The emergence of the Payouts King ransomware syndicate represents a sophisticated shift in how modern threat actors circumvent endpoint detection and response (EDR) systems. By embedding QEMU—an open-source processor emulator and virtualization engine—deep within compromised corporate environments, these attackers are creating "blind spots" in the security stack. This technique, which involves launching covert, hidden virtual machines (VMs) to facilitate data exfiltration and persistent command-and-control (C2) communication, highlights a growing trend of "living-off-the-virtual-land" (LotVL) attacks that leverage legitimate administrative tools to hide malicious intent.
The Anatomy of the QEMU Infiltration
QEMU, traditionally utilized by developers and system administrators for cross-platform testing and virtualization, has become an unlikely accomplice in cyber-espionage. Because standard endpoint security solutions are generally designed to monitor the host operating system’s processes, registry changes, and file system modifications, they often lack the visibility to inspect the internal activity of a VM running on that host.
In the case of the Payouts King campaigns, threat actors utilize this architectural limitation to their advantage. By deploying a lightweight, stripped-down version of Alpine Linux within a QEMU instance, the attackers effectively isolate their primary command-and-control infrastructure from the host’s security sensors. Inside this virtual "black box," the actors run a suite of offensive security tools, including Rclone for high-speed data exfiltration, Chisel for proxying traffic, and various credential-harvesting frameworks. Because these tools execute within the memory space of the VM rather than the host, the host’s security agents perceive only the stable, benign-looking QEMU process, completely oblivious to the malicious traffic being tunneled through it.
Campaign STAC4713 and the GOLD ENCOUNTER Nexus
Security researchers have identified a direct link between the Payouts King operations and the threat group known as GOLD ENCOUNTER. This group has demonstrated a high degree of technical maturity, particularly in their ability to target virtualization environments. Their methodology in the STAC4713 campaign is methodical and highly structured.

The attackers often establish initial access through legacy vulnerabilities in perimeter hardware, such as exposed SonicWall VPNs or the SolarWinds Web Help Desk vulnerability (CVE-2025-26399). Once inside, the group prioritizes the establishment of persistence. They utilize a scheduled task, cleverly masked as "TPMProfiler," to launch the hidden QEMU VM with SYSTEM-level privileges. This ensures that the backdoor is not only persistent across reboots but also carries the highest possible permissions on the host system.
The "TPMProfiler" task is designed to be inconspicuous, often utilizing virtual disk files that are disguised as innocuous system databases or Dynamic Link Library (DLL) files. By setting up port forwarding between the VM and the host, the attackers maintain a persistent, encrypted reverse SSH tunnel. This allows them to bypass traditional firewall egress rules and maintain a constant, low-latency connection to their remote infrastructure, which is critical for the staging and exfiltration of sensitive organizational data.
Social Engineering and the "IT Staff" Persona
Beyond the technical exploitation of vulnerabilities, Payouts King affiliates have shown a sophisticated grasp of human psychology. In recent months, researchers have observed a tactical pivot toward social engineering. Specifically, attackers have impersonated internal IT personnel, targeting employees via Microsoft Teams. By manipulating staff into downloading and installing legitimate remote assistance tools—such as QuickAssist—the attackers gain a legitimate pathway onto the corporate network.
Once the connection is established, they exploit the trust granted to these remote sessions to sideload malicious payloads. A common tactic involves the legitimate ADNotificationManager.exe binary, which is coerced into loading a malicious Havoc C2 payload disguised as vcruntime140_1.dll. This combination of social engineering and technical abuse of signed, trusted binaries demonstrates a multi-layered attack strategy that is increasingly difficult for automated security tools to detect without behavioral baselining.

The CitrixBleed Connection: STAC3725
A second campaign, tracked as STAC3725, underscores the breadth of the Payouts King infrastructure. This operation focuses on exploiting the CitrixBleed 2 vulnerability (CVE-2025-5777) within NetScaler ADC and Gateway instances. Unlike the initial access methods used in STAC4713, this campaign targets the network edge directly.
Once the NetScaler instance is compromised, the attackers deploy a custom toolkit designed to establish a foothold. This includes the installation of a service named "AppMgmt" and the creation of a local administrative account, "CtxAppVCOMService." By deploying a ScreenConnect client, the actors gain remote management capabilities that they then use to drop and execute the QEMU package.
Notably, in these operations, the attackers do not rely on a static, pre-packaged toolkit. Instead, they demonstrate a hands-on approach, manually compiling and deploying tools like Impacket, KrbRelayx, and Metasploit directly inside the VM. This manual interaction allows them to adapt their tactics in real-time, performing deep Active Directory reconnaissance and Kerberos username enumeration without triggering the host-based detection mechanisms that would typically flag such activity if it were performed directly on the Windows host.
Industry Implications and the Future of Endpoint Defense
The abuse of QEMU by Payouts King is a harbinger of a broader trend: the weaponization of virtualization as a security evasion layer. As organizations harden their endpoints with advanced EDR and Extended Detection and Response (XDR) platforms, attackers are increasingly moving their operations into environments that fall outside the traditional scope of monitoring.

The industry impact is significant. Traditional security architectures are predicated on the assumption that an endpoint is a single, monolithic environment. The reality of modern IT, which includes heavy reliance on virtualization, containerization, and cloud-native workflows, provides attackers with a vast surface area to hide their activities. This "virtualization gap" is now a primary target for ransomware operators looking to ensure their encryption and exfiltration phases remain uninterrupted.
Looking ahead, we can expect to see:
- Increased Sophistication in Evasion: Attackers will likely move toward using kernel-level virtualization and hypervisor-based rootkits that provide even deeper isolation from host-based security sensors.
- Focus on Hypervisor Security: As more attackers realize the benefits of hiding within VMs, hypervisor-level security monitoring will become a critical component of enterprise defense. Organizations will need to invest in tools that provide visibility into the hypervisor layer, not just the guest operating systems.
- The Rise of "Identity-Centric" Defense: Given the success of social engineering and credential-based attacks, security models must shift further toward Zero Trust, where every action—regardless of whether it originates from a physical or virtual source—is authenticated, verified, and logged.
Mitigation Strategies
For organizations looking to defend against Payouts King and similar threats, a reactive approach is insufficient. Defenders must implement granular monitoring of the virtualization layer. Key mitigation strategies include:
- Audit Virtualization Software: Maintain strict control over the deployment of virtualization tools like QEMU. Any unauthorized instance of QEMU on a production host should be treated as a high-severity security incident.
- Monitor System Calls and Processes: EDR solutions should be configured to flag suspicious processes that spawn child processes associated with virtualization tools, especially when those tasks are running with SYSTEM privileges.
- Network Traffic Analysis: Because the QEMU-based tunnels rely on SSH, organizations should monitor for unusual outbound SSH traffic, particularly on non-standard ports, originating from endpoints that do not typically act as jump hosts or remote access gateways.
- Implement Strict Credential Hygiene: The frequent use of tools like Rclone and Impacket for data staging and credential harvesting underlines the importance of preventing lateral movement. Limiting local administrative privileges and utilizing robust multi-factor authentication (MFA) are essential to preventing the initial foothold that allows these campaigns to take root.
As Payouts King continues to evolve, the distinction between "host" and "guest" in enterprise security will only become more blurred. Organizations that fail to account for the visibility gaps created by virtualization will find themselves increasingly vulnerable to these sophisticated, deep-cloaking threats. The battle for the endpoint has entered the virtual machine, and the stakes for modern enterprises have never been higher.
