
Stealth Over Spectacle: Webworm's Discord and Graph API Backdoors Signal Shift in Chinese Cyber Espionage Tactics
Webworm's adoption of stealthy Discord and MS Graph backdoors marks a tactical evolution in Chinese espionage, favoring proxies and APIs over traditional RATs for better evasion in government and infrastructure targets.
While The Hacker News report highlights Webworm's EchoCreep and GraphWorm backdoors leveraging Discord and Microsoft Graph API for C2, it underplays the deeper strategic pivot by China-nexus actors toward living-off-the-land techniques that prioritize persistence over disruption. Drawing from ESET’s 2025 analysis and Symantec’s original 2022 documentation of the group’s overlap with FishMonger and SixLittleMonkeys, this evolution reveals a deliberate move away from legacy RATs like Trochilus and 9002 toward encrypted proxy chains and legitimate APIs. These tools enable chaining across compromised hosts while blending into enterprise environments, a tactic overlooked amid ransomware hype. Webworm’s targeting of electric power, aerospace, and government entities in Russia, Georgia, Mongolia, and now European states like Belgium and Poland aligns with broader patterns of pre-positioning for intelligence collection and potential infrastructure disruption. The use of GitHub impersonation and SoftEther VPN further exemplifies how adversaries exploit open-source utilities to mask operations, a pattern also seen in concurrent Cisco Talos reporting on BadIIS MaaS variants shared among Chinese-speaking groups. This shift reduces attribution noise and extends dwell times, heightening risks to critical sectors beyond what flashy malware headlines capture.
[SENTINEL]: Webworm's proxy and API-driven tools will likely expand undetected access to European and Asian critical infrastructure, enabling long-term intelligence and potential sabotage preparation.
Sources (3)
- [1]Primary Source(https://thehackernews.com/2026/05/webworm-deploys-echocreep-and-graphworm.html)
- [2]Related Source(https://www.welivesecurity.com/2025/05/webworm-echocreep-graphworm/)
- [3]Related Source(https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/webworm-china-2022)