Shadowbunny article published in the PenTest Magazine
infonews
security
Source: Embrace The RedJune 18, 2020
Summary
The Shadowbunny technique uses virtual machines (VMs, software that emulates a complete computer within another computer) during lateral movement (spreading from one compromised system to others) to hide attackers' presence and avoid security detection tools. Real-world attackers, including those behind Ragnar Locker Ransomware (malicious software that encrypts files for extortion), have already employed this method, making it important for security professionals to understand how to detect it.
Classification
Attack SophisticationModerate
Original source: https://embracethered.com/blog/posts/2020/shadowbunny-ttp-pentest-magazine/
First tracked: February 12, 2026 at 02:20 PM
Classified by LLM (prompt v3) · confidence: 95%