{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreifxnsjbkkvbkxj7pcaquezutjdke4t3l5jg4soos5encidx7lzew4",
"uri": "at://did:plc:ctcqaqa3tlbhfwmfefti346h/app.bsky.feed.post/3mjxqmvzanhr2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreifb34nij5op2y5nmmfob6ex2u7lpdfhvlnnvknnk6ctmtn57tngwy"
},
"mimeType": "image/png",
"size": 1254317
},
"path": "/pro/essentially-invisible-how-hackers-trojan-horsed-qemu-virtual-machines-to-bypass-security-and-drop-ransomware",
"publishedAt": "2026-04-20T22:40:00.000Z",
"site": "https://www.techradar.com",
"tags": [
"Pro",
"Cyber Security",
"Computing",
"Computing Security"
],
"textContent": "Hackers hide ransomware tools inside virtual machines using QEMU, allowing attacks to bypass security controls and remain largely invisible.",
"title": "“Essentially invisible:” How hackers 'trojan-horsed' QEMU virtual machines to bypass security and drop ransomware"
}