ESET researchers analyzed the 2025 exercise of Webworm, a China-aligned APT group that started off concentrating on organizations in Asia, however has lately shifted its focus to Europe. Despite the fact that that is our first public blogpost on the group, we’ve got been observing Webworm’s actions ever since Symantec first reported on this menace actor in 2022. Through the years, we’ve got seen that this menace actor regularly adjustments its ways, methods, and procedures (TTPs).
Webworm is linked to different China-aligned APT teams resembling SixLittleMonkeys and FishMonger. Previously, it made use of well-known malware households resembling McRat (aka 9002 RAT) and Trochilus, although in recent times, it has began transferring towards each present and {custom} proxy instruments, that are extra stealthy than full-fledged backdoors. In 2025, Webworm additionally added two new backdoors to its toolset: EchoCreep, which makes use of Discord for C&C communication, and GraphWorm, which makes use of Microsoft Graph API for a similar goal. The group can also be identified for staging its malware and instruments in GitHub repositories, making certain that malware might be immediately downloaded onto the sufferer’s machine.
Key factors of the blogpost:
- Since its discovery in 2022, the Webworm APT group has been actively updating its toolset and concentrating on.
- In 2025, the group began using backdoors that use Discord and Microsoft Graph API for C&C communication.
- ESET researchers decrypted over 400 Discord messages and a bash historical past file found on an operator server with reconnaissance instructions used towards greater than 50 distinctive targets.
- Along with backdoors, Webworm leverages a number of present and {custom} proxy instruments.
- The group makes use of GitHub to stage its malware.
We attribute the 2025 marketing campaign to Webworm based mostly on the data we found after decrypting the Discord messages utilized by the EchoCreep backdoor for C&C communication. The data led us to the attackers’ GitHub repository, which contained staged artifacts such because the SoftEther VPN software. Contained in the SoftEther configuration file, we discovered an IP tackle that matches a identified Webworm IP.
Victims who have been impacted by Webworm from international locations talked about later on this blogpost have been appropriately notified. As well as, companies we’ve got recognized, resembling a GitHub repository and an S3 bucket, have been taken down.
Evolving strategy
In 2022, one in every of Webworm’s important traits was using established backdoors and distant entry trojans (RATs) resembling McRat and Trochilus. As described within the Symantec blogpost, the group initially focused primarily international locations in Asia.
In 2024, we noticed that the group began to maneuver away from conventional backdoors in favor of reputable or semi-legitimate instruments, resembling SOCKS proxies (SoftEther VPN) and different networking options. Whereas these assist Webworm evade detection, in addition they lack the complete set of instructions usually accessible in backdoors, so the operators must depend on command interpreters resembling cmd.exe or powershell.exe.
At the moment, we additionally noticed that the group began to decelerate operations in Asia and shift its focus towards European international locations. This development continued in 2025, with the assaults we noticed concentrating on governmental organizations in Belgium, Italy, Serbia, and Poland. On the identical time, Webworm additionally made a foray into South Africa, compromising an area college.
In these newest campaigns, Webworm appears to have deserted Trochilus and McRat altogether, whereas persevering with to increase its toolset. Chief among the many new instruments are two new backdoors: the Discord-based EchoCreep, and the Microsoft Graph-based GraphWorm. Whereas the group continued to make use of present proxy options, particularly the Go-written iox (port forwarding and intranet proxy software) and frp (quick reverse proxy), it additionally added {custom} proxy options WormFrp, ChainWorm, SmuxProxy, and WormSocket.
These {custom} proxy instruments aren’t solely able to encrypting communications, but in addition help chaining throughout a number of hosts each internally and externally to a community. We consider that the operators use these instruments along with SoftEther VPN to higher cowl their tracks and improve the stealth of their actions. All Webworm proxies and VPN companies are cloud servers that belong to community infrastructure managed by Vultr and IT7 Networks. Based mostly on the variety of proxy instruments and their complexities, Webworm could also be making a a lot bigger hidden community by tricking victims into operating its proxies.
