• News
  • Texas News
  • Sports
  • Finance
  • Medical
  • Crime
  • Finance
Friday, December 5, 2025
  • Login
Brady Today
  • News
  • Texas News
  • Sports
  • Finance
  • Medical
  • Crime
  • Finance
No Result
View All Result
  • News
  • Texas News
  • Sports
  • Finance
  • Medical
  • Crime
  • Finance
No Result
View All Result
Brady Today
No Result
View All Result
Home Crime

Chinese State-Sponsored Hacker Arrested on U.S. Warrant for COVID-19 Research Theft and Microsoft Hack

elisa garcia by elisa garcia
July 11, 2025
in Crime
0
Chinese State-Sponsored Hacker Arrested on U.S. Warrant for COVID-19 Research Theft and Microsoft Hack
0
SHARES
1
VIEWS
Share on FacebookShare on Twitter

A 33-year-old Chinese national has been arrested for allegedly participating in a widespread hacking operation targeting U.S. computer networks between February 2020 and June 2021, including the sweeping HAFNIUM campaign that infiltrated thousands of systems worldwide.

Authorities detained Xu Zewei (徐泽伟), a citizen of the People’s Republic of China (PRC), in Milan, Italy, as he arrived on a flight from China. The arrest followed a request from the United States.

Xu and fellow PRC national Zhang Yu (张宇), 44, are charged in a nine-count indictment unsealed in November 2023. The indictment accuses them of conducting cyber intrusions during that period under orders from officers in the Ministry of State Security’s (MSS) Shanghai State Security Bureau (SSSB).

According to the charges, the MSS and its SSSB division serve as Chinese intelligence agencies responsible for domestic counterintelligence, non-military foreign intelligence, and political security. Xu was employed by Shanghai Powerock Network Co. Ltd., one of several Chinese firms that allegedly carry out cyberattacks on behalf of the PRC government.

“The indictment alleges Xu was hacking and stealing crucial COVID-19 research at the behest of the Chinese government while that same government was simultaneously withholding information about the virus and its origins,” said U.S. Attorney Nicholas Ganjei. “We’ve waited years to bring Xu to justice. This arrest proves the U.S. doesn’t forget — we will track hackers down and make them answer for their crimes.”

“This arrest underscores the United States’ patient and tireless commitment to pursuing hackers who seek to steal information belonging to U.S. companies and universities,” said John A. Eisenberg, Assistant Attorney General for the National Security Division.

“While the world reeled from a virus that originated in China, the Chinese government plotted to steal U.S. research critical to vaccine development,” said FBI Houston Special Agent in Charge Douglas Williams. “Xu Zewei, an alleged hacker for China’s primary spy agency, used advanced cyber tools to target COVID-19 data. His arrest in Italy shows we will scour the globe to bring foreign cybercriminals to justice.”

Court documents allege that in early 2020, Xu and his co-conspirators targeted U.S. universities and top immunologists and virologists engaged in cutting-edge COVID-19 research. Xu allegedly updated SSSB officers on their progress. On Feb. 19, 2020, for example, Xu reportedly confirmed that he had breached the network of a research university in the Southern District of Texas. Days later, the SSSB allegedly directed him to access specific email accounts belonging to COVID-19 researchers. Xu later confirmed he had retrieved the contents of those mailboxes.

Starting in late 2020, the group exploited vulnerabilities in Microsoft Exchange Server, a commonly used email platform. This exploitation became central to the HAFNIUM campaign, which compromised thousands of systems around the globe.

In March 2021, Microsoft publicly exposed the HAFNIUM campaign, identifying the attackers as China-based, state-sponsored hackers. By July 2021, the U.S. and its international partners formally attributed the campaign to the PRC’s MSS. Private sector cybersecurity experts condemned the operation as reckless, irresponsible, and destabilizing.

Victims of Xu’s Microsoft Exchange Server exploits included a university in the Southern District of Texas and an international law firm with offices in Washington, D.C. Xu and his co-conspirators reportedly installed web shells—malicious scripts allowing remote control—on compromised servers. These tools were unique to HAFNIUM at the time. As with earlier COVID-19 intrusions, Xu and Zhang allegedly acted under SSSB guidance. On Jan. 30, 2021, Xu reportedly informed Zhang that he had accessed the university’s network. By Feb. 28, he had updated an SSSB officer, who then instructed him to coordinate with another officer for a full list of successful intrusions.

