'Webworm' APT Group Deploys 'EchoCreep' and 'GraphWorm' Backdoors Targeting Government and Enterprise

Chinese APT 'Webworm' Uses Discord and MS Graph API for C2 in New Backdoor Attacks

HIGH
May 20, 2026
5m read
Threat ActorMalwareThreat Intelligence

Related Entities

Threat Actors

WebwormFishMongerAquatic PandaSixLittleMonkeysSpace Pirates

Products & Tech

Microsoft Graph API

Other

EchoCreepGraphWormDiscord

Full Report

Executive Summary

Cybersecurity researchers have identified new activity from Webworm, a China-aligned advanced persistent threat (APT) group. The group is deploying two new custom backdoors, EchoCreep and GraphWorm, which use legitimate third-party services for command-and-control (C2) communications. EchoCreep uses Discord, while GraphWorm leverages the Microsoft Graph API. This is a classic 'living off the trusted channel' technique designed to make the C2 traffic appear as legitimate activity, thereby bypassing network security controls like firewalls and intrusion detection systems. The group continues to target government and critical infrastructure sectors, expanding its geographic focus from Asia to Europe and Africa, signaling a broadening of its intelligence-gathering objectives.

Threat Overview

Webworm (which overlaps with other Chinese threat clusters like FishMonger and Space Pirates) is a sophisticated threat actor known for its custom malware and evolving tactics. The introduction of EchoCreep and GraphWorm marks a significant upgrade to their toolkit.

  • EchoCreep: This backdoor uses the Discord platform for C2. It can receive commands and exfiltrate data through Discord's API, likely by posting messages to a private channel or direct message.
  • GraphWorm: This backdoor uses the Microsoft Graph API, a legitimate developer tool for interacting with Microsoft 365 data. The malware can use the API to store data, receive commands, and exfiltrate information, all under the guise of legitimate Microsoft 365 traffic. By using these popular and trusted services, the attackers make it extremely difficult for defenders to block or even identify the malicious traffic without disrupting legitimate business operations.

Technical Analysis

This campaign is a prime example of C2 channel abuse.

MITRE ATT&CK Techniques

Impact Assessment

  • Stealthy Espionage: The primary goal of Webworm is likely intelligence gathering. The stealthy nature of their new backdoors allows for long-term persistence inside a target network without being detected.
  • Data Exfiltration: The group targets government, IT, aerospace, and energy sectors, indicating an interest in stealing state secrets, intellectual property, and other sensitive data.
  • Detection Challenge: The use of legitimate services for C2 presents a major challenge for defenders. Blocking Discord or Microsoft Graph API traffic is often not feasible in a corporate environment, forcing security teams to rely on more subtle behavioral indicators.

IOCs — Directly from Articles

No specific Indicators of Compromise (IOCs) such as C2 domains or file hashes were provided in the source articles.

Cyber Observables — Hunting Hints

Detecting this activity requires looking for anomalies in legitimate traffic:

  • Unusual User-Agents: Monitor for processes on servers or workstations making HTTPS requests to discord.com or graph.microsoft.com with unusual or non-standard user-agent strings.
  • Processes Accessing Discord: It is highly unusual for a server-side process or a non-interactive user process to be communicating with Discord's API. This should be a high-fidelity alert.
  • MS Graph API Auditing: In Microsoft 365, enable and monitor audit logs for the Graph API. Look for applications being granted suspicious permissions (e.g., Mail.ReadWrite, Files.ReadWrite.All) or unusual activity from non-standard applications.

Detection & Response

  • Egress Traffic Filtering: While blocking the services entirely may not be possible, organizations should implement egress traffic filtering with SSL/TLS inspection. This allows for the inspection of the content of the traffic to identify malicious commands or exfiltrated data. This is a core part of D3FEND's Outbound Traffic Filtering (D3-OTF).
  • Endpoint Detection and Response (EDR): An EDR solution can detect the initial execution of the backdoor and the suspicious processes that are making the C2 connections.
  • Cloud App Security Brokers (CASB): A CASB can provide granular visibility and control over how employees and applications interact with cloud services like Discord and Microsoft 365.

Mitigation

  • M1021 - Restrict Web-Based Content: If Discord is not used for business purposes, block it at the network perimeter. For Microsoft Graph, use application control policies to restrict which applications can access the API and what permissions they have.
  • M1038 - Execution Prevention: Focus on preventing the initial execution of the backdoor through robust email security, user training, and application whitelisting.
  • M1047 - Audit: Regularly audit Microsoft 365 and other cloud service logs for anomalous API usage. This is critical for detecting abuse of legitimate channels.

Timeline of Events

1
May 20, 2026
This article was published

MITRE ATT&CK Mitigations

Implement egress filtering and SSL/TLS inspection to identify and block malicious C2 traffic, even when it's headed to legitimate services.

Mapped D3FEND Techniques:

Block access to services like Discord if they are not required for business operations.

Mapped D3FEND Techniques:

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

APTWebwormThreat ActorChinaDiscordMicrosoft Graph APIC2

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.