Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

The Rise of Stealthy Malware Campaigns: How Hackers Are Leveraging QEMU and Exploiting Vulnerabilities to Steal Data and Launch DDoS Attacks



The rise of stealthy malware campaigns using QEMU and exploiting vulnerabilities has emerged as a significant threat in recent months. This article provides an in-depth look at the tactics used by hackers and the measures being taken by security experts to mitigate their impact. Learn more about the latest malware threats and how to stay safe online.

  • Stealthy malware campaigns leveraging QEMU have emerged, exploiting vulnerabilities in popular software to steal data and launch DDoS attacks.
  • The rise of QEMU-powered malware has enabled attackers to create stealthy malware that can evade traditional security measures.
  • The "Hidden VMs" campaign utilizes QEMU to steal data from infected systems, while the "Mirax" variant exploits vulnerabilities in TBK DVR systems for DDoS attacks.
  • Three zero-day vulnerabilities have been discovered in Microsoft Defender, allowing hackers to gain elevated access to systems.
  • A recent campaign has targeted WordPress plugins, planting backdoors that can be exploited by attackers to gain unauthorized access to infected websites.



  • In recent months, a new wave of stealthy malware campaigns has emerged, leveraging cutting-edge technologies like QEMU and exploiting vulnerabilities in popular software to steal data, launch devastating Distributed Denial-of-Service (DDoS) attacks, and gain elevated access to systems. This article will delve into the details of these emerging threats, highlighting the tactics used by hackers to evade detection and the measures being taken by security experts to mitigate their impact.

    The rise of QEMU-powered malware campaigns has been a significant development in the world of cyber threats. QEMU, an open-source emulator that allows users to run various operating systems on a single machine, has become a popular tool for hackers. By leveraging QEMU, attackers can create stealthy malware that can evade traditional security measures and remain undetected for extended periods.

    One notable example of this is the "Hidden VMs" campaign, which was recently discovered by cybersecurity experts. This campaign utilizes QEMU to create virtual machines (VMs) that are designed to steal data from infected systems. The attackers use a combination of social engineering and phishing tactics to trick users into installing malware-laden software, which then infects their systems. Once infected, the malware creates a new VM using QEMU, allowing it to remain undetected while it steals sensitive data.

    Another notable example is the "Mirax" variant of the Mirai botnet, which has been linked to a series of DDoS attacks against major infrastructure targets. This variant exploits a vulnerability in the TBK DVR system, allowing it to launch devastating DDoS attacks that can cripple entire networks. The attackers have also been using QEMU to create stealthy malware that can spread across infected devices and turn them into potential residential proxy nodes.

    In addition to these campaigns, three zero-day vulnerabilities have been discovered in Microsoft Defender, a widely used antivirus software. Two of the vulnerabilities, which remain unpatched, enable hackers to gain elevated access to systems, allowing them to steal sensitive data and launch devastating attacks. The third vulnerability is still being investigated by security experts.

    Furthermore, a recent campaign has targeted WordPress plugins, planting backdoors in over 30 popular plugins that can be exploited by attackers to gain unauthorized access to infected websites. This highlights the importance of keeping software up-to-date and using reputable plugins.

    In conclusion, the rise of stealthy malware campaigns leveraging QEMU and exploiting vulnerabilities in popular software is a growing concern for security experts. As hackers continue to evolve their tactics, it is essential for organizations to stay vigilant and take proactive measures to protect themselves against these emerging threats.


    The rise of stealthy malware campaigns using QEMU and exploiting vulnerabilities has emerged as a significant threat in recent months. This article provides an in-depth look at the tactics used by hackers and the measures being taken by security experts to mitigate their impact. Learn more about the latest malware threats and how to stay safe online.




    Related Information:
  • https://www.ethicalhackingnews.com/articles/The-Rise-of-Stealthy-Malware-Campaigns-How-Hackers-Are-Leveraging-QEMU-and-Exploiting-Vulnerabilities-to-Steal-Data-and-Launch-DDoS-Attacks-ehn.shtml

  • https://securityaffairs.com/191001/security/security-affairs-malware-newsletter-round-93.html

  • https://www.linkedin.com/pulse/security-affairs-malware-newsletter-round-93-pierluigi-paganini-ynptf/

  • https://securityaffairs.com/


  • Published: Sun Apr 19 09:56:50 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us