chinese hacker apprehended abroad

Italian authorities arrested Xu Zewei, a 33-year-old Chinese national wanted by the United States for orchestrating cyberattacks against American COVID-19 research institutions, in Milan on July 3, 2025, following a coordinated operation with FBI agents. The arrest fulfills a U.S. extradition request as Xu faces a nine-count federal indictment in the Southern District of Texas, as his co-defendant Zhang Yu, 44, remains at large.

The charges stem from cyberattacks conducted between February 2020 and June 2021, during which Xu allegedly targeted universities and researchers developing COVID-19 vaccines, treatments, and testing protocols. Prosecutors accuse Xu of exploiting Microsoft Exchange Server vulnerabilities while working as part of the state-sponsored HAFNIUM group, also known as Silk Typhoon, which operated under direction from China’s Ministry of State Security, particularly the Shanghai State Security Bureau.

State-sponsored hackers systematically targeted critical COVID-19 research during the pandemic’s most vulnerable period, exploiting server vulnerabilities to steal vital medical innovations.

The hacking campaign utilized sophisticated techniques, including deploying “webshells” to maintain persistent remote access to compromised systems. Victims included U.S.-based universities in Texas and North Carolina, immunologists, virologists, and an international law firm with Washington, D.C. offices. The attacks coincided with vital phases of pandemic research, targeting institutions developing life-saving medical innovations. Following successful breaches, hackers copied gigabits of sensitive COVID-19 research data and transferred it directly to China for state-sponsored intelligence purposes.

Xu faces potential penalties of up to 20 years in prison on wire fraud and conspiracy charges, with the nine-count indictment encompassing computer fraud and conspiracy violations. The charges include aggravated identity theft alongside wire fraud and unauthorized computer access violations. U.S. Attorney Nicholas Ganjei highlighted the gravity of the theft, stating that “important COVID-19 research was stolen at the behest of the Chinese government,” characterizing the operation as an assault on American scientific innovation and intellectual property.

Prosecutors allege Xu and Zhang operated through Shanghai Powerock Network Co. Ltd., described as a company conducting cyberattacks at Beijing’s direction. The HAFNIUM group’s exploitation of Microsoft Exchange Server vulnerabilities affected thousands of computers globally, contributing to heightened international cybersecurity concerns.

This arrest represents part of ongoing U.S. law enforcement efforts targeting Chinese nationals connected to Beijing-directed cyberespionage activities. The case illustrates China’s systematic approach to acquiring Western intellectual property through state-sponsored cyber operations, particularly targeting biomedical research during the pandemic’s essential early phases.

You May Also Like

Inside Scattered Spider: The Elite Teen Hackers Now Wreaking Havoc on Airlines

Teen hackers are terrorizing major airlines with sophisticated attacks, and their success rate is terrifying. Find out who these digital prodigies really are.

Chinese APT41 Abuses Google Calendar to Secretly Control Malware—Is Your Data a Target?

Chinese hackers weaponize Google Calendar to control malware while your meetings sync. These state-backed cybercriminals hide in plain sight.

Critical Notepad++ Bug Lets Hackers Hijack Windows With a Simple Installer Trick

A simple installer bug in Notepad++ grants hackers system-wide control with SYSTEM privileges. Users must act fast before attackers strike.

Elite China-Linked Hackers Breach France’s Core Sectors Using Triple Ivanti Zero-Day Attack

Chinese hackers breached France’s core sectors using three zero-day attacks, causing $4.35M in damages. How did they stay undetected for months?