Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Alleged Chinese State Hacker Extradited to US

0
Medium
Vulnerability
Published: Tue Apr 28 2026 (04/28/2026, 13:36:12 UTC)
Source: SecurityWeek

Description

Xu Zewei, a Chinese national and alleged member of the state-sponsored APT group Silk Typhoon, was extradited from Italy to the US. He is accused of conducting cyberattacks on behalf of China's Ministry of State Security and Shanghai State Security Bureau, targeting US universities and researchers, particularly those involved in COVID-19 research. The attacks included exploiting Microsoft Exchange Server zero-day vulnerabilities to deploy web shells and exfiltrate sensitive information. Xu faces multiple charges including wire fraud, computer hacking, and identity theft. The FBI conducted operations to remove web shells from affected US systems. Another suspect remains at large.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/28/2026, 13:36:32 UTC

Technical Analysis

Xu Zewei, affiliated with the Chinese state-sponsored APT group Silk Typhoon (also known as Hafnium and Murky Panda), allegedly participated in cyberattacks targeting US universities and COVID-19 researchers between 2020 and 2021. These attacks involved exploiting zero-day vulnerabilities in Microsoft Exchange Server to gain remote access via web shells and exfiltrate sensitive data. Xu reportedly worked under direction from China's Ministry of State Security and Shanghai State Security Bureau while employed by Shanghai Powerock Network. The FBI intervened in 2021 to remove web shells from hundreds of compromised systems. Xu faces multiple federal charges in the US and has been extradited from Italy. Another individual named in the indictment remains at large.

Potential Impact

The cyberattacks led to unauthorized access and data exfiltration from US universities and research institutions, particularly targeting COVID-19 related research. The exploitation of Microsoft Exchange Server zero-day vulnerabilities allowed attackers to deploy persistent web shells, enabling long-term remote access to compromised systems. This represents a significant breach of sensitive academic and research data, potentially impacting national security and intellectual property. The FBI's subsequent cleanup operation indicates the widespread nature of the compromise. Legal actions against Xu Zewei demonstrate US efforts to hold state-sponsored actors accountable.

Mitigation Recommendations

There is no direct patch or remediation related to this threat actor's actions, as this is a law enforcement and attribution event rather than a software vulnerability. However, the FBI conducted a court-authorized operation to remove web shells from affected systems in 2021. Organizations should ensure Microsoft Exchange Server vulnerabilities are patched promptly and monitor for indicators of compromise related to web shells. Since this involves exploitation of known zero-day vulnerabilities that have since been addressed, applying official Microsoft security updates and following vendor guidance is critical. No additional mitigation is required specifically for this extradition event.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://www.securityweek.com/alleged-chinese-state-hacker-extradited-to-us/","fetched":true,"fetchedAt":"2026-04-28T13:36:22.494Z","wordCount":969}

Threat ID: 69f0b7d6cbff5d86101429f8

Added to database: 4/28/2026, 1:36:22 PM

Last enriched: 4/28/2026, 1:36:32 PM

Last updated: 4/29/2026, 5:14:18 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses