses QEMU VMs to bypass endpoint securityhttps://www.bleepingcomputer.com/news/security/payouts-king-ransomware-uses-qemu-vms-to-bypass-endpoint-security/Verified
- QEMU abused to evade detection and enable ransomware deliveryhttps://www.sophos.com/en-us/blog/qemu-abused-to-evade-detection-and-enable-ransomware-deliveryVerified
- Payouts King Takes Aim at the Ransomware Thronehttps://www.zscaler.com/blogs/security-research/payouts-king-takes-aim-ransomware-throneVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it could likely limit the attacker's ability to move laterally, escalate privileges, and exfiltrate data by enforcing strict segmentation and identity-aware routing.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: While Aviatrix CNSF may not prevent initial access via phishing or VPN exploits, it could likely limit the attacker's ability to exploit these entry points to move further into the network.
Control: Zero Trust Segmentation
Mitigation: Aviatrix Zero Trust Segmentation could likely limit the attacker's ability to escalate privileges by enforcing strict access controls and minimizing the scope of accessible resources.
Control: East-West Traffic Security
Mitigation: Aviatrix East-West Traffic Security could likely limit the attacker's ability to move laterally by monitoring and controlling internal traffic between workloads.
Control: Multicloud Visibility & Control
Mitigation: Aviatrix Multicloud Visibility & Control could likely limit the attacker's ability to establish and maintain command and control channels by providing comprehensive monitoring and control over network traffic.
Control: Egress Security & Policy Enforcement
Mitigation: Aviatrix Egress Security & Policy Enforcement could likely limit the attacker's ability to exfiltrate data by controlling and monitoring outbound traffic.
While Aviatrix CNSF may not prevent the encryption of files, it could likely limit the overall impact by reducing the attacker's ability to spread ransomware across the network.
Impact at a Glance
Affected Business Functions
- Network Security Operations
- User Authentication Services
- Remote Access Infrastructure
Estimated downtime: 14 days
Estimated loss: $500,000
Potential exposure of sensitive corporate data, including user credentials and internal communications.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust Segmentation to restrict lateral movement and limit the spread of ransomware within the network.
- • Enhance East-West Traffic Security to monitor and control internal traffic, detecting unauthorized movements and communications.
- • Deploy Multicloud Visibility & Control solutions to gain comprehensive insights across cloud environments and detect anomalies.
- • Enforce Egress Security & Policy Enforcement to prevent unauthorized data exfiltration and control outbound traffic.
- • Utilize Threat Detection & Anomaly Response tools to identify and respond to suspicious activities promptly.



