ESET researchers analyzed the 2025 exercise of Webworm, a China-aligned APT group that started off focusing on organizations in Asia, however has not too long ago shifted its focus to Europe. Though that is our first public blogpost on the group, we’ve got been observing Webworm’s actions ever since Symantec first reported on this risk actor in 2022. Through the years, we’ve got seen that this risk actor frequently adjustments its techniques, methods, and procedures (TTPs).
Webworm is linked to different China-aligned APT teams similar to SixLittleMonkeys and FishMonger. Up to now, it made use of well-known malware households similar to McRat (aka 9002 RAT) and Trochilus, although in recent times, it has began transferring towards each current and {custom} proxy instruments, that are extra stealthy than full-fledged backdoors. In 2025, Webworm additionally added two new backdoors to its toolset: EchoCreep, which makes use of Discord for C&C communication, and GraphWorm, which makes use of Microsoft Graph API for a similar objective. The group can also be recognized for staging its malware and instruments in GitHub repositories, guaranteeing that malware will be instantly downloaded onto the sufferer’s machine.
Key factors of the blogpost:
- Since its discovery in 2022, the Webworm APT group has been actively updating its toolset and focusing on.
- In 2025, the group began using backdoors that use Discord and Microsoft Graph API for C&C communication.
- ESET researchers decrypted over 400 Discord messages and a bash historical past file found on an operator server with reconnaissance instructions used in opposition to greater than 50 distinctive targets.
- Along with backdoors, Webworm leverages a number of current and {custom} proxy instruments.
- The group makes use of GitHub to stage its malware.
We attribute the 2025 marketing campaign to Webworm primarily based on the data we found after decrypting the Discord messages utilized by the EchoCreep backdoor for C&C communication. The knowledge led us to the attackers’ GitHub repository, which contained staged artifacts such because the SoftEther VPN utility. Contained in the SoftEther configuration file, we discovered an IP deal with that matches a recognized Webworm IP.
Victims who had been impacted by Webworm from nations talked about later on this blogpost have been appropriately notified. As well as, providers we’ve got recognized, similar to a GitHub repository and an S3 bucket, have been taken down.
Evolving method
In 2022, one in all Webworm’s foremost traits was the usage of established backdoors and distant entry trojans (RATs) similar to McRat and Trochilus. As described within the Symantec blogpost, the group initially focused primarily nations in Asia.
In 2024, we noticed that the group began to maneuver away from conventional backdoors in favor of official or semi-legitimate instruments, similar to SOCKS proxies (SoftEther VPN) and different networking options. Whereas these assist Webworm evade detection, in addition they lack the total set of instructions sometimes accessible in backdoors, so the operators need to depend on command interpreters similar to cmd.exe or powershell.exe.
At the moment, we additionally noticed that the group began to decelerate operations in Asia and shift its focus towards European nations. This development continued in 2025, with the assaults we noticed focusing on governmental organizations in Belgium, Italy, Serbia, and Poland. On the similar time, Webworm additionally made a foray into South Africa, compromising a neighborhood college.
In these newest campaigns, Webworm appears to have deserted Trochilus and McRat altogether, whereas persevering with to broaden its toolset. Chief among the many new instruments are two new backdoors: the Discord-based EchoCreep, and the Microsoft Graph-based GraphWorm. Whereas the group continued to make use of current proxy options, particularly the Go-written iox (port forwarding and intranet proxy software) and frp (quick reverse proxy), it additionally added {custom} proxy options WormFrp, ChainWorm, SmuxProxy, and WormSocket.
These {custom} proxy instruments should not solely able to encrypting communications, but additionally help chaining throughout a number of hosts each internally and externally to a community. We consider that the operators use these instruments along with SoftEther VPN to higher cowl their tracks and enhance the stealth of their actions. All Webworm proxies and VPN providers are cloud servers that belong to community infrastructure managed by Vultr and IT7 Networks. Primarily based on the variety of proxy instruments and their complexities, Webworm could also be making a a lot bigger hidden community by tricking victims into operating its proxies.
Discord and Microsoft Graph API C&C communication
In 2025, Webworm began abusing Discord and Microsoft Graph API for C&C communication. Whereas analyzing the EchoCreep backdoor, we managed to uncover greater than 400 Discord messages. We additionally discovered 4 distinctive channels, every similar to a special sufferer. EchoCreep makes use of Discord to add recordsdata, ship runtime studies, and obtain instructions. The backdoor’s community communication passes by means of Discord APIs utilizing crafted HTTP requests.
Within the case of GraphWorm, which makes use of Microsoft Graph API for C&C communication, we found that it makes use of OneDrive endpoints completely, particularly to get new jobs and to add sufferer data. A separate OneDrive listing is created for every particular sufferer. Because the occasion of OneDrive employed by GraphWorm is operating within the cloud, the backdoor can leverage the Microsoft Graph API endpoint /createUploadSession to add giant, staged recordsdata.
Amazon S3 bucket
Throughout our investigation of the 2025 campaigns, we found that Webworm had began utilizing its {custom} proxy answer WormFrp to retrieve configurations from a compromised Amazon S3 bucket positioned at wamanharipethe.s3.ap-south-1.‌amazonaws[.]com. An Amazon S3 bucket is a public cloud storage answer accessible in Amazon Internet Companies, with the S3 standing for easy storage service. We consider that the compromised bucket is the publicly accessible – and even, probably coverage misconfigured – model of whpjewellers.s3.amazonaws[.]com.
Our preliminary evaluation of the recordsdata saved within the bucket revealed a number of snapshots from digital machine hosts, one in all which contained the present configuration and energetic state of a machine belonging to a governmental entity in Italy. This might imply that the operators had been capable of efficiently penetrate the surroundings answerable for managing the sufferer’s digital machines. Nevertheless, they might simply as nicely have gained entry to solely a single host the place snapshots had been saved. Both manner, it’s obvious that by means of this S3 bucket, Webworm can exfiltrate information whereas an unsuspecting sufferer foots the invoice for the service.
In late October 2025, the risk actors uploaded one other file to the S3 bucket, an executable named SharpSecretsdump. This software, as talked about in its documentation, mimics the exercise of the notorious secretsdump.py from Impacket to dump credentials from the affected Home windows host it’s deployed on. We assume that Webworm operators uploaded this software to the S3 bucket to be used in opposition to their victims.
Between December 2025 and January 2026, the operators uploaded 20 new recordsdata to the service, two of which had been exfiltrated from a governmental entity in Spain. The primary of those two recordsdata, an XML file, comprises the saved configurations of digital hosts utilized by mRemoteNG, an open-source distant connection supervisor. The second file is a Microsoft Visio diagram detailing the infrastructure behind a website utilized by this governmental entity.
GitHub repository
Whereas going over EchoCreep’s Discord C&C infrastructure, we managed to retrieve Discord’s distinctive identifiers regarding customers, channels, and guilds. Sadly, with restricted entry of the bot’s token, there have been no API calls that could possibly be used to enumerate the data surrounding the house owners of the server or the bot itself.
Nevertheless, the Discord messages revealed the GitHub repository https://github[.]com/anjsdgasdf/WordPress, which acts as a file stager for different instruments and malware utilized by Webworm (one such software used the compromised Amazon S3 bucket talked about above). As a direct fork of the official WordPress repository, it might cover in plain sight. Determine 1 exhibits an summary of this repository, with staged recordsdata positioned into the wp-admin listing.

Worming its manner in
Though we had been unable to search out the entry level that Webworm makes use of to compromise its victims, we’ve got found that the group employs open-source utilities to scrape sufferer net server recordsdata and directories, and seek for vulnerabilities inside.
We discovered this after noticing {that a} sufferer machine was speaking with a proxy server hosted at 64.176.85[.]158. Overview of the IP deal with confirmed that an open listing, which contained the aforementioned open-source utilities, had beforehand been hosted there on port 80. Determine 2 supplies a top-level view into this open listing itemizing.

The important thing directories related to our blogpost are nuclei/, .dirsearch/, and the .bash historical past file. As will be seen in Determine 3, Webworm operators had been capable of brute drive directories and recordsdata inside net servers by utilizing dirsearch, an online path scanner utility with the aptitude of filtering particular standing codes, and nuclei, an open-source vulnerability scanner, to establish any attainable vulnerabilities in opposition to particular targets.

The outcomes of operating dirsearch had been saved within the .dirsearch listing, which revealed that the software had been executed in opposition to 56 targets from quite a lot of nations similar to Spain, Hungary, Belgium, Nigeria, Czechia, and Serbia.
Within the nuclei listing, we discovered the LegalHackers script, named _1.sh. It’s a proof-of-concept exploit of CVE-2017-7692, a vulnerability permitting post-authentication distant code execution inside the webmail consumer SquirrelMail. Trying within the .bash_history listing, we found {that a} equally named script had been executed in opposition to a Serbian webmail goal. This results in the idea that the group obtained the Serbian sufferer’s credentials and should have been utilizing this vulnerability as a part of preliminary entry.
Toolset
On this blogpost, we glance intimately on the new additions to Webworm’s arsenal. First, at its two {custom} backdoors: EchoCreep and GraphWorm. Then, on the {custom} proxy options that the group deployed in its 2025 campaigns: WormFrp, ChainWorm, SmuxProxy, and WormSocket.
EchoCreep
EchoCreep is a brand new backdoor, written in Go, that makes use of Discord as a C&C server, with messages starting as early as March 21st, 2024. It’s able to executing the instructions proven in Desk 1.
Desk 1. EchoCreep instructions
| Command | Arguments | Description |
| add | File path | Uploads a file, as an attachment, to Discord from the desired file system path. |
| obtain | Supply (URL) and vacation spot (path) | Downloads a file from the supplied supply URL to the file system path vacation spot. |
| shell | String | Executes the string inside a cmd.exe shell. |
| sleep | Integer (seconds) | Sleeps for the desired variety of seconds earlier than offering successful report again to the Discord server. |
Whereas we had been unable to substantiate how the backdoor made its manner onto the sufferer machine, it seems that persistence was solely obtained post-compromise by way of C&C instructions.
All of EchoCreep’s community communication is handed by means of Discord API endpoints utilizing crafted HTTP requests. To parse instructions, the backdoor first must decode them utilizing base64, after which decipher them utilizing AES-CBC-128. Determine 4 exhibits an instance of a command and a reply after each have been decrypted.
{"guild": "lol", "channel_id": 1220298277849796651, "channel": "fireplace", "content material": "shell whoami", "time": "2025-04-14T08:35:41.751000+00:00", "author_id": 1219910976007045171, "creator": "jonson889912"}
Determine 4. EchoCreep command and reply
From all 433 Discord messages we decrypted, it was not evident precisely who was impacted since they don’t seem to be ESET clients. Nevertheless, we had been no less than capable of decide the variety of victims compromised by EchoCreep primarily based on channel names. We found that these names had been both the sufferer’s IP deal with, or a mix of the IP deal with and the sufferer machine’s hostname. Having discovered 4 distinctive channels utilizing this naming conference, we consider that there are 4 victims.
Upon EchoCreep’s first execution, it doesn’t try and create a brand new channel, however sends a message saying Up Success to a channel that already exists (see Determine 5 and Determine 6). This means that the channels had been created previous to the execution of the backdoor, suggesting that the operators both knew the targets or exfiltrated the mandatory data following preliminary entry.


The earliest messages, despatched from March 21st, 2024 to March 31st, 2025, seem to have been operator take a look at instructions. Determine 7 exhibits that the risk actors left some details about their native IP configurations in there.
Ethernet adapter Ethernet0:
Connection-specific DNS Suffix . : lan
Hyperlink-local IPv6 Handle . . . . . : fe80::2111:d79b:b1ba:1f4apercent10
IPv4 Handle. . . . . . . . . . . : 192.168.8.174
Subnet Masks . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.8.1
Determine 7. Home windows ipconfig output
Most of the different earlier messages contained rubbish values, probably used as a take a look at to establish correct communication, as seen in Determine 8.

Quickly afterwards, we started to see obtain operations happen like these in Determine 9, displaying the event of superior instructions.

As well as, in Determine 10, we see testing actions which will have been early diversifications of the persistence mechanism that Webworm would use later in opposition to victims. What’s additionally attention-grabbing is that it executes the run command as a substitute of the ultimately used shell command, supporting our willpower that these had been early exams.

The very first compromise occurred on April 9th, 2025, when new Up Success messages appeared within the logs related to a brand new channel title. Shortly after the preliminary compromise, the risk actor used shell instructions to execute curl to obtain recordsdata.
GraphWorm
GraphWorm is one other new backdoor wielded by Webworm. It executes itself each time the sufferer logs in to the machine. GraphWorm makes use of the Microsoft Graph API for C&C communication, displaying that Webworm has new infrastructure in place to compromise victims, storing data inside a Microsoft Graph tenant. Primarily based on what we’ve seen, the backdoor completely makes use of OneDrive to obtain instructions and ship sufferer information. The info concerned in these communications is first AES-256-CBC encrypted utilizing OpenSSL EVP library calls, after which base64 encoded. GraphWorm additionally permits for proxy settings to be configured, thus tunneling any site visitors by means of the desired proxy.
On first execution, the backdoor creates a novel sufferer ID by concatenating the community adapter IP, processor ID, and the serial variety of a bodily machine utilizing the WMI framework.
The distinctive ID is used within the course of to rename or create a brand new OneDrive folder inside the tenant. Every folder is exclusive to a compromise, containing particular subfolders underneath every sufferer. The three subfolders /recordsdata, /consequence, and /job are used to retailer recordsdata, outcomes of instructions executed on the sufferer machine, and jobs queued by the operators to execute, respectively.
After the folder has been created efficiently, the backdoor collects details about the sufferer machine, ensuing within the JSON object seen in Determine 11.
{
"Host Identify": "",
"IP Handle": "",
"MAC Handle": "",
"Working System": "",
"Privilege": "",
"Time Zone": "",
"Person Identify": "",
"Workgroup": ""
}
Determine 11. Configuration construction
The instructions that GraphWorm receives by means of OneDrive are described in Desk 2, so as of discovery.
Desk 2. GraphWorm instructions
| Command | Arguments | Description |
| keyExchange | String |
This worth is about in reminiscence and sadly its objective just isn’t simply identifiable. It could possibly be used to set a public key inside the utility to realize reverse shell entry. |
| sessionKey | String |
One other set of values set inside reminiscence and never evident how they’re used. Believed to be an RSA personal key and AES key to be up to date in reminiscence and used for cryptographic features. |
| kill | N/A | Stops the execution of the backdoor. |
| shell | N/A | Spawns a brand new occasion of cmd.exe. |
| exec | File path | Executes a brand new course of utilizing CreateProcessW. |
| add | String |
Downloads a file primarily based on the OneDrive and agent path. The |
| sleep | Integer | Updates sleep period. |
| ballot | Integer | Updates sleep period for an undetermined cause. Presumably as a result of the event of instructions continues to be ongoing. |
| relaxation | Integer | Sleep for a period of time. |
| improve | JSON textual content | The JSON textual content comprises configuration settings to replace fields in reminiscence, adopted by writing of those adjustments to the config.dat file on disk. |
| obtain | String |
Uploads the file from the supplied |
| heartbeat | Integer |
Used to create a random delay interval between the min and max of how lengthy to attend to replace alive.txt. |
Throughout our analysis, we seen that upon completion of the shell command, the outcomes had been written to a file beacon_shell_output.txt and saved in a short lived listing. To add these giant shell command outputs, the operators almost certainly leveraged the Microsoft Graph API endpoint /createUploadSession, for the reason that backdoor offers with a cloud occasion of OneDrive.
WormFrp
WormFrp is a proxy tunneling software impressed by the present quick reverse proxy (frp) utility that Webworm additionally makes use of. The risk actors expanded frp with {custom} functionalities in order that the software can get hold of its configuration values from a compromised Amazon S3 bucket, wamanharipethe.s3.ap-south-1.amazonaws[.]com.
The compromised S3 bucket comprises a number of recordsdata with .txt extensions which might be AES encrypted utilizing ECB mode. Every WormFrp occasion is hardcoded with a novel AES key and retrieves a novel file from the S3 bucket. The configuration file is up to date throughout WormFrp execution to ship data again to the operator to establish the place the tunnel connects from.
WormFrp requires a command line argument to run. After acquiring its configuration from the S3 bucket, WormFrp makes an attempt to log into an frp server, opening a reverse proxy and TCP SOCKS5 proxy. Primarily based on noticed samples, the username and password are at all times randomly generated.
Every occasion of WormFrp connects to an frp server by means of a public IP deal with. Further community exercise could also be seen from the sufferer’s machine as soon as the reverse proxy is configured.
ChainWorm
ChainWorm is one other {custom} proxy software utilized by Webworm operators. It seems that ChainWorm’s foremost perform is to help in increasing Webworm’s community infrastructure of proxies by opening a port on the machine on which it’s deployed. Webworm can use this software to chain proxies the place particularly crafted information is shipped by means of the port connecting to a different distant system, forwarding the site visitors to the following vacation spot for an indeterminate variety of hops.
Sometimes, the port that’s opened on the impacted host is hardcoded within the software. TCP connections are then opened on the hardcoded port to obtain any transmissions that might result in extra outbound connections of both a direct IP deal with or hostname together with its port.
Utilizing the mix of the hostname and port, a connection is made to the following hop within the chain. With connections established between supply and vacation spot, any information handed by means of is now forwarded to the following upstream hop within the chain. If at any level there’s an exception, the supply is notified with the 0x05 01 00 01 00 00 00 00 00 00 byte sequence earlier than trying to reconnect.
SmuxProxy
SmuxProxy is a utility primarily based on iox, a port forwarding and intranet proxy software. On prime of the present iox performance, SmuxProxy comprises small customizations to permit for a hardcoded server IP deal with and port, making it simpler for operators to drop and execute. It could additionally generate a random key and initialization vector for encrypted communications.
WormSocket
The final of Webworm’s new {custom} proxies is WormSocket, a software that makes use of configured servers operating socket.io to ascertain a proxy for net requests. WormSocket permits for a extremely configurable and scalable proxy community, permitting particular nodes to be interacted with at any given time.
Its configuration depends on each hardcoded values and command line arguments. WormSocket accepts an optionally available command line argument –proxy adopted by a URI containing primary authentication, used as a configuration to create a WebProxy object. The proxy is then used on prime of a connection to an online socket. Configurations for this net socket are hardcoded in WormSocket.
As soon as WormSocket has began, it first connects to the configured IP deal with and port by trying connections utilizing ws, wss, http, and https schemes. As soon as a profitable connection is made, an asynchronous activity is spawned to obtain and ship new messages. There are 4 attainable message varieties, described intimately in Desk 3.
| Kind | Message class | Values | Description |
| 1 | InitiateForwarderClientReq | String |
Makes use of the IpAddress area to carry out a DNS lookup to acquire the host deal with of a attainable area handed by means of, the results of which is used to create a brand new TCP consumer with the Port. As soon as the consumer establishes connectivity, it’s saved inside a dictionary of ForwardedClientId and TcpClient pairs. As well as, a brand new InitiateForwarderClientRep message object is created with the identical data used to construct the TCP consumer, and despatched with the messages learn by means of the consumer and saved in a ConcurrentQueue for later use. |
| String |
|||
| Integer |
|||
| 2 | InitiateForwarderClientRep | String |
ForwarderClientId is used to search for an already configured TCP consumer created by InitiateForwarderClientReq within the consumer dictionary, all different values seem to not be in use. As soon as the TCP consumer is retrieved, new messages are learn and saved in a ConcurrentQueue for later use. |
| String |
|||
| Integer |
|||
| Integer |
|||
| Integer |
|||
| 3 | SendDataMessage | String |
Sends the Information by means of base64 encoding adopted by the TCP consumer related to ForwarderClientId. |
| Bytes[] | |||
| 4 | CheckInMessage | String |
Assigns MessengerId to the interior MessengerId, which doesn’t seem for use for something. |
Conclusion
Webworm is a China-aligned APT group energetic since no less than 2022. It employs a continually evolving toolkit comprising primarily backdoors and a mix of open-source and {custom} proxy utilities. Within the 2025 campaigns we noticed, Webworm started utilizing Discord-based (EchoCreep) and Microsoft Graph API-based (GraphWorm) backdoors. The group additionally continues to stage recordsdata in GitHub repositories, and we will solely assume that it’ll maintain doing so sooner or later.
By our evaluation, we had been lucky sufficient to get better instructions executed from a server that gave a view into the group’s potential preliminary entry methods, utilizing an open-source vulnerability scanner, in addition to figuring out a few of its targets.
It’s clear that Webworm is a really energetic APT group that can proceed trying to make use of new instruments to compromise its victims, whether or not this be from an preliminary entry level, or put up compromise.
For any inquiries about our analysis revealed on WeLiveSecurity, please contact us at threatintel@eset.com.ÂESET Analysis affords personal APT intelligence studies and information feeds. For any inquiries about this service, go to the ESET Menace Intelligence web page.
IoCs
A complete record of indicators of compromise (IoCs) and samples will be present in our GitHub repository.
Recordsdata
| SHA-1 | Filename | Detection | Description |
| CB4E5043333670738142 |
SearchApp.exe | WinGo/Agent.ZK | EchoCreep backdoor utilizing Discord for C&C. |
| 1DF40A4A31B30B62EC33 |
ssh.exe | WinGo/HackTool. |
WormFrp proxy software. |
| 7DCFE9EE25841DFD58D3 |
svc.exe | MSIL/HackTool. |
WormHole proxy software. |
| 77F1970D620216C5FFF4 |
C2OverOneDrive_v |
Win32/Agent.VWD | GraphWorm backdoor utilizing the Microsoft Graph API for C&C. |
| 948159A7FC2E68838686 |
MessengerClient. |
MSIL/HackTool.P |
WormSocket proxy software. |
| A3C077BDF8898E612CCD |
dsocks.exe | WinGo/Riskware. |
SmuxProxy, a {custom} iox with hardcoded IP. |
Community
| IP | Area | Internet hosting supplier | First seen | Particulars |
| N/A | wamanharipethe. |
N/A | 2025-04-14 | Compromised S3 for frp configurations and information exfiltration. |
| 45.77.13[.]67 | N/A | Vultr Holdings, LLC | 2025-04-07 | WormSocket net socket server. |
| 64.176.85[.]158 | N/A | The Fixed Firm, LLC | 2025-06-28 | SmuxProxy server. |
| 104.243.23[.]43 | N/A | IT7 Networks Inc | 2025-04-09 | SmuxProxy server. |
| 108.61.200[.]151 | N/A | Vultr Holdings, LLC | 2025-04-10 | WormFrp proxy server. |
| 144.168.60[.]233 | N/A | IT7 Networks Inc | 2025-06-30 | Reverse shell IP found on SmuxProxy server. |
MITRE ATT&CK methods
This desk was constructed utilizing model 19 of the MITRE ATT&CK framework.
