CyberNews: 19/04/2026 Edition
Today’s roundup
Summary
A critical remote code execution (RCE) flaw has been identified in protobuf.js, a widely used JavaScript implementation of Google's Protocol Buffers. Proof-of-concept exploit code for this vulnerability has been publicly published, indicating an elevated risk for systems incorporating the library.
Sophos researchers have observed a rise in threat actors abusing QEMU, an open-source emulator, to deploy hidden virtual machines. This tactic enables adversaries to evade detection, establish long-term persistence, steal credentials, exfiltrate data, and ultimately deliver ransomware like PayoutsKing. The report details two campaigns: STAC4713, linked to the GOLD ENCOUNTER group and PayoutsKing ransomware, which exploited exposed SonicWall VPNs and a SolarWinds Web Help Desk vulnerability (CVE-2025-26399). The STAC3725 campaign gained initial access by exploiting the CitrixBleed2 flaw, subsequently using QEMU VMs for reconnaissance and credential theft. These methods allow attackers to conceal their toolkit and operations, making detection and forensic analysis significantly more challenging.
Want to dig deeper?
Vulnerabilities
| CVE-2025-26399 | Critical |