Blog Post
- TillyCorlessCommunity Manager
God speed BenMcCarthy - BOOM!
On November 4, 2024, Securonix published research and identified a novel attack chain where attackers deploy a custom Linux machine using the QEMU emulation service to persist on endpoints, allowing them to run commands and deliver malware.
Why have we created this content?
Given that this technique is quite new and novel, this content was created to educate users on how legitimate tooling, like virtual environments, can be abused by attackers. When the user is tricked into opening a .lnk file, the virtual machine starts and mounts to the host, giving backdoor access to an endpoint that almost acts as a proxy.
What are we publishing?
All customers on a CyberPro License have immediate access to a new lab.
Who is this content for?
This lab is focused on upskilling and increasing the defensive capabilities of the following roles:
Learn from our passionate experts on a wide range of subjects from Cyber Threat Research to maximizing value with Immersive Labs, plus, hear from our outstanding customers who are keen to share their experiences.
God speed BenMcCarthy - BOOM!