The indictment alleges Xu and his associates also gained unauthorized access to the law firm’s systems to search for information tied to U.S. policymakers and government entities. Their search reportedly included terms like “Chinese sources,” “MSS,” and “HongKong.”

This case highlights the PRC’s use of a sprawling network of private contractors to obscure state involvement in cyber espionage. These companies allegedly operated from the safety of Chinese territory, scanning global networks for weaknesses, exploiting them, and funneling valuable information to the Chinese government—or reselling it if the state showed no interest. This scattershot approach left more systems vulnerable and allowed third parties to access stolen data.

In April 2021, the Justice Department conducted a court-approved operation to remove malware left behind by HAFNIUM from hundreds of U.S. systems.

Xu faces multiple charges:

  • Two counts of wire fraud and conspiracy, each carrying up to 20 years in prison.

  • Conspiracy to damage protected computers and commit identity theft, and two counts of unauthorized access to protected systems, each punishable by up to 5 years.

  • Intentional damage to protected computers, which carries a potential 10-year sentence per count.

  • Aggravated identity theft, carrying an additional mandatory 2-year sentence served consecutively.

All charges also carry potential fines of up to $250,000 each.

Zhang remains at large. Anyone with information about his whereabouts is urged to call the FBI at 1-800-CALL-FBI (1-800-225-5324).

The FBI’s Houston Field Office is leading the investigation.
Assistant U.S. Attorneys S. Mark McIntyre and John Marck, along with Deputy Chief Matthew Anzaldi of the National Security Division’s Cyber Section, are prosecuting the case.

Reference Article

Previous Post

Nigerians Face New U.S. Visa Restrictions as Trump Administration Tightens Entry Rules

Next Post

Father Charged with DUI After Motorcycle Crash Involving 6-Year-Old Son

Next Post
Father Charged with DUI After Motorcycle Crash Involving 6-Year-Old Son

Father Charged with DUI After Motorcycle Crash Involving 6-Year-Old Son

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • ICE Arrests Jamaican Illegal Immigrant Working as Maine Police Officer After Attempted Firearm Purchase
  • Trump Administration Targets Nigerians in Crackdown on Birthright Citizenship and Visa Access
  • Texas Man Lived with Wife’s Decomposing Body for Over a Month After Allegedly Killing Her
  • AML Bitcoin Founder Sentenced to 7 Years for Multi-Million-Dollar Fraud
  • Tsunami Waves Reach Hawaii After Powerful 8.8 Earthquake Near Russia; Alerts Issued for U.S. West Coast

important Page

  • About
  • Contact Us
  • Cookie Policy
  • Disclaimer
  • Terms and conditions

Trending News

  • ICE Arrests Jamaican Illegal Immigrant Working as Maine Police Officer After Attempted Firearm Purchase July 30, 2025
  • Trump Administration Targets Nigerians in Crackdown on Birthright Citizenship and Visa Access July 30, 2025
  • Texas Man Lived with Wife’s Decomposing Body for Over a Month After Allegedly Killing Her July 30, 2025
  • AML Bitcoin Founder Sentenced to 7 Years for Multi-Million-Dollar Fraud July 30, 2025
  • Tsunami Waves Reach Hawaii After Powerful 8.8 Earthquake Near Russia; Alerts Issued for U.S. West Coast July 30, 2025

Categories

  • Accident
  • Crime
  • Finance
  • Medical
  • Missing Person News
  • News
  • Politics
  • Space
  • Sports
  • Texas News
  • Weather News

About Us

we offer a fresh approach to all things Brady and McCulloch County.  We work everyday to bring you exciting and up to date coverage of events large and small within our great community.

Contact Us

P.O. Box 684
Brady, TX 76825
Phone: 325-240-0515
Email: [email protected]

Calf Creek Media & Botxbyte Media Group

No Result
View All Result
  • About
  • brady-today.com
  • Buy Adspace
  • Contact Us
  • Cookie Policy
  • Disclaimer
  • Terms and conditions

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Go to mobile version