Discord and Microsoft Graph API C&C communication
In 2025, Webworm began abusing Discord and Microsoft Graph API for C&C communication. Whereas analyzing the EchoCreep backdoor, we managed to uncover greater than 400 Discord messages. We additionally discovered 4 distinctive channels, every equivalent to a unique sufferer. EchoCreep makes use of Discord to add recordsdata, ship runtime experiences, and obtain instructions. The backdoor’s community communication passes by means of Discord APIs utilizing crafted HTTP requests.
Within the case of GraphWorm, which makes use of Microsoft Graph API for C&C communication, we found that it makes use of OneDrive endpoints completely, particularly to get new jobs and to add sufferer data. A separate OneDrive listing is created for every particular sufferer. Because the occasion of OneDrive employed by GraphWorm is operating within the cloud, the backdoor can leverage the Microsoft Graph API endpoint /createUploadSession to add massive, staged recordsdata.
Amazon S3 bucket
Throughout our investigation of the 2025 campaigns, we found that Webworm had began utilizing its {custom} proxy answer WormFrp to retrieve configurations from a compromised Amazon S3 bucket situated at wamanharipethe.s3.ap-south-1.amazonaws[.]com. An Amazon S3 bucket is a public cloud storage answer accessible in Amazon Internet Companies, with the S3 standing for easy storage service. We consider that the compromised bucket is the publicly accessible – and even, presumably coverage misconfigured – model of whpjewellers.s3.amazonaws[.]com.
Our preliminary evaluation of the recordsdata saved within the bucket revealed a number of snapshots from digital machine hosts, one in every of which contained the present configuration and energetic state of a machine belonging to a governmental entity in Italy. This might imply that the operators have been capable of efficiently penetrate the setting liable for managing the sufferer’s digital machines. Nonetheless, they may simply as nicely have gained entry to solely a single host the place snapshots have been saved. Both approach, it’s obvious that by means of this S3 bucket, Webworm can exfiltrate information whereas an unsuspecting sufferer foots the invoice for the service.
In late October 2025, the menace actors uploaded one other file to the S3 bucket, an executable named SharpSecretsdump. This software, as talked about in its documentation, mimics the exercise of the notorious secretsdump.py from Impacket to dump credentials from the affected Home windows host it’s deployed on. We assume that Webworm operators uploaded this software to the S3 bucket to be used towards their victims.
Between December 2025 and January 2026, the operators uploaded 20 new recordsdata to the service, two of which had been exfiltrated from a governmental entity in Spain. The primary of those two recordsdata, an XML file, incorporates the saved configurations of digital hosts utilized by mRemoteNG, an open-source distant connection supervisor. The second file is a Microsoft Visio diagram detailing the infrastructure behind a site utilized by this governmental entity.
GitHub repository
Whereas going over EchoCreep’s Discord C&C infrastructure, we managed to retrieve Discord’s distinctive identifiers regarding customers, channels, and guilds. Sadly, with restricted entry of the bot’s token, there have been no API calls that could possibly be used to enumerate the data surrounding the homeowners of the server or the bot itself.
Nonetheless, the Discord messages revealed the GitHub repository https://github[.]com/anjsdgasdf/WordPress, which acts as a file stager for different instruments and malware utilized by Webworm (one such software used the compromised Amazon S3 bucket talked about above). As a direct fork of the reputable WordPress repository, it might cover in plain sight. Determine 1 exhibits an outline of this repository, with staged recordsdata positioned into the wp-admin listing.

Worming its approach in
Despite the fact that we have been unable to search out the entry level that Webworm makes use of to compromise its victims, we’ve got found that the group employs open-source utilities to scrape sufferer internet server recordsdata and directories, and seek for vulnerabilities inside.
We discovered this after noticing {that a} sufferer machine was speaking with a proxy server hosted at 64.176.85[.]158. Assessment of the IP tackle confirmed that an open listing, which contained the aforementioned open-source utilities, had beforehand been hosted there on port 80. Determine 2 gives a top-level view into this open listing itemizing.

