New burrowing techniques

Webworm is a China-aligned APT group that has evolved its tactics since first being discovered in 2022, shifting focus from Asian targets to European governmental organizations. In 2025, the group deployed two new backdoors: EchoCreep, which uses Discord for command and control, and GraphWorm, which leverages Microsoft Graph API. Researchers decrypted over 400 Discord messages revealing four victims and analyzed a compromised Amazon S3 bucket used for data exfiltration. The group stages tools in GitHub repositories and uses multiple custom proxy solutions including WormFrp, ChainWorm, SmuxProxy, and WormSocket to create hidden networks. Webworm appears to exploit web vulnerabilities using tools like nuclei and dirsearch for initial access, targeting government entities and educational institutions across Europe and South Africa.

Pulse ID: 6a0df33ecc667be61a0a9608
Pulse Link: https://otx.alienvault.com/pulse/6a0df33ecc667be61a0a9608
Pulse Author: AlienVault
Created: 2026-05-20 17:45:34

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Africa #Amazon #Asia #BackDoor #China #CyberSecurity #Discord #Education #Europe #GitHub #Government #ICS #InfoSec #Microsoft #OTX #OpenThreatExchange #Proxy #RAT #Worm #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange