{"id":257,"date":"2024-03-08T09:12:26","date_gmt":"2024-03-08T09:12:26","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/03\/08\/qemu-emulator-exploited-as-tunneling-tool-to-breach-company-network\/"},"modified":"2024-03-08T09:12:26","modified_gmt":"2024-03-08T09:12:26","slug":"qemu-emulator-exploited-as-tunneling-tool-to-breach-company-network","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/03\/08\/qemu-emulator-exploited-as-tunneling-tool-to-breach-company-network\/","title":{"rendered":"QEMU Emulator Exploited as Tunneling Tool to Breach Company Network"},"content":{"rendered":"<p>\u200bThreat actors have been observed leveraging the\u00a0QEMU\u00a0open-source hardware emulator as tunneling software during a cyber attack targeting an unnamed &#8220;large company&#8221; to connect to their infrastructure.<br \/>\nWhile a number of legitimate tunneling tools like Chisel, FRP, ligolo, ngrok, and Plink have been used by adversaries to their advantage, the development marks the first QEMU that has been\u00a0Threat actors have been observed leveraging the\u00a0QEMU\u00a0open-source hardware emulator as tunneling software during a cyber attack targeting an unnamed &#8220;large company&#8221; to connect to their infrastructure.<br \/>\nWhile a number of legitimate tunneling tools like Chisel, FRP, ligolo, ngrok, and Plink have been used by adversaries to their advantage, the development marks the first QEMU that has been\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bThreat actors have been observed leveraging the\u00a0QEMU\u00a0open-source hardware emulator as tunneling software during a cyber attack targeting an unnamed &#8220;large company&#8221; to connect to their infrastructure. While a number of legitimate tunneling tools like Chisel, FRP, ligolo, ngrok, and Plink have been used by adversaries to their advantage, the development marks the first QEMU that&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/03\/08\/qemu-emulator-exploited-as-tunneling-tool-to-breach-company-network\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">QEMU Emulator Exploited as Tunneling Tool to Breach Company Network<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":258,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/257"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=257"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/257\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/258"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=257"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}