"US Prosecutors Charge 34-Year-Old Xu Zewei with Hacking Universities to Steal COVID-19 Vaccine Research"

Italy Extradites Alleged Chinese Cyber-Espionage Hacker to U.S. In High-Profile Case

In a significant development in the global fight against state-sponsored cybercrime, Italy has extradited a 34-year-old Chinese national to the United States to face charges related to a sweeping cyber-espionage campaign that targeted U.S. Universities, research institutions, and COVID-19 vaccine developers during the height of the pandemic. Xu Zewei (徐泽伟), a contractor allegedly working on behalf of China’s Ministry of State Security (MSS), appeared in a Houston federal court on Monday following his extradition over the weekend, marking a rare instance of a Chinese cyber operative being brought to U.S. Soil to answer for alleged hacking crimes.

The case underscores the growing tensions between Washington and Beijing over cybersecurity, intellectual property theft, and the employ of private contractors to conduct state-directed espionage. According to a nine-count indictment unsealed by the U.S. Department of Justice (DOJ), Xu is accused of playing a central role in the HAFNIUM cyber intrusion campaign, which compromised thousands of computers worldwide, including those of U.S. Organizations involved in COVID-19 research. The indictment also alleges that Xu’s activities were part of a broader effort by China’s intelligence services to steal sensitive data from defense contractors, law firms, and policy think tanks.

“The United States is committed to pursuing hackers who steal information from U.S. Businesses and universities and threaten our cybersecurity,” said Assistant Attorney General for National Security John A. Eisenberg in a DOJ press release. “I commend the prosecutors and investigators who have worked hard and sought justice for years in this investigation, and we look forward to proving our case in court.”

Who Is Xu Zewei and What Is He Accused Of?

Xu Zewei, a resident of the People’s Republic of China (PRC), was arrested in Milan in July 2025 at the request of U.S. Authorities. His extradition to the U.S. Follows a years-long investigation into his alleged role in a series of high-profile cyberattacks conducted between February 2020 and June 2021. According to court documents, Xu was directed by officers of the MSS’s Shanghai State Security Bureau (SSSB), a branch of China’s intelligence apparatus responsible for domestic counterintelligence, foreign espionage, and political security.

At the time of the alleged intrusions, Xu was employed by Shanghai Powerock Network Co. Ltd. (Powerock), a company described in the indictment as one of many “enabling” firms in China that conduct hacking operations on behalf of the PRC government. The DOJ alleges that Xu and his co-conspirator, Zhang Yu (张宇), a 44-year-old PRC national who remains at large, exploited zero-day vulnerabilities in Microsoft Exchange Server to gain unauthorized access to the networks of thousands of organizations. These attacks, collectively known as the HAFNIUM campaign, were later rebranded by cybersecurity researchers as Silk Typhoon, a name that reflects the group’s evolving tactics and broader targeting scope.

Who Is Xu Zewei and What Is He Accused Of?
Organizations Silk Typhoon

The indictment specifically highlights Xu’s alleged role in targeting U.S. Entities involved in COVID-19 research, including universities and pharmaceutical companies working on vaccines, treatments, and testing protocols. The timing of the attacks—during the early and most critical phases of the pandemic—has raised concerns about the PRC’s efforts to gain a competitive advantage in the global race for medical breakthroughs. While the DOJ has not disclosed the full list of victims, the scale of the campaign is staggering: court documents cite that the attacks compromised more than 12,700 U.S. Organizations, though some cybersecurity firms have estimated the number could be higher.

The Broader Context: China’s Cyber Espionage Playbook

Xu’s case is not an isolated incident but rather a window into China’s broader strategy of using private contractors to conduct cyber espionage on behalf of the state. This approach allows Beijing to maintain plausible deniability while leveraging the expertise of private-sector hackers to achieve its intelligence objectives. The MSS, China’s primary civilian intelligence agency, has increasingly relied on such contractors to carry out operations targeting foreign governments, corporations, and research institutions.

The HAFNIUM/Silk Typhoon campaign is one of the most well-documented examples of this tactic. In March 2021, Microsoft revealed that the group had exploited four zero-day vulnerabilities in its Exchange Server software, allowing attackers to steal emails, install malware, and gain persistent access to compromised systems. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) later issued an emergency directive ordering federal agencies to patch their systems immediately, calling the vulnerabilities “an active threat” to national security.

The campaign’s targets were diverse, ranging from infectious disease experts and defense contractors to law firms and policy think tanks. The DOJ’s indictment suggests that the stolen data was likely intended to benefit China’s economic, military, and strategic interests. For instance, the theft of COVID-19 research could have provided Chinese pharmaceutical companies with a head start in developing their own vaccines or treatments, while the targeting of defense contractors may have been aimed at gathering intelligence on U.S. Military technologies.

Brett Leatherman, assistant director of the FBI’s Cyber Division, emphasized the significance of Xu’s extradition in a statement: “Xu will now answer for his alleged role in HAFNIUM, a group responsible for a vast intrusion campaign directed by China’s Ministry of State Security that compromised more than 12,700 U.S. Organizations. He is one of many contractors the Chinese government uses to obscure its hand in cyber operations, and others who do the same face the same risk.”

Legal and Geopolitical Implications

Xu’s extradition from Italy to the U.S. Is a rare victory for American law enforcement in its efforts to hold Chinese cyber operatives accountable. While the U.S. Has indicted numerous Chinese hackers in the past, most have remained beyond the reach of U.S. Authorities, either due to China’s refusal to extradite its citizens or the hackers’ ability to evade capture. Xu’s case is notable not only for its scale but also for the international cooperation that made his extradition possible. Italian authorities arrested him in Milan in July 2025, and his transfer to U.S. Custody underscores the importance of collaboration between allied nations in combating state-sponsored cybercrime.

Legal and Geopolitical Implications
Shanghai State Security Bureau Prosecutors Charge

The case also highlights the challenges of attributing cyberattacks to specific actors, particularly when those actors are operating on behalf of a foreign government. The DOJ’s indictment names Xu and Zhang Yu as co-conspirators, but it stops short of directly implicating the Chinese government. Instead, it alleges that the two men were directed by officers of the MSS’s Shanghai State Security Bureau. This distinction is critical, as it allows the U.S. To pursue legal action against individuals while avoiding a direct confrontation with Beijing.

For China, the case is likely to be dismissed as politically motivated. Beijing has consistently denied allegations of state-sponsored hacking, instead accusing the U.S. Of hypocrisy given its own history of cyber espionage. In a 2021 statement responding to allegations of Chinese involvement in the Microsoft Exchange attacks, China’s Foreign Ministry called the accusations “groundless” and “a smear campaign.”

Despite these denials, the evidence presented in Xu’s indictment paints a damning picture of China’s cyber espionage activities. The use of private contractors like Xu and Zhang Yu allows the MSS to distance itself from the attacks while still benefiting from the stolen data. This tactic is not unique to China—other nations, including Russia and Iran, have also been accused of using proxy hackers to conduct cyber operations—but the scale and sophistication of China’s campaigns have drawn particular scrutiny from Western governments.

What Happens Next?

Xu’s initial court appearance in Houston on Monday marks the beginning of what is likely to be a lengthy legal process. He faces nine counts related to his alleged involvement in the HAFNIUM campaign, including conspiracy to commit computer fraud, conspiracy to commit wire fraud, and intentional damage to a protected computer. If convicted, he could face decades in prison.

DOJ, FBI charge Chinese national for hacking U.S. universities

The case is being prosecuted by the DOJ’s National Security Division, which has made countering Chinese cyber threats a top priority in recent years. In 2020, the division indicted five Chinese military hackers for their roles in a separate cyber espionage campaign targeting U.S. Corporations and labor organizations. While none of those defendants were ever extradited, the indictments served as a warning to Beijing that the U.S. Is willing to pursue legal action against Chinese cyber operatives, even if they are unlikely to face trial.

For now, Xu remains in U.S. Custody, and his next court appearance is expected in the coming weeks. The case is likely to draw significant attention from cybersecurity experts, legal scholars, and policymakers, particularly as the U.S. And China continue to clash over issues ranging from trade and technology to human rights and territorial disputes. The outcome of Xu’s trial could set a precedent for future cases involving state-sponsored cybercrime and may influence how nations cooperate—or fail to cooperate—in holding hackers accountable.

Key Takeaways for Businesses and Institutions

The Xu Zewei case serves as a stark reminder of the persistent and evolving threat posed by state-sponsored cyber espionage. For businesses, universities, and research institutions, the implications are clear: no organization is immune to targeted attacks, and the consequences of a breach can extend far beyond financial losses. Here are some key lessons from this case:

  • Patch vulnerabilities immediately: The HAFNIUM campaign exploited zero-day vulnerabilities in Microsoft Exchange Server, which had not yet been patched by many organizations. CISA’s emergency directive at the time underscored the importance of timely software updates in preventing such attacks.
  • Monitor for unusual activity: Many of the organizations targeted in the HAFNIUM campaign were unaware they had been compromised until months after the initial breach. Regular network monitoring and threat detection can help identify intrusions before they escalate.
  • Assume you are a target: While high-profile organizations like defense contractors and pharmaceutical companies are often the primary targets of state-sponsored hacking, the HAFNIUM campaign demonstrated that attackers will exploit any vulnerable system to gain access to broader networks. Smaller organizations should not assume they are off the radar.
  • Collaborate with law enforcement: The extradition of Xu Zewei was made possible by close cooperation between U.S. And Italian authorities. Organizations that fall victim to cyberattacks should work with law enforcement agencies to share threat intelligence and pursue legal action against perpetrators.
  • Understand the geopolitical risks: Cyber espionage is not just a technical issue but a geopolitical one. Businesses operating in sectors of strategic interest to foreign governments—such as biotechnology, aerospace, and energy—should be particularly vigilant about protecting their intellectual property.

What This Means for U.S.-China Relations

The extradition of Xu Zewei is likely to further strain already tense relations between the U.S. And China. Over the past decade, cybersecurity has emerged as one of the most contentious issues in the bilateral relationship, with both countries accusing each other of engaging in state-sponsored hacking. The U.S. Has imposed sanctions on Chinese individuals and entities in response to cyber espionage, while China has retaliated with its own measures, including restrictions on U.S. Technology companies operating in China.

What This Means for U.S.-China Relations
Prosecutors Charge Old Xu Zewei Hacking Universities

The case also comes at a time when the U.S. Is seeking to rally its allies in a coordinated response to China’s growing assertiveness in cyberspace. In 2021, the U.S., along with the European Union, the United Kingdom, and other allies, publicly attributed the Microsoft Exchange attacks to China and condemned Beijing’s actions. Xu’s extradition could serve as a test case for future cooperation among like-minded nations in holding Chinese hackers accountable.

For now, the focus remains on the legal proceedings against Xu. His trial will offer a rare glimpse into the inner workings of China’s cyber espionage apparatus and could provide valuable insights into how the PRC leverages private contractors to achieve its intelligence objectives. As the case unfolds, it will undoubtedly shape the broader conversation about cybersecurity, intellectual property theft, and the rules of engagement in the digital age.

Where to Find Official Updates

For readers seeking the latest developments in this case, the following official sources provide verified information:

The next scheduled court appearance for Xu Zewei has not yet been publicly announced, but updates are expected to be posted on the U.S. Attorney’s Office for the Southern District of Texas website. We will continue to monitor this case and provide further analysis as new details emerge.

What are your thoughts on the extradition of Xu Zewei and the broader issue of state-sponsored cyber espionage? Share your comments below and join the conversation on how nations can better protect themselves against these evolving threats.

Leave a Comment