سامي
سامي الغامدي
مستشار Fyntralink · متاح الآن
مدعوم بالذكاء الاصطناعي · Fyntralink

Payouts King Ransomware Hides Inside QEMU Virtual Machines to Evade Your EDR — A Critical Alert for Saudi Financial Institutions

A ransomware group tracked as STAC4713 is using QEMU — a legitimate open-source emulator — to spin up hidden Linux VMs inside Windows hosts, tunneling out over SSH while your endpoint security sees nothing. Saudi financial institutions are a high-value target.

F
FyntraLink Team

A ransomware operation known as Payouts King — tracked by Sophos under the campaign identifier STAC4713 — has been using QEMU, a widely trusted open-source CPU emulator, to deploy hidden Linux virtual machines inside compromised Windows hosts. Once running, the VM acts as a covert reverse SSH tunnel that your endpoint detection and response (EDR) platform cannot inspect. For Saudi financial institutions operating under SAMA CSCC and NCA ECC obligations, this attack pattern represents a direct challenge to your assumed security controls.

What QEMU Is — and Why Attackers Love It

QEMU (Quick Emulator) is a legitimate, widely used virtualization tool. It allows an operating system to run entirely inside another operating system as a virtual machine. Security teams, developers, and IT administrators use it daily — which is exactly why threat actors choose it. Because QEMU is a known-good binary, most endpoint security solutions allowlist or ignore it. When an attacker installs QEMU on a compromised Windows server, they can spin up a full Alpine Linux VM, configure a reverse SSH tunnel back to their command-and-control (C2) server, and operate inside the network with near-complete invisibility. The host EDR sees only legitimate QEMU process activity; it cannot reach inside the VM to inspect what is happening.

How the STAC4713 Campaign Operates

Sophos first observed this campaign in November 2025. The group gained initial access primarily through exposed SonicWall VPN appliances without multi-factor authentication — a persistent weakness across many enterprise environments in the region. In at least one confirmed January 2026 incident, attackers exploited CVE-2025-26399, a vulnerability in SolarWinds Web Help Desk, to gain a foothold before pivoting deeper into the network. By early 2026, the campaign evolved: rather than relying solely on vulnerable VPN appliances, attackers began pairing technical exploitation with social engineering. Employees received phishing emails followed by fake IT support calls via Microsoft Teams, convincing them to install legitimate remote management tools — QuickAssist or AnyDesk — which the attackers then used to drop the QEMU payload. Once QEMU is installed and the VM is running, the attackers conduct reconnaissance, move laterally using stolen credentials, and finally deploy the Payouts King ransomware payload across the environment.

Why Saudi Financial Institutions Are a Prime Target

SAMA-regulated financial institutions present an attractive profile for this group for several converging reasons. First, many banks and insurance companies in the Kingdom still run hybrid environments mixing Windows Server, SolarWinds monitoring tools, and legacy VPN appliances — the exact attack surface STAC4713 exploits. Second, the 56% figure is telling: between January and March 2026, over half of all confirmed regional incidents involved brute-force authentication attempts against SonicWall and FortiGate devices, with approximately 88% of those originating from threat actors focused on the Middle East. Third, ransomware groups increasingly see financial institutions as willing to pay because downtime directly violates SAMA's Business Continuity Management requirements. A 48-hour outage at a retail bank triggers regulatory scrutiny, customer compensation obligations, and potential sanctions under PDPL if customer data is encrypted or exfiltrated.

The Compliance Dimension: SAMA CSCC and NCA ECC Controls Being Bypassed

This attack technique directly undermines controls that financial institutions believe they have covered. SAMA CSCC Domain 4 (Cybersecurity Operations) requires continuous monitoring and threat detection — yet standard EDR deployment fails here because the malicious activity executes inside a VM the EDR cannot inspect. NCA ECC Control 2-4-2 mandates that organizations detect and respond to malicious code, but signature-based detection of QEMU offers no protection when the tool itself is legitimate. PDPL Article 21 requires organizations to implement technical and organisational measures adequate to the risk — a posture that clearly must now account for hypervisor-layer threats. Any SAMA CSCC maturity assessment that does not include network-layer traffic analysis and hypervisor monitoring will produce a score that overestimates actual protection.

Practical Recommendations for Security and Compliance Teams

  1. Audit for QEMU and similar hypervisors immediately. Run a software inventory query for QEMU, VirtualBox, VMware Workstation, and Hyper-V on all servers. Any installation not formally approved and documented should be treated as an incident indicator.
  2. Enforce MFA on every VPN endpoint without exception. The primary initial access vector for STAC4713 is an MFA-less SonicWall or FortiGate. SAMA CSCC Domain 2 (Identity and Access Management) explicitly requires strong authentication for remote access — enforce it at the network layer, not just policy.
  3. Deploy network traffic analysis (NTA) tools at the perimeter and internally. Because EDR cannot see inside QEMU VMs, the covert SSH tunnel must be caught at the network layer. Tools like Darktrace, Vectra AI, or open-source solutions such as Zeek can detect anomalous SSH traffic patterns that indicate reverse tunneling activity.
  4. Block or restrict the installation of virtualization software via application control policies. Use Windows Defender Application Control (WDAC) or AppLocker to restrict which executables can run on servers. QEMU should require explicit approval and justification.
  5. Patch CVE-2025-26399 in SolarWinds Web Help Desk. If your organization uses this tool, verify the patch status immediately. This vulnerability has confirmed exploitation in the wild by this group.
  6. Train staff to recognise fake IT support via Teams. The shift to social engineering in 2026 means your security awareness training must include scenarios involving Microsoft Teams impersonation and unsolicited remote support requests. SAMA CSCC Domain 3 (Human Cybersecurity) requires documented awareness programs — include this scenario in your next tabletop exercise.
  7. Review your incident response playbooks for ransomware. Ensure your runbooks account for the scenario where endpoint forensics are incomplete because malicious activity occurred inside a VM. Network logs and memory forensics become your primary evidence sources in this attack pattern.

Conclusion

The Payouts King ransomware campaign is a studied reminder that sophisticated threat actors treat your security controls as a checklist to work around — not a barrier to abandon their objectives. Deploying QEMU as a trojan horse for a reverse SSH tunnel is technically elegant and operationally effective precisely because it abuses the trust your security stack places in known-good software. SAMA-regulated institutions that benchmark their maturity solely against documented controls without testing those controls against real-world evasion techniques are carrying unquantified residual risk.

Is your organization prepared? Contact Fyntralink for a complimentary SAMA Cyber Maturity Assessment — including adversarial simulation scenarios that test whether your current EDR and network monitoring stack would detect a QEMU-based intrusion before ransomware is deployed.