Skip to content
The Exploit Desk
MediumGovernment, Military & Defense

Webworm Deploys EchoCreep and GraphWorm Backdoors Using Discord and MS Graph API

1 min readOriginal source ↗
Source image

Cybersecurity researchers have flagged fresh activity from a China-aligned threat actor known as Webworm in 2025, deploying custom backdoors that employ Discord and Microsoft Graph API for command-and-control (C2 or C&C) communications. Webworm, first publicly documented by Broadcom-owned Symantec in September 2022, is assessed to be active since at least 2022, targeting government agencies

Cybersecurity researchers have flagged fresh activity from a China-aligned threat actor known as Webworm in 2025, deploying custom backdoors that employ Discord and Microsoft Graph API for command-and-control (C2 or C&C) communications. Webworm, first publicly documented by Broadcom-owned Symantec in September 2022, is assessed to be active since at least 2022, targeting government agencies

This summary was generated from open reporting. Read the full original article ↗

Discussion

Posting as anonymousMarkdown: **bold** `code` links

Loading discussion…