The important thing directories related to our blogpost are nuclei/, .dirsearch/, and the .bash historical past file. As might be seen in Determine 3, Webworm operators have been capable of brute power directories and recordsdata inside internet servers by utilizing dirsearch, an online path scanner utility with the aptitude of filtering particular standing codes, and nuclei, an open-source vulnerability scanner, to establish any attainable vulnerabilities towards particular targets.

The outcomes of operating dirsearch have been saved within the .dirsearch listing, which revealed that the software had been executed towards 56 targets from quite a lot of international locations resembling Spain, Hungary, Belgium, Nigeria, Czechia, and Serbia.
Within the nuclei listing, we discovered the LegalHackers script, named _1.sh. It’s a proof-of-concept exploit of CVE-2017-7692, a vulnerability permitting post-authentication distant code execution throughout the webmail consumer SquirrelMail. Wanting within the .bash_history listing, we found {that a} equally named script had been executed towards a Serbian webmail goal. This results in the belief that the group obtained the Serbian sufferer’s credentials and should have been utilizing this vulnerability as a part of preliminary entry.
Toolset
On this blogpost, we glance intimately on the new additions to Webworm’s arsenal. First, at its two {custom} backdoors: EchoCreep and GraphWorm. Then, on the {custom} proxy options that the group deployed in its 2025 campaigns: WormFrp, ChainWorm, SmuxProxy, and WormSocket.
EchoCreep
EchoCreep is a brand new backdoor, written in Go, that makes use of Discord as a C&C server, with messages starting as early as March 21st, 2024. It’s able to executing the instructions proven in Desk 1.
Desk 1. EchoCreep instructions
| Command | Arguments | Description |
| add | File path | Uploads a file, as an attachment, to Discord from the desired file system path. |
| obtain | Supply (URL) and vacation spot (path) | Downloads a file from the offered supply URL to the file system path vacation spot. |
| shell | String | Executes the string inside a cmd.exe shell. |
| sleep | Integer (seconds) | Sleeps for the desired variety of seconds earlier than offering successful report again to the Discord server. |
Whereas we have been unable to substantiate how the backdoor made its approach onto the sufferer machine, it seems that persistence was solely obtained post-compromise by way of C&C instructions.
All of EchoCreep’s community communication is handed by means of Discord API endpoints utilizing crafted HTTP requests. To parse instructions, the backdoor first must decode them utilizing base64, after which decipher them utilizing AES-CBC-128. Determine 4 exhibits an instance of a command and a reply after each have been decrypted.
{"guild": "lol", "channel_id": 1220298277849796651, "channel": "hearth", "content material": "shell whoami", "time": "2025-04-14T08:35:41.751000+00:00", "author_id": 1219910976007045171, "writer": "jonson889912"}
Determine 4. EchoCreep command and reply
From all 433 Discord messages we decrypted, it was not evident precisely who was impacted since they aren’t ESET clients. Nonetheless, we have been at the very least capable of decide the variety of victims compromised by EchoCreep based mostly on channel names. We found that these names have been both the sufferer’s IP tackle, or a mix of the IP tackle and the sufferer machine’s hostname. Having discovered 4 distinctive channels utilizing this naming conference, we consider that there are 4 victims.
Upon EchoCreep’s first execution, it doesn’t try to create a brand new channel, however sends a message saying Up Success to a channel that already exists (see Determine 5 and Determine 6). This means that the channels have been created previous to the execution of the backdoor, suggesting that the operators both knew the targets or exfiltrated the required data following preliminary entry.


The earliest messages, despatched from March 21st, 2024 to March 31st, 2025, seem to have been operator take a look at instructions. Determine 7 exhibits that the menace actors left some details about their native IP configurations in there.
Ethernet adapter Ethernet0:
Connection-specific DNS Suffix . : lan
Hyperlink-local IPv6 Tackle . . . . . : fe80::2111:d79b:b1ba:1f4apercent10
IPv4 Tackle. . . . . . . . . . . : 192.168.8.174
Subnet Masks . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.8.1
Determine 7. Home windows ipconfig output
Most of the different earlier messages contained rubbish values, presumably used as a take a look at to establish correct communication, as seen in Determine 8.

Quickly afterwards, we started to see obtain operations happen like these in Determine 9, displaying the event of superior instructions.

As well as, in Determine 10, we see testing actions that will have been early diversifications of the persistence mechanism that Webworm would use later towards victims. What’s additionally attention-grabbing is that it executes the run command as an alternative of the finally used shell command, supporting our willpower that these have been early exams.

The very first compromise occurred on April 9th, 2025, when new Up Success messages appeared within the logs related to a brand new channel identify. Shortly after the preliminary compromise, the menace actor used shell instructions to execute curl to obtain recordsdata.
GraphWorm
GraphWorm is one other new backdoor wielded by Webworm. It executes itself each time the sufferer logs in to the machine. GraphWorm makes use of the Microsoft Graph API for C&C communication, displaying that Webworm has new infrastructure in place to compromise victims, storing data inside a Microsoft Graph tenant. Based mostly on what we’ve seen, the backdoor completely makes use of OneDrive to obtain instructions and ship sufferer information. The information concerned in these communications is first AES-256-CBC encrypted utilizing OpenSSL EVP library calls, after which base64 encoded. GraphWorm additionally permits for proxy settings to be configured, thus tunneling any site visitors by means of the desired proxy.
On first execution, the backdoor creates a singular sufferer ID by concatenating the community adapter IP, processor ID, and the serial variety of a bodily gadget utilizing the WMI framework.
The distinctive ID is used within the course of to rename or create a brand new OneDrive folder throughout the tenant. Every folder is exclusive to a compromise, containing particular subfolders below every sufferer. The three subfolders /recordsdata, /consequence, and /job are used to retailer recordsdata, outcomes of instructions executed on the sufferer machine, and jobs queued by the operators to execute, respectively.
After the folder has been created efficiently, the backdoor collects details about the sufferer machine, ensuing within the JSON object seen in Determine 11.
{
"Host Title": "",
"IP Tackle": "",
"MAC Tackle": "",
"Working System": "",
"Privilege": "",
"Time Zone": "",
"Person Title": "",
"Workgroup": ""
}
Determine 11. Configuration construction
The instructions that GraphWorm receives by means of OneDrive are described in Desk 2, so as of discovery.
Desk 2. GraphWorm instructions
| Command | Arguments | Description |
| keyExchange | String |
This worth is about in reminiscence and sadly its goal will not be simply identifiable. It could possibly be used to set a public key throughout the software to achieve reverse shell entry. |
| sessionKey | String |
One other set of values set inside reminiscence and never evident how they’re used. Believed to be an RSA personal key and AES key to be up to date in reminiscence and used for cryptographic features. |
| kill | N/A | Stops the execution of the backdoor. |
| shell | N/A | Spawns a brand new occasion of cmd.exe. |
| exec | File path | Executes a brand new course of utilizing CreateProcessW. |
| add | String |
Downloads a file based mostly on the OneDrive and agent path. The |
| sleep | Integer | Updates sleep length. |
| ballot | Integer | Updates sleep length for an undetermined purpose. Presumably as a result of the event of instructions remains to be ongoing. |
| relaxation | Integer | Sleep for a length of time. |
| improve | JSON textual content | The JSON textual content incorporates configuration settings to replace fields in reminiscence, adopted by writing of those adjustments to the config.dat file on disk. |
| obtain | String |
Uploads the file from the offered |
| heartbeat | Integer |
Used to create a random delay interval between the min and max of how lengthy to attend to replace alive.txt. |
Throughout our analysis, we seen that upon completion of the shell command, the outcomes have been written to a file beacon_shell_output.txt and saved in a short lived listing. To add these massive shell command outputs, the operators almost definitely leveraged the Microsoft Graph API endpoint /createUploadSession, because the backdoor offers with a cloud occasion of OneDrive.
WormFrp
WormFrp is a proxy tunneling software impressed by the present quick reverse proxy (frp) utility that Webworm additionally makes use of. The menace actors expanded frp with {custom} functionalities in order that the software can receive its configuration values from a compromised Amazon S3 bucket, wamanharipethe.s3.ap-south-1.amazonaws[.]com.
The compromised S3 bucket incorporates a number of recordsdata with .txt extensions which might be AES encrypted utilizing ECB mode. Every WormFrp occasion is hardcoded with a singular AES key and retrieves a singular file from the S3 bucket. The configuration file is up to date throughout WormFrp execution to ship data again to the operator to establish the place the tunnel connects from.
WormFrp requires a command line argument to run. After acquiring its configuration from the S3 bucket, WormFrp makes an attempt to log into an frp server, opening a reverse proxy and TCP SOCKS5 proxy. Based mostly on noticed samples, the username and password are all the time randomly generated.
Every occasion of WormFrp connects to an frp server by means of a public IP tackle. Extra community exercise could also be seen from the sufferer’s machine as soon as the reverse proxy is configured.
ChainWorm
ChainWorm is one other {custom} proxy software utilized by Webworm operators. It seems that ChainWorm’s important operate is to help in increasing Webworm’s community infrastructure of proxies by opening a port on the machine on which it’s deployed. Webworm can use this software to chain proxies the place particularly crafted information is shipped by means of the port connecting to a different distant system, forwarding the site visitors to the following vacation spot for an indeterminate variety of hops.
Sometimes, the port that’s opened on the impacted host is hardcoded within the software. TCP connections are then opened on the hardcoded port to obtain any transmissions that will result in further outbound connections of both a direct IP tackle or hostname together with its port.
Utilizing the mixture of the hostname and port, a connection is made to the following hop within the chain. With connections established between supply and vacation spot, any information handed by means of is now forwarded to the following upstream hop within the chain. If at any level there’s an exception, the supply is notified with the 0x05 01 00 01 00 00 00 00 00 00 byte sequence earlier than trying to reconnect.
SmuxProxy
SmuxProxy is a utility based mostly on iox, a port forwarding and intranet proxy software. On high of the present iox performance, SmuxProxy incorporates small customizations to permit for a hardcoded server IP tackle and port, making it simpler for operators to drop and execute. It may additionally generate a random key and initialization vector for encrypted communications.
WormSocket
The final of Webworm’s new {custom} proxies is WormSocket, a software that makes use of configured servers operating socket.io to determine a proxy for internet requests. WormSocket permits for a extremely configurable and scalable proxy community, permitting particular nodes to be interacted with at any given time.
Its configuration depends on each hardcoded values and command line arguments. WormSocket accepts an optionally available command line argument –proxy adopted by a URI containing primary authentication, used as a configuration to create a WebProxy object. The proxy is then used on high of a connection to an online socket. Configurations for this internet socket are hardcoded in WormSocket.
As soon as WormSocket has began, it first connects to the configured IP tackle and port by trying connections utilizing ws, wss, http, and https schemes. As soon as a profitable connection is made, an asynchronous process is spawned to obtain and ship new messages. There are 4 attainable message varieties, described intimately in Desk 3.
| Kind | Message class | Values | Description |
| 1 | InitiateForwarderClientReq | String |
Makes use of the IpAddress subject to carry out a DNS lookup to acquire the host tackle of a attainable area handed by means of, the results of which is used to create a brand new TCP consumer with the Port. As soon as the consumer establishes connectivity, it’s saved inside a dictionary of ForwardedClientId and TcpClient pairs. As well as, a brand new InitiateForwarderClientRep message object is created with the identical data used to construct the TCP consumer, and despatched with the messages learn by means of the consumer and saved in a ConcurrentQueue for later use. |
| String |
|||
| Integer |
|||
| 2 | InitiateForwarderClientRep | String |
ForwarderClientId is used to search for an already configured TCP consumer created by InitiateForwarderClientReq within the consumer dictionary, all different values seem to not be in use. As soon as the TCP consumer is retrieved, new messages are learn and saved in a ConcurrentQueue for later use. |
| String |
|||
| Integer |
|||
| Integer |
|||
| Integer |
|||
| 3 | SendDataMessage | String |
Sends the Information by means of base64 encoding adopted by the TCP consumer related to ForwarderClientId. |
| Bytes[] | |||
| 4 | CheckInMessage | String |
Assigns MessengerId to the interior MessengerId, which doesn’t seem for use for something. |
Conclusion
Webworm is a China-aligned APT group energetic since at the very least 2022. It employs a always evolving toolkit comprising primarily backdoors and a mix of open-source and {custom} proxy utilities. Within the 2025 campaigns we noticed, Webworm started utilizing Discord-based (EchoCreep) and Microsoft Graph API-based (GraphWorm) backdoors. The group additionally continues to stage recordsdata in GitHub repositories, and we will solely assume that it’s going to hold doing so sooner or later.
By way of our evaluation, we have been lucky sufficient to get well instructions executed from a server that gave a view into the group’s potential preliminary entry methods, utilizing an open-source vulnerability scanner, in addition to figuring out a few of its targets.
It’s clear that Webworm is a really energetic APT group that may proceed trying to make use of new instruments to compromise its victims, whether or not this be from an preliminary entry level, or publish compromise.
For any inquiries about our analysis revealed on WeLiveSecurity, please contact us at threatintel@eset.com.ESET Analysis provides personal APT intelligence experiences and information feeds. For any inquiries about this service, go to the ESET Menace Intelligence web page.
IoCs
A complete listing of indicators of compromise (IoCs) and samples might be present in our GitHub repository.
Information
| SHA-1 | Filename | Detection | Description |
| CB4E5043333670738142 |
SearchApp.exe | WinGo/Agent.ZK | EchoCreep backdoor utilizing Discord for C&C. |
| 1DF40A4A31B30B62EC33 |
ssh.exe | WinGo/HackTool. |
WormFrp proxy software. |
| 7DCFE9EE25841DFD58D3 |
svc.exe | MSIL/HackTool. |
WormHole proxy software. |
| 77F1970D620216C5FFF4 |
C2OverOneDrive_v |
Win32/Agent.VWD | GraphWorm backdoor utilizing the Microsoft Graph API for C&C. |
| 948159A7FC2E68838686 |
MessengerClient. |
MSIL/HackTool.P |
WormSocket proxy software. |
| A3C077BDF8898E612CCD |
dsocks.exe | WinGo/Riskware. |
SmuxProxy, a {custom} iox with hardcoded IP. |
Community
| IP | Area | Internet hosting supplier | First seen | Particulars |
| N/A | wamanharipethe. |
N/A | 2025-04-14 | Compromised S3 for frp configurations and information exfiltration. |
| 45.77.13[.]67 | N/A | Vultr Holdings, LLC | 2025-04-07 | WormSocket internet socket server. |
| 64.176.85[.]158 | N/A | The Fixed Firm, LLC | 2025-06-28 | SmuxProxy server. |
| 104.243.23[.]43 | N/A | IT7 Networks Inc | 2025-04-09 | SmuxProxy server. |
| 108.61.200[.]151 | N/A | Vultr Holdings, LLC | 2025-04-10 | WormFrp proxy server. |
| 144.168.60[.]233 | N/A | IT7 Networks Inc | 2025-06-30 | Reverse shell IP found on SmuxProxy server. |
MITRE ATT&CK methods
This desk was constructed utilizing model 19 of the MITRE ATT&CK framework.
| Tactic | ID | Title | Description |
| Reconnaissance | T1595.002 | Lively Scanning: Vulnerability Scanning | Webworm utilized the open-source vulnerability scanner nuclei towards targets. |
| T1595.003 | Lively Scanning: Wordlist Scanning | Webworm used dirsearch, which leverages wordlists, to carry out internet listing scanning on targets. | |
| Useful resource Improvement | T1588.006 | Receive Capabilities: Vulnerabilities | Webworm used publicly accessible exploit code for post-authentication distant code execution. |
| T1583.004 | Purchase Infrastructure: Server | Servers for WormFrp, SmuxProxy, and WormSocket are hosted on cloud companies operated on Vultr and IT7 Community ASNs. | |
| T1583.003 | Purchase Infrastructure: Digital Non-public Server | Webworm makes use of SoftEther VPN servers which were seen hosted on Vultr cloud companies. | |
| T1584.006 | Compromise Infrastructure: Internet Companies | Webworm has been seen compromising S3 buckets in addition to utilizing instruments like nuclei to search out footholds. | |
| T1608.002 | Stage Capabilities: Add Software | Webworm staged instruments in its GitHub repo for direct obtain onto compromised programs. | |
| Execution | T1059.003 | Command and Scripting Interpreter: Home windows Command Shell | EchoCreep and GraphWorm each use the Home windows command line to execute operator instructions. |
| T1053.005 | Scheduled Process/Job: Scheduled Process | EchoCreep is executed below the custom-created MicrosoftSSHUpdate scheduled process. | |
| Persistence | T1547.001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | GraphWorm persists by making updates to registry Run keys. |
| Protection Impairment | T1070.004 | Indicator Elimination: File Deletion | GraphWorm cleans up a created beacon file after profitable add. |
| T1112 | Modify Registry | GraphWorm makes modifications to registry Run keys for persistence. | |
| T1027.013 | Obfuscated Information or Data: Encrypted/Encoded File | GraphWorm and EchoCreep use encryption and encoding methods to obfuscate information. | |
| T1550.001 | Use Alternate Authentication Materials: Software Entry Token | GraphWorm and EchoCreep use API keys to speak with the C&C infrastructure. | |
| T1078.004 | Legitimate Accounts: Cloud Accounts | GraphWorm makes use of a sound cloud account to entry Microsoft Graph APIs. | |
| T1070.006 | Indicator Elimination: Timestomp | EchoCreep incorporates a modified timestamp attribute. | |
| Lateral Motion | T1021.007 | Distant Companies: Cloud Companies | Webworm makes use of a compromised S3 bucket to make use of as a file staging zone. |
| Assortment | T1005 | Information from Native System | Each EchoCreep and GraphWorm can accumulate information from the native system. |
| T1074.001 | Information Staged: Native Information Staging | GraphWorm levels a beacon file domestically earlier than importing to the C&C. | |
| T1074.002 | Information Staged: Distant Information Staging | GraphWorm levels recordsdata and duties inside OneDrive by way of the Microsoft Graph API. | |
| Command and Management | T1071.001 | Software Layer Protocol: Internet Protocols | EchoCreep, GraphWorm, and WormSocket make use of HTTP and the WebSocket protocol. |
| T1132.001 | Information Encoding: Customary Encoding | EchoCreep, GraphWorm, and WormSocket make use of base64 encoding. | |
| T1573.002 | Encrypted Channel: Uneven Cryptography | EchoCreep, GraphWorm, WormSocket, and WormFrp use AES in some capability. | |
| T1090.003 | Proxy: Multi-hop Proxy | WormSocket and ChainWorm create a number of proxy hops. | |
| T1090.002 | Proxy: Exterior Proxy | WormFrp, ChainWorm, WormSocket, SmuxProxy, and GraphWorm have the aptitude to connect with exterior proxies. | |
| T1090.001 | Proxy: Inner Proxy | ChainWorm and WormSocket can create inner proxies. | |
| T1102.002 | Internet Service: Bidirectional Communication | EchoCreep and GraphWorm use Discord and the Microsoft Graph API for C&C infrastructure. | |
| Exfiltration | T1041 | Exfiltration Over C2 Channel | EchoCreep and GraphWorm exfiltrate information to their respective C&C infrastructures. |
| T1567.002 | Exfiltration Over Internet Service: Exfiltration to Cloud Storage | GraphWorm exfiltrates information to OneDrive by way of the Microsoft Graph API. |

