ESET researchers tracked Webworm, a China-aligned APT group that shifted from Asia to Europe in 2025 and expanded its toolkit with Discord-based EchoCreep and Microsoft Graph API-based GraphWorm backdoors. The group also relied on GitHub staging, custom proxy tools, and compromised cloud infrastructure such as an Amazon S3 bucket to support spying, exfiltration, and multi-hop proxying. #Webworm #EchoCreep #GraphWorm #SoftEtherVPN #MicrosoftGraphAPI #Discord #GitHub #AmazonS3
Keypoints
- Webworm is a China-aligned APT group active since at least 2022 and has continuously changed its TTPs.
- The group shifted its targeting from Asia toward Europe in 2025, including government entities in Belgium, Italy, Serbia, and Poland, plus a university in South Africa.
- Webworm added two new backdoors in 2025: EchoCreep, which uses Discord for C&C, and GraphWorm, which uses Microsoft Graph API and OneDrive.
- The operators staged tools and malware in GitHub repositories, including a forked WordPress repo used as a delivery point for artifacts.
- Researchers decrypted more than 400 Discord messages and found reconnaissance activity against more than 50 unique targets.
- Webworm used a compromised Amazon S3 bucket to retrieve configurations and exfiltrate victim data, including files taken from government environments.
- The group increasingly uses legitimate or semi-legitimate proxy tooling, including SoftEther VPN, frp, iox, and custom tools such as WormFrp, ChainWorm, SmuxProxy, and WormSocket.
MITRE Techniques
- [T1595.002 ] Active Scanning: Vulnerability Scanning â Webworm used nuclei to scan targets for vulnerabilities (âused the open-source vulnerability scanner nuclei against targetsâ).
- [T1595.003 ] Active Scanning: Wordlist Scanning â Webworm used dirsearch for directory brute forcing and web path discovery (âused dirsearch, which leverages wordlists, to perform web directory scanning on targetsâ).
- [T1588.006 ] Obtain Capabilities: Vulnerabilities â The group used publicly available exploit code for post-authentication RCE (âused publicly available exploit code for post-authentication remote code executionâ).
- [T1583.004 ] Acquire Infrastructure: Server â Webwormâs proxy and web socket servers were hosted on cloud infrastructure (âServers for WormFrp, SmuxProxy, and WormSocket are hosted on cloud servicesâ).
- [T1583.003 ] Acquire Infrastructure: Virtual Private Server â The group used SoftEther VPN servers hosted on cloud services (âSoftEther VPN servers that have been seen hosted on Vultr cloud servicesâ).
- [T1584.006 ] Compromise Infrastructure: Web Services â Webworm compromised S3 buckets and used web services for footholds (âseen compromising S3 buckets as well as using tools like nuclei to find footholdsâ).
- [T1608.002 ] Stage Capabilities: Upload Tool â The group staged tools in GitHub for direct download (âstaged tools in its GitHub repo for direct download onto compromised systemsâ).
- [T1059.003 ] Command and Scripting Interpreter: Windows Command Shell â EchoCreep and GraphWorm executed operator commands through cmd.exe (âboth use the Windows command line to execute operator commandsâ).
- [T1053.005 ] Scheduled Task/Job: Scheduled Task â EchoCreep was run through a custom scheduled task (âexecuted under the custom-created MicrosoftSSHUpdate scheduled taskâ).
- [T1547.001 ] Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder â GraphWorm achieved persistence via Run keys (âpersists by making updates to registry Run keysâ).
- [T1070.004 ] Indicator Removal: File Deletion â GraphWorm removed a beacon file after upload (âcleans up a created beacon file after successful uploadâ).
- [T1112 ] Modify Registry â GraphWorm modified registry Run keys (âmakes modifications to registry Run keys for persistenceâ).
- [T1027.013 ] Obfuscated Files or Information: Encrypted/Encoded File â EchoCreep and GraphWorm hid data with encryption and encoding (âuse encryption and encoding techniques to obfuscate dataâ).
- [T1550.001 ] Use Alternate Authentication Material: Application Access Token â The backdoors used API keys to communicate with C&C infrastructure (âuse API keys to communicate with the C&C infrastructureâ).
- [T1078.004 ] Valid Accounts: Cloud Accounts â GraphWorm used a valid cloud account for Microsoft Graph access (âuses a valid cloud account to access Microsoft Graph APIsâ).
- [T1070.006 ] Indicator Removal: Timestomp â EchoCreep altered timestamp attributes (âcontains a modified timestamp attributeâ).
- [T1021.007 ] Remote Services: Cloud Services â Webworm used a compromised S3 bucket as a remote file staging service (âuse as a file staging zoneâ).
- [T1005 ] Data from Local System â EchoCreep and GraphWorm collected data from infected hosts (âcan collect data from the local systemâ).
- [T1074.001 ] Data Staged: Local Data Staging â GraphWorm staged beacon files locally before upload (âstages a beacon file locally before uploadingâ).
- [T1074.002 ] Data Staged: Remote Data Staging â GraphWorm staged tasks and files in OneDrive (âstages files and tasks within OneDrive via the Microsoft Graph APIâ).
- [T1071.001 ] Application Layer Protocol: Web Protocols â The backdoors and WormSocket used HTTP and WebSocket traffic (âmake use of HTTP and the WebSocket protocolâ).
- [T1132.001 ] Data Encoding: Standard Encoding â The tools used base64 encoding (âmake use of base64 encodingâ).
- [T1573.002 ] Encrypted Channel: Symmetric Cryptography â EchoCreep, GraphWorm, WormSocket, and WormFrp used AES for encryption (âuse AES in some capacityâ).
- [T1090.003 ] Proxy: Multi-hop Proxy â WormSocket and ChainWorm supported multi-hop proxying (âcreate multiple proxy hopsâ).
- [T1090.002 ] Proxy: External Proxy â Multiple tools connected to external proxies (âhave the capability to connect to external proxiesâ).
- [T1090.001 ] Proxy: Internal Proxy â ChainWorm and WormSocket could create internal proxies (âcan create internal proxiesâ).
- [T1102.002 ] Web Service: Bidirectional Communication â EchoCreep and GraphWorm used Discord and Microsoft Graph for C&C (âuse Discord and the Microsoft Graph API for C&C infrastructureâ).
- [T1041 ] Exfiltration Over C2 Channel â The backdoors exfiltrated data through their C&C channels (âexfiltrate data to their respective C&C infrastructuresâ).
- [T1567.002 ] Exfiltration Over Web Service: Exfiltration to Cloud Storage â GraphWorm exfiltrated data to OneDrive (âexfiltrates data to OneDrive via the Microsoft Graph APIâ).
Indicators of Compromise
- [SHA-1 ] malware samples associated with EchoCreep, WormFrp, WormSocket, GraphWorm, SmuxProxy, and related tooling â CB4E50433336707381429707F59C3CBE8D497D98, 1DF40A4A31B30B62EC33DC6FECC2C4408302ADC7, and other 4 hashes
- [Filename ] staged or deployed binaries and tools â SearchApp.exe, C2OverOneDrive_v0316.exe, and other 4 filenames
- [Domain ] compromised S3 bucket and staging/exfiltration endpoint â wamanharipethe.s3.ap-south-1.amazonaws[.]com, whpjewellers.s3.amazonaws[.]com
- [IP Address ] proxy and infrastructure servers used by Webworm â 64.176.85[.]158, 45.77.13[.]67, and other 3 IPs
- [GitHub Repository ] file-staging repository used by the group â https://github[.]com/anjsdgasdf/WordPress
- [Cloud Service Path ] OneDrive and Microsoft Graph C&C staging paths â /createUploadSession, /me/drive/root:///:content
- [File Name ] retrieved or exfiltrated artifacts and operator files â beacon_shell_output.txt, config.dat, and other 2 files
- [Tool / Script Name ] reconnaissance and exploit artifacts found on operator hosts â _1.sh, SharpSecretsdump
Read more: https://www.welivesecurity.com/en/eset-research/webworm-new-burrowing-techniques/