Beyond the bomb: When adversaries bring their own virtual machine for persistence
redcanary.com·16h
🎫Kerberos Exploitation
Preview
Report Post

Adversaries are constantly seeking new and unconventional methods to achieve their objectives. Earlier in 2025, Red Canary Intelligence uncovered an interesting tactic; following a noisy spam bombing campaign, an adversary introduced their own virtual machine (VM) into a compromised environment and established persistence.

While the email bombing activity initially drew comparison to behavior we’ve seen leading to Black Basta ransomware infections, it later became clear that the threat actor had a specific set of tooling, specifically the deployment of a custom QEMU VM, which diverged from typical Black Basta tactics.

This…

Similar Posts

Loading similar posts...