Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Webworm Uses Discord and MS Graph for New Backdoors

Webworm Uses Discord and MS Graph for New Backdoors

Posted on May 20, 2026 By CWS

Recent reports have unveiled fresh cyber activities from the China-aligned group known as Webworm. The threat actor has been active in 2025, deploying custom backdoors that exploit Discord and Microsoft Graph API for command-and-control communications. These developments highlight the evolving tactics of Webworm as it targets entities across Russia, Georgia, Mongolia, and other Asian countries.

Webworm’s Evolving Tactics and Targets

Originally documented by Symantec in September 2022, Webworm has been engaged in cyber espionage since at least 2022. Its targets include government bodies and businesses in sectors like IT services, aerospace, and electric power. The group’s operations reveal overlaps with other China-based clusters such as FishMonger, SixLittleMonkeys, and Space Pirates. Notably, SixLittleMonkeys is known for deploying Gh0st RAT, focusing on countries like Central Asia, Russia, and Mongolia.

ESET researcher Eric Howard notes that Webworm has shifted towards more discreet proxy tools, stepping away from traditional backdoors. This shift is evidenced by the introduction of EchoCreep and GraphWorm in 2025, which utilize Discord and Microsoft Graph API, respectively, for communications.

Undercover Tactics and Tools

Webworm’s strategy involves using a GitHub repository masquerading as a WordPress project to stage malware and tools like SoftEther VPN, enhancing their stealth. SoftEther VPN is a common choice among Chinese hacking groups for bypassing detection. Over the past two years, Webworm has moved towards semi-legitimate utilities such as SOCKS proxies, expanding their focus to European countries like Belgium, Italy, Serbia, and Poland.

The recent addition of EchoCreep and GraphWorm marks a significant expansion in Webworm’s arsenal, even though traditional tools like Trochilus and 9002 RAT have been abandoned. Other notable tools include custom proxy solutions such as WormFrp and SmuxProxy, with WormFrp retrieving configurations from a compromised Amazon S3 bucket.

Capabilities and Deliveries

EchoCreep is capable of file transfers and command execution, while GraphWorm offers advanced features like process execution and file management with Microsoft OneDrive. The exact methods used by Webworm to deploy these backdoors remain unclear, but the use of open-source utilities like dirsearch and nuclei indicates efforts to brute-force web server files and identify vulnerabilities.

This disclosure comes as Cisco Talos highlights a BadIIS variant, potentially shared among Chinese-speaking cybercriminals under a malware-as-a-service model since 2021. The malware author, known as “lwxat,” has provided additional tools to ensure persistence and evade detection.

As Webworm continues to enhance its cyber arsenal, the importance of vigilance and robust cybersecurity measures remains crucial for potential targets worldwide.

The Hacker News Tags:Backdoors, China-aligned threat, cyber attacks, Cybersecurity, Discord, EchoCreep, ESET, GraphWorm, Microsoft Graph API, Webworm

Post navigation

Previous Post: Go Module Typo Exposes DNS Backdoor Hack
Next Post: 1Password and OpenAI Enhance Security for AI Coding Tools

Related Posts

WebRTC Skimmer Evades CSP to Steal E-Commerce Data WebRTC Skimmer Evades CSP to Steal E-Commerce Data The Hacker News
Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial Control Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial Control The Hacker News
Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool The Hacker News
Russian Hackers Using ClickFix Fake CAPTCHA to Deploy New LOSTKEYS Malware Russian Hackers Using ClickFix Fake CAPTCHA to Deploy New LOSTKEYS Malware The Hacker News
Reynolds Ransomware Uses Vulnerable Driver to Bypass Security Reynolds Ransomware Uses Vulnerable Driver to Bypass Security The Hacker News
Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Boosts Cyber Threats in App Security Landscape
  • Is Your Business Prepared for Agent AI Challenges?
  • Microsoft Python SDK Compromised by TeamPCP Hackers
  • 1Password and OpenAI Enhance Security for AI Coding Tools
  • Webworm Uses Discord and MS Graph for New Backdoors

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Boosts Cyber Threats in App Security Landscape
  • Is Your Business Prepared for Agent AI Challenges?
  • Microsoft Python SDK Compromised by TeamPCP Hackers
  • 1Password and OpenAI Enhance Security for AI Coding Tools
  • Webworm Uses Discord and MS Graph for New Backdoors

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark