Cyberattackers Exploit QEMU for Stealthy Network Tunneling

In recent times, malicious actors have been found using innovative techniques to infiltrate systems and networks. One such development involves abusing the QEMU open-source hardware emulator as a tunneling tool during cyber-attacks. Threat actors created virtual network interfaces and a socket-type network device using QEMU to facilitate connection to a remote server. This tactic enabled […]

The post Cyberattackers Exploit QEMU for Stealthy Network Tunneling appeared first on TuxCare.

The post Cyberattackers Exploit QEMU for Stealthy Network Tunneling appeared first on Security Boulevard.

This article has been indexed from Security Boulevard

Read the original article: