HomeIntelligenceBrief
BREACH BRIEF🟠 High Breach

Chinese Hacker Extradited Over HAFNIUM‑Based Espionage Targeting COVID‑19 Research

A Chinese national was extradited to the U.S. and charged for a state‑directed cyber‑espionage campaign that leveraged the HAFNIUM Microsoft Exchange vulnerabilities to breach thousands of systems and steal COVID‑19 research data. The case underscores the risk that unpatched third‑party email infrastructure poses to organizations and their supply chains.

LiveThreat™ Intelligence · 📅 April 29, 2026· 📰 helpnetsecurity.com
🟠
Severity
High
BR
Type
Breach
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
3 recommended
📰
Source
helpnetsecurity.com

Chinese Hacker Extradited Over HAFNIUM‑Based Espionage Targeting COVID‑19 Research

What Happened – Chinese national Xu Zewei was extradited from Italy to the United States and charged for a state‑sponsored cyber‑espionage campaign that leveraged the HAFNIUM Microsoft Exchange Server exploits to infiltrate thousands of computers worldwide, stealing COVID‑19 vaccine and treatment research. The operation also compromised U.S. universities, a law firm with global offices, and other entities.

Why It Matters for TPRM

  • State‑backed actors can use known vulnerabilities to harvest sