{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreifxnsjbkkvbkxj7pcaquezutjdke4t3l5jg4soos5encidx7lzew4",
    "uri": "at://did:plc:ctcqaqa3tlbhfwmfefti346h/app.bsky.feed.post/3mjxqmvzanhr2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreifb34nij5op2y5nmmfob6ex2u7lpdfhvlnnvknnk6ctmtn57tngwy"
    },
    "mimeType": "image/png",
    "size": 1254317
  },
  "path": "/pro/essentially-invisible-how-hackers-trojan-horsed-qemu-virtual-machines-to-bypass-security-and-drop-ransomware",
  "publishedAt": "2026-04-20T22:40:00.000Z",
  "site": "https://www.techradar.com",
  "tags": [
    "Pro",
    "Cyber Security",
    "Computing",
    "Computing Security"
  ],
  "textContent": "Hackers hide ransomware tools inside virtual machines using QEMU, allowing attacks to bypass security controls and remain largely invisible.",
  "title": "“Essentially invisible:” How hackers 'trojan-horsed' QEMU virtual machines to bypass security and drop ransomware"
}