Cybersecurity researchers have identified new activity from Webworm, a China-aligned advanced persistent threat (APT) group. The group is deploying two new custom backdoors, EchoCreep and GraphWorm, which use legitimate third-party services for command-and-control (C2) communications. EchoCreep uses Discord, while GraphWorm leverages the Microsoft Graph API. This is a classic 'living off the trusted channel' technique designed to make the C2 traffic appear as legitimate activity, thereby bypassing network security controls like firewalls and intrusion detection systems. The group continues to target government and critical infrastructure sectors, expanding its geographic focus from Asia to Europe and Africa, signaling a broadening of its intelligence-gathering objectives.
Webworm (which overlaps with other Chinese threat clusters like FishMonger and Space Pirates) is a sophisticated threat actor known for its custom malware and evolving tactics. The introduction of EchoCreep and GraphWorm marks a significant upgrade to their toolkit.
This campaign is a prime example of C2 channel abuse.
T1071.001 - Web Protocols: The backdoors use HTTPS to communicate with the Discord and Microsoft Graph APIs, which is a common web protocol.T1105 - Ingress Tool Transfer: The backdoors themselves must be delivered to the victim, likely via spearphishing or exploiting a public-facing application.T1102.002 - Bidirectional Communication: The malware uses a legitimate web service (Discord/MS Graph) for two-way communication, receiving commands and sending back data.T1568.002 - Domain Generation Algorithms: While not DGA, using legitimate domains like discord.com and graph.microsoft.com achieves the same goal of having a dynamic and hard-to-block C2 infrastructure.T1059.003 - Windows Command Shell: The backdoors, once they receive a command, will likely use the command shell to execute it on the victim's machine.No specific Indicators of Compromise (IOCs) such as C2 domains or file hashes were provided in the source articles.
Detecting this activity requires looking for anomalies in legitimate traffic:
discord.com or graph.microsoft.com with unusual or non-standard user-agent strings.Mail.ReadWrite, Files.ReadWrite.All) or unusual activity from non-standard applications.M1021 - Restrict Web-Based Content: If Discord is not used for business purposes, block it at the network perimeter. For Microsoft Graph, use application control policies to restrict which applications can access the API and what permissions they have.M1038 - Execution Prevention: Focus on preventing the initial execution of the backdoor through robust email security, user training, and application whitelisting.M1047 - Audit: Regularly audit Microsoft 365 and other cloud service logs for anomalous API usage. This is critical for detecting abuse of legitimate channels.Implement egress filtering and SSL/TLS inspection to identify and block malicious C2 traffic, even when it's headed to legitimate services.
Mapped D3FEND Techniques:
Block access to services like Discord if they are not required for business operations.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.