<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Webworm — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/actors/webworm/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 21 May 2026 06:46:03 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/actors/webworm/feed.xml" rel="self" type="application/rss+xml"/><item><title>Webworm APT Updates TTPs with Discord and Microsoft Graph C2</title><link>https://feed.craftedsignal.io/briefs/2026-05-webworm-new-techniques/</link><pubDate>Thu, 21 May 2026 06:46:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-webworm-new-techniques/</guid><description>The Webworm APT group is using updated tactics, techniques, and procedures, including new backdoors using Discord and Microsoft Graph API for command and control, custom proxy tools, and GitHub for malware staging, shifting focus to European governmental organizations.</description><content:encoded><![CDATA[<p>ESET researchers have detailed the 2025 activities of Webworm, a China-aligned APT group known since 2022. The group, originally targeting Asian organizations, has shifted its focus to European governmental organizations and a South African university. Webworm has moved away from traditional backdoors such as McRat and Trochilus and now utilizes legitimate or semi-legitimate tools, as well as custom proxy solutions. Key additions to their toolset include EchoCreep, a Discord-based backdoor, and GraphWorm, which leverages Microsoft Graph API for command and control. Webworm also employs GitHub repositories to stage malware for direct download onto compromised systems, enhancing stealth and evading detection.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of a system through an undisclosed method, possibly exploiting CVE-2017-7692.</li>
<li>Establishment of persistence using GraphWorm via registry modifications.</li>
<li>Deployment of EchoCreep, utilizing Discord channels for C&amp;C communication via crafted HTTP requests.</li>
<li>Utilization of GraphWorm with Microsoft Graph API using OneDrive endpoints to retrieve jobs and upload victim information.</li>
<li>Configuration retrieval for WormFrp from a compromised Amazon S3 bucket at <code>wamanharipethe.s3.ap-south-1.amazonaws[.]com</code>.</li>
<li>Credential dumping using SharpSecretsdump, uploaded to the compromised S3 bucket.</li>
<li>Lateral movement and internal reconnaissance using tools staged on GitHub and custom proxy tools like WormFrp, ChainWorm, and SmuxProxy.</li>
<li>Data exfiltration of sensitive information, such as VM snapshots and network diagrams, through the compromised Amazon S3 bucket.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Webworm&rsquo;s activities in 2025 targeted governmental organizations in Belgium, Italy, Serbia, and Poland, as well as a university in South Africa. Compromised Amazon S3 buckets were used for data exfiltration, potentially leading to exposure of sensitive government data and infrastructure details. Decryption of over 400 Discord messages revealed reconnaissance commands used against more than 50 unique targets, highlighting the scope of the group&rsquo;s operations. Successful exploitation of virtual machine management environments could lead to widespread infrastructure compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for connections to known Webworm infrastructure, including Vultr and IT7 Networks ASNs (see IOCs) and Discord traffic for abnormal C2 activity.</li>
<li>Implement detections for processes utilizing the Microsoft Graph API for unusual activities, specifically uploads to OneDrive (see GraphWorm description).</li>
<li>Monitor for scheduled tasks resembling &ldquo;MicrosoftSSHUpdate&rdquo; used by EchoCreep for persistence (see Attack Chain).</li>
<li>Block access to the compromised S3 bucket <code>wamanharipethe.s3.ap-south-1.amazonaws[.]com</code> at the network perimeter (see IOCs).</li>
<li>Deploy the Sigma rule &ldquo;Detect Webworm Tool Download From GitHub&rdquo; to detect download of known tools (see rules).</li>
<li>Monitor process creation events for the execution of <code>SharpSecretsdump</code> from unusual locations (see Attack Chain).</li>
<li>Implement the Sigma rule to detect proxy tool execution, focusing on named proxy tools (see rules).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>webworm</category><category>apt</category><category>discord</category><category>microsoft graph api</category><category>proxy tool</category></item></channel></rss>