Chinese Hacker Extradited to U.S. for Role in Silk Typhoon Cyber Espionage

Chinese Hacker Extradited to U.S. for Alleged Role in Silk Typhoon Cyber Espionage

In a significant development in international cybersecurity enforcement, Chinese national Xu Zewei, 34, has been extradited from Italy to the United States to face charges related to his alleged involvement in a series of state-sponsored cyber intrusions. These activities, conducted between February 2020 and June 2021, are attributed to the hacking group known as Silk Typhoon, previously identified as HAFNIUM.

Background of the Case

Xu’s extradition marks a pivotal moment in the ongoing efforts to combat cyber espionage linked to state actors. According to U.S. Department of Justice (DOJ) documents, Xu operated under the direction of China’s Ministry of State Security (MSS), specifically the Shanghai State Security Bureau (SSSB). At the time, he was employed by Shanghai Powerock Network Co. Ltd. (Powerock), a private technology firm allegedly serving as a front for government-directed cyber operations.

The Silk Typhoon Campaign

The Silk Typhoon group, also known as HAFNIUM, is notorious for its extensive cyber espionage activities targeting a wide range of sectors, including academia, legal services, and government entities. The group’s operations have been linked to the compromise of over 12,700 U.S. organizations, highlighting the vast scale and impact of their cyber intrusions.

Targeting COVID-19 Research

During the early months of the COVID-19 pandemic, Xu and his co-conspirators allegedly focused their efforts on infiltrating networks of U.S.-based universities and research institutions involved in virology and immunology. On February 19, 2020, Xu reportedly confirmed to an SSSB officer that he had successfully breached the network of a research university in the Southern District of Texas. Subsequently, he was directed to access specific email accounts of scientists engaged in COVID-19 research, from which he extracted entire mailboxes and reported his success back to his handlers.

Exploitation of Microsoft Exchange Vulnerabilities

In late 2020, the Silk Typhoon group shifted tactics to exploit known vulnerabilities in Microsoft Exchange Server, a widely used enterprise email platform. By gaining initial access through these vulnerabilities, the group installed web shells on compromised servers, enabling persistent remote access and further data exfiltration.

Legal Proceedings and International Cooperation

Xu’s extradition to the United States underscores the collaborative efforts between international law enforcement agencies to address cyber threats. Upon arrival, Xu appeared before the U.S. District Court in Houston, Texas, on April 27, 2026, facing a nine-count federal indictment. His co-defendant, Zhang Yu, 44, also a Chinese national, remains at large. The FBI has urged anyone with information on Zhang’s whereabouts to come forward.

Implications for Cybersecurity

The extradition and forthcoming trial of Xu Zewei serve as a stark reminder of the persistent and evolving nature of cyber threats posed by state-sponsored actors. Organizations are advised to remain vigilant, regularly update and patch systems, and implement robust cybersecurity measures to defend against such sophisticated attacks.