TI Mindmap HUB
Threat Intelligence Report

TrustedSec | Hiding in the Shadows: Covert Tunnels via QEMU…

📅 July 21, 2025 📰 trustedsec.com 🔍 0 CVE(s) referenced

Attackers leveraged social engineering and remote access tools to deploy QEMU-based virtual machines on a corporate endpoint, using them to establish covert SSH tunnels and evade host-based security controls.

vendor

Sign in to access the full report including:
detailed analysis, IOCs, MITRE ATT&CK mapping, and STIX bundle.

🔐 Sign In to Read Full Report

You'll need to accept our Terms of Service to access the platform.

📊 Visual Mindmap
🎯 IOC Extraction
⚔️ MITRE ATT&CK TTPs
📦 STIX 2.1 Bundle