| Tactic | ID | Identify | Description |
| Reconnaissance | T1595.002 | Energetic Scanning: Vulnerability Scanning | Webworm utilized the open-source vulnerability scanner nuclei in opposition to targets. |
| T1595.003 | Energetic Scanning: Wordlist Scanning | Webworm used dirsearch, which leverages wordlists, to carry out net listing scanning on targets. | |
| Useful resource Growth | T1588.006 | Receive Capabilities: Vulnerabilities | Webworm used publicly accessible exploit code for post-authentication distant code execution. |
| T1583.004 | Purchase Infrastructure: Server | Servers for WormFrp, SmuxProxy, and WormSocket are hosted on cloud providers operated on Vultr and IT7 Community ASNs. | |
| T1583.003 | Purchase Infrastructure: Digital Personal Server | Webworm makes use of SoftEther VPN servers which have been seen hosted on Vultr cloud providers. | |
| T1584.006 | Compromise Infrastructure: Internet Companies | Webworm has been seen compromising S3 buckets in addition to utilizing instruments like nuclei to search out footholds. | |
| T1608.002 | Stage Capabilities: Add Device | Webworm staged instruments in its GitHub repo for direct obtain onto compromised methods. | |
| Execution | T1059.003 | Command and Scripting Interpreter: Home windows Command Shell | EchoCreep and GraphWorm each use the Home windows command line to execute operator instructions. |
| T1053.005 | Scheduled Job/Job: Scheduled Job | EchoCreep is executed underneath the custom-created MicrosoftSSHUpdate scheduled activity. | |
| Persistence | T1547.001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | GraphWorm persists by making updates to registry Run keys. |
| Protection Impairment | T1070.004 | Indicator Removing: File Deletion | GraphWorm cleans up a created beacon file after profitable add. |
| T1112 | Modify Registry | GraphWorm makes modifications to registry Run keys for persistence. | |
| T1027.013 | Obfuscated Recordsdata or Data: Encrypted/Encoded File | GraphWorm and EchoCreep use encryption and encoding methods to obfuscate information. | |
| T1550.001 | Use Alternate Authentication Materials: Software Entry Token | GraphWorm and EchoCreep use API keys to speak with the C&C infrastructure. | |
| T1078.004 | Legitimate Accounts: Cloud Accounts | GraphWorm makes use of a sound cloud account to entry Microsoft Graph APIs. | |
| T1070.006 | Indicator Removing: Timestomp | EchoCreep comprises a modified timestamp attribute. | |
| Lateral Motion | T1021.007 | Distant Companies: Cloud Companies | Webworm makes use of a compromised S3 bucket to make use of as a file staging zone. |
| Assortment | T1005 | Information from Native System | Each EchoCreep and GraphWorm can accumulate information from the native system. |
| T1074.001 | Information Staged: Native Information Staging | GraphWorm levels a beacon file domestically earlier than importing to the C&C. | |
| T1074.002 | Information Staged: Distant Information Staging | GraphWorm levels recordsdata and duties inside OneDrive by way of the Microsoft Graph API. | |
| Command and Management | T1071.001 | Software Layer Protocol: Internet Protocols | EchoCreep, GraphWorm, and WormSocket make use of HTTP and the WebSocket protocol. |
| T1132.001 | Information Encoding: Commonplace Encoding | EchoCreep, GraphWorm, and WormSocket make use of base64 encoding. | |
| T1573.002 | Encrypted Channel: Uneven Cryptography | EchoCreep, GraphWorm, WormSocket, and WormFrp use AES in some capability. | |
| T1090.003 | Proxy: Multi-hop Proxy | WormSocket and ChainWorm create a number of proxy hops. | |
| T1090.002 | Proxy: Exterior Proxy | WormFrp, ChainWorm, WormSocket, SmuxProxy, and GraphWorm have the aptitude to hook up with exterior proxies. | |
| T1090.001 | Proxy: Inside Proxy | ChainWorm and WormSocket can create inner proxies. | |
| T1102.002 | Internet Service: Bidirectional Communication | EchoCreep and GraphWorm use Discord and the Microsoft Graph API for C&C infrastructure. | |
| Exfiltration | T1041 | Exfiltration Over C2 Channel | EchoCreep and GraphWorm exfiltrate information to their respective C&C infrastructures. |
| T1567.002 | Exfiltration Over Internet Service: Exfiltration to Cloud Storage | GraphWorm exfiltrates information to OneDrive by way of the Microsoft Graph API. |








