Nation-State Threats

Chinese Hacker Xu Zewei Extradited to US from Italy

Xu Zewei, accused of hacking US universities during the pandemic, landed in Houston handcuffs-first. It's a DOJ coup — but one fugitive still roams free.

{# Always render the hero — falls back to the theme OG image when article.image_url is empty (e.g. after the audit's repair_hero_images cleared a blocked Unsplash hot-link). Without this fallback, evergreens with cleared image_url render no hero at all → the JSON-LD ImageObject loses its visual counterpart and LCP attrs go missing. #}
Xu Zewei extradition: Chinese hacker in custody, Silk Typhoon APT group targeting US universities

Key Takeaways

  • Xu Zewei extradited from Italy, faces 9 felony counts for Silk Typhoon hacks on US universities and COVID researchers.
  • Group exploited Microsoft Exchange zero-days, infecting thousands; FBI purged web shells in 2021 cyber op.
  • Rare US win in nation-state cyber pursuit, but partner Zhang Yu free — signals ongoing threats.

Nine counts. That’s how many felony charges Xu Zewei, 34, now stares down in a Houston courtroom after his extradition from Italy.

Xu’s alleged resume? Hacking for China’s Ministry of State Security. From early 2020 through 2021, he and his crew zeroed in on US universities, immunologists, virologists — anyone knee-deep in COVID-19 research. They cracked networks, rifled through emails, exfiltrated data, then reported back to Shanghai State Security Bureau handlers.

And the tools? Shanghai Powerock Network, his day job, fronts as a tech firm but doubles as a cyber offensive hub for the state.

Who Exactly Is Silk Typhoon — and Why Now?

Silk Typhoon. You’ve heard the aliases: Hafnium, Murky Panda. This APT group doesn’t mess around. Late 2020, they pounced on Microsoft Exchange Server zero-days — unpatched flaws that let them burrow into thousands of systems worldwide. A Texas university fell. A global law firm followed. Web shells deployed for backdoor access. The FBI, in a rare offensive move, swept in during April 2021 with a court-authorized op, nuking those shells from hundreds of US machines.

“Xu was directed to access the email accounts of virologists and immunologists, and he later reported to the SSSB officer that he exfiltrated information from the targeted inboxes.”

That’s straight from DOJ court docs. Chilling precision — pandemic panic as cover for espionage.

Xu got nabbed in Italy last July. Extradited over the weekend. First court appearance this week. Wire fraud, computer hacking, identity theft, damaging protected computers. Decades in prison loom if convicted.

Zhang Yu, 44, his indicted partner? Still ghosts the grid, at large.

This isn’t random. Timing screams geopolitics. US-China cyber cold war heats up — indictments as proxy strikes when hot war stays off the table.

Echoes of SolarWinds: History Rhymes

Remember SolarWinds? 2020’s supply-chain nightmare, Russian hands all over it. Took years to unravel, with indictments trickling out slow. Silk Typhoon’s Exchange blitz mirrors that: zero-days, widespread compromise, nation-state fingerprints. But here’s the unique angle no one’s shouting yet — this extradition marks a tactical shift. Italy’s handoff isn’t luck; it’s the US leaning on Five Eyes allies and bilateral pacts to snag high-value targets on foreign soil. Remember the 2014 indictment of five PLA hackers? All talk, no cuffs. Xu’s arrival flips the script. Bold prediction: expect more such grabs from Europe, as Beijing’s operatives vacation less safely.

Powerock Network? DOJ calls it out explicitly — a private firm laundering state ops. Skeptical eye: these ‘companies’ are Beijing’s deniability layer, much like Russia’s military contractors. Who profits? Not shareholders. MSS gets the intel; Powerock gets contracts. Follow the yuan.

Is This a Win for US Cyber Defenders?

Short answer: Partially. Grabbing Xu disrupts one cell — but Silk Typhoon’s a hydra. Thousands hit in the Exchange campaign alone. North American industries still in crosshairs, per recent threat intel. FBI’s web shell purge? Heroic patch work. But zero-days keep coming; Microsoft’s bounty programs lag behind MSS budgets.

And the COVID angle? Straight out of a spy thriller. Targeting researchers mid-pandemic — was it lab-leak paranoia fuel, or raw biotech theft? DOJ docs say exfiltration to SSSB. Universities, underfunded, make soft marks. One Texas school breached twice.

Broader lens: China’s cyber posture hasn’t blinked. Reports tie Silk Typhoon to ongoing North America sweeps — telecom, manufacturing, you name it. Xu’s bust might chill ops temporarily. Or not. State actors pivot fast.

Why Does This Matter for Global Networks?

Extraterritorial reach. US charges stick across borders now, thanks to allies like Italy. Message to hackers: Travel at risk. But enforcement? Spotty. Zhang Yu laughs from hiding.

Corporate fallout looms. Exchange scars linger — patches applied late left web shells festering. Law firms, unis: breach disclosures probably still buried in fine print.

Cynical take: DOJ’s announcement? PR gold. Rare tangible win amid endless attributions. Yet money question — who’s cashing in? Cybersecurity firms peddle ‘Silk Typhoon defense’ suites today. Vendors thrive on fear; states on secrets.

One-paragraph deep dive: Historical parallel seals it. Back in 2015, US indicted those five Chinese military hackers — bold, symbolic. No arrests. Fast-forward to Xu: cuffs real, thanks to global cop networks tightening. But Beijing’s response? Muted, as always. They’ll spin it domestic, ramp up opsec. Prediction — watch for uptick in proxy actors, maybe Iranian cutouts. US wins the optics; China owns the long game. Universities? Beef up Exchange hygiene yesterday.

DOJ’s got momentum. More indictments inbound, tied to those related reports: Chinese firms flogging hacker tools, AI ‘hacking’ claims smelling like Claude-level hype.


🧬 Related Insights

Frequently Asked Questions

What is Silk Typhoon?

China’s MSS-backed APT group, aka Hafnium/Murky Panda, known for Exchange zero-day exploits and targeting sensitive research.

Did Xu Zewei hack COVID researchers?

Yes, per DOJ: He breached university networks, stole virologist emails, reported to Shanghai handlers during 2020-2021.

Is Zhang Yu caught?

No, the co-conspirator remains at large despite indictment.

Wei Chen
Written by

Technical security analyst. Specialises in malware reverse engineering, APT campaigns, and incident response.

Frequently asked questions

What is Silk Typhoon?
China's MSS-backed APT group, aka Hafnium/Murky Panda, known for Exchange zero-day exploits and targeting sensitive research.
Did Xu Zewei hack COVID researchers?
Yes, per DOJ: He breached university networks, stole virologist emails, reported to Shanghai handlers during 2020-2021.
Is Zhang Yu caught?
No, the co-conspirator remains at large despite indictment.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by SecurityWeek

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.