Technology

Chinese State-Sponsored Hacker Xu Zewei Extradited to U.S. Following HAFNIUM Campaign

Chinese hacker Xu Zewei has been extradited from Italy to face U.S. charges for his role in the state-sponsored HAFNIUM campaign that targeted COVID-19 research and compromised over 60,000 entities us

Martin HollowayPublished 2w ago6 min readBased on 9 sources
Reading level
Chinese State-Sponsored Hacker Xu Zewei Extradited to U.S. Following HAFNIUM Campaign

Chinese State-Sponsored Hacker Xu Zewei Extradited to U.S. Following HAFNIUM Campaign

Xu Zewei, a 33-year-old Chinese national, has been extradited from Italy to the United States to face charges stemming from his alleged role in a state-sponsored hacking operation that targeted COVID-19 research and exploited Microsoft Exchange Server vulnerabilities. The extradition, secured by the U.S. Department of Justice's Office of International Affairs with assistance from the Italian National Police's Cyber Division, brings to American soil one of the key figures in the HAFNIUM intrusion campaign that compromised over 60,000 U.S. entities.

The Charges and Timeline

Xu faces a nine-count indictment unsealed in the Southern District of Texas, alongside co-defendant Zhang Yu (张宇), a 44-year-old Chinese national who remains at large. The charges include wire fraud, obtaining information by unauthorized access to protected computers, and aggravated identity theft. Wire fraud charges alone carry potential sentences of up to 20 years in prison.

The alleged intrusions occurred between February 2020 and June 2021, during a period when COVID-19 research represented critical intellectual property for pharmaceutical companies and academic institutions worldwide. Court documents detail a methodical campaign directed by officers from China's Ministry of State Security's Shanghai State Security Bureau (SSSB).

Targeting COVID-19 Research

The operation's most strategically significant element was its focus on pandemic research. On February 22, 2020, an SSSB officer specifically directed Xu to target email accounts belonging to virologists and immunologists engaged in COVID-19 research at a research university in the Southern District of Texas. Three days earlier, on February 19, 2020, Xu had already provided an SSSB officer with confirmation that he had successfully compromised a research university network in the same district.

The targeting extended beyond a single institution. Court documents indicate that Xu and his co-conspirators successfully infiltrated two universities in the Southern District of Texas, along with a law firm with offices worldwide, including in Washington D.C.

Technical Methods and Scope

Xu and Zhang operated as part of the broader HAFNIUM group, which leveraged previously unknown zero-day vulnerabilities in Microsoft Exchange Server to gain initial access to target networks. Once inside, the attackers installed web shells on compromised computers, enabling persistent remote administration capabilities that allowed them to maintain long-term access.

The scale of the HAFNIUM campaign was substantial. While the group targeted over 60,000 U.S. entities, it successfully victimized more than 12,700 organizations, stealing sensitive information from compromised mailboxes. The attackers conducted targeted searches for information regarding specific U.S. policymakers and government agencies.

Command and Control Communications

Court filings reveal the operational structure connecting Xu to Chinese state intelligence. On January 30, 2021, Xu confirmed to Zhang that he had compromised a university's network. A month later, on February 28, 2021, Xu provided an update to an SSSB officer regarding his successful intrusions.

These communications demonstrate the direct relationship between front-line operators like Xu and Zhang and their state sponsors within China's Ministry of State Security. The Shanghai State Security Bureau officers provided specific targeting instructions and received regular status updates on compromise activities.

The Arrest and Extradition Process

Xu was arrested in Italy at the request of U.S. authorities, with the FBI having placed him on its wanted list. Following his arrest, Xu claimed mistaken identity regarding the U.S. charges, identifying himself as an IT manager at a Shanghai company. However, the Italian courts ultimately approved his extradition to face trial in the United States.

U.S. Attorney Nicholas Ganjei for the Southern District of Texas is overseeing the prosecution, which represents a significant enforcement action in the ongoing effort to hold state-sponsored cyber actors accountable through criminal proceedings.

Historical Context and Implications

This case follows a familiar pattern we have seen before, when nation-state actors have used criminal proxies to conduct cyber operations while maintaining plausible deniability. The HAFNIUM campaign mirrors previous Chinese state-sponsored operations in its blend of strategic intelligence gathering and opportunistic data theft, but distinguishes itself through its timing and focus on pandemic research during a global health crisis.

The extradition of Xu Zewei marks a notable success in international law enforcement cooperation against cyber threats. Italy's willingness to extradite despite China's likely diplomatic pressure demonstrates the growing international consensus around holding state-sponsored cyber actors accountable through criminal justice mechanisms.

Looking ahead, this case establishes important precedents for prosecuting contract hackers who operate on behalf of nation-state sponsors. The detailed evidence of command-and-control communications between Xu and SSSB officers provides a clear evidentiary foundation for establishing the state-sponsored nature of the alleged crimes.

The prosecution also sends a signal to other contract hackers that geographic distance does not provide immunity from U.S. law enforcement. With Zhang Yu remaining at large, the case demonstrates both the reach and limitations of international cyber crime enforcement.

For organizations managing Exchange Server infrastructure, the case serves as a reminder of the persistent threat posed by state-sponsored actors who invest significant resources in discovering and exploiting zero-day vulnerabilities in widely deployed enterprise software platforms. The web shell persistence techniques employed by HAFNIUM continue to be observed in current threat campaigns, highlighting the need for robust detection and response capabilities that can identify post-exploitation activities.