Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

China-Linked Webworm APT Evolves Tactics, Expands to European Targets

May 20, 2026

New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots

May 20, 2026

Verizon DBIR: Vulnerability Exploits Overtake Credentials

May 20, 2026
Facebook X (Twitter) Instagram
Wednesday, May 20
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»China-Linked Webworm APT Evolves Tactics, Expands to European Targets
News

China-Linked Webworm APT Evolves Tactics, Expands to European Targets

Team-CWDBy Team-CWDMay 20, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


The China-aligned advanced persistent threat (APT) group Webworm has expanded its victim list beyond Asia, shifting focus to European governmental organizations as it evolves its tactics.

Analysis of Webworm activity in 2025 by ESET researchers found it targeting government organizations in Belgium, Italy, Poland, Serbia and Spain. The group is known for its cyber espionage campaigns.

Speaking during ESET World in Berlin on 19 May, Robert Lipovsky, principal threat researcher at ESET, said that there was not necessarily a correlation among the victim organizations and the operation seemed to be “semi-opportunistic”.

Alongside the European ventures, Webworm made a foray into South Africa, compromising a local university.

While the exact entry point for Webworm campaigns in not 100% clear, Lipovsky noted that in the case of the Serbian victim organization, a vulnerability in the now discontinued SquirrelMail webmail service was identified as a likely way for the attacker to gain initial access.

Two New Backdoors Added to Webworm Campaign

The group has deployed two new backdoors including the Discord-based EchoCreep and the Microsoft Graph-based GraphWorm.

The EchoCreep backdoor uses Discord to upload files, send runtime reports and receive commands.

Lipovsky said it is not the first time Discord has been identified as being used as a backdoor, but it is certainly not very common.

GraphWorm uses Microsoft Graph application programmable interface (API) for command-and-control (C2) communication. ESET researchers also discovered that it uses OneDrive endpoints exclusively, specifically to get new jobs and to upload victim information.

During the investigation, the team decrypted over 400 Discord messages and discovered an attacker-operated server used for reconnaissance against more than 50 unique targets.

The information from the decrypted messages led researchers to the attackers’ GitHub repository, which contained staged artifacts such as the SoftEther VPN application.

Inside the SoftEther configuration file, ESET said it found an IP address that matches a known Webworm IP.

The attackers also continued to use proxy solutions, some of which were newly added custom proxy solutions in WormFrp, ChainWorm, SmuxProxy and WormSocket.

Based on the number of proxy tools and their complexities, Webworm may be creating a much larger hidden network by tricking victims into running its proxies, ESET noted.

The ChainWorm element is specifically used to extend the network of proxies available to Webworm.

Finally, WormFrp has been used to retrieve configurations from a compromised Amazon Web Services (AWS) S3 bucket. Through the S3 bucket, Webworm has been able to leverage data exfiltration and the victim user pays for the service.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNew TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots
Team-CWD
  • Website

Related Posts

News

New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots

May 20, 2026
News

Researchers Warn CypherLoc Scareware Has Targeted Millions of Users

May 20, 2026
News

Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages

May 20, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

Can password managers get hacked? Here’s what to know

November 14, 2025

Managing risks to your loved one’s digital estate

April 2, 2026

Here’s what you should know

February 6, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.