chinese hacker apprehended abroad

Italian authorities arrested Xu Zewei, a 33-year-old Chinese national wanted by the United States for orchestrating cyberattacks against American COVID-19 research institutions, in Milan on July 3, 2025, following a coordinated operation with FBI agents. The arrest fulfills a U.S. extradition request as Xu faces a nine-count federal indictment in the Southern District of Texas, as his co-defendant Zhang Yu, 44, remains at large.

The charges stem from cyberattacks conducted between February 2020 and June 2021, during which Xu allegedly targeted universities and researchers developing COVID-19 vaccines, treatments, and testing protocols. Prosecutors accuse Xu of exploiting Microsoft Exchange Server vulnerabilities while working as part of the state-sponsored HAFNIUM group, also known as Silk Typhoon, which operated under direction from China’s Ministry of State Security, particularly the Shanghai State Security Bureau.

State-sponsored hackers systematically targeted critical COVID-19 research during the pandemic’s most vulnerable period, exploiting server vulnerabilities to steal vital medical innovations.

The hacking campaign utilized sophisticated techniques, including deploying “webshells” to maintain persistent remote access to compromised systems. Victims included U.S.-based universities in Texas and North Carolina, immunologists, virologists, and an international law firm with Washington, D.C. offices. The attacks coincided with vital phases of pandemic research, targeting institutions developing life-saving medical innovations. Following successful breaches, hackers copied gigabits of sensitive COVID-19 research data and transferred it directly to China for state-sponsored intelligence purposes.

Xu faces potential penalties of up to 20 years in prison on wire fraud and conspiracy charges, with the nine-count indictment encompassing computer fraud and conspiracy violations. The charges include aggravated identity theft alongside wire fraud and unauthorized computer access violations. U.S. Attorney Nicholas Ganjei highlighted the gravity of the theft, stating that “important COVID-19 research was stolen at the behest of the Chinese government,” characterizing the operation as an assault on American scientific innovation and intellectual property.

Prosecutors allege Xu and Zhang operated through Shanghai Powerock Network Co. Ltd., described as a company conducting cyberattacks at Beijing’s direction. The HAFNIUM group’s exploitation of Microsoft Exchange Server vulnerabilities affected thousands of computers globally, contributing to heightened international cybersecurity concerns.

This arrest represents part of ongoing U.S. law enforcement efforts targeting Chinese nationals connected to Beijing-directed cyberespionage activities. The case illustrates China’s systematic approach to acquiring Western intellectual property through state-sponsored cyber operations, particularly targeting biomedical research during the pandemic’s essential early phases.

You May Also Like

Chinese Hackers Hijack Unpatched Cisco Devices to Spy on Canadian Telecom Networks

Chinese hackers sneaked into Canada’s telecom networks through outdated Cisco devices for years, and nobody noticed. Your data might be next.

Critical Notepad++ Bug Lets Hackers Hijack Windows With a Simple Installer Trick

A simple installer bug in Notepad++ grants hackers system-wide control with SYSTEM privileges. Users must act fast before attackers strike.

China-Linked TA-ShadowCricket Quietly Infiltrates Asia-Pacific Governments and Corporations for 13 Years

State-backed hackers silently breached 2,000 systems across 72 countries for 13 years while the world remained clueless about their presence.

Chinese-Linked Hack Breaches Canadian Telecom Gear, Exposing Deep Vulnerabilities

Chinese hackers didn’t just breach Canadian telecom – they got away with $4.35M in damages. Salt Typhoon’s infiltration reveals a frightening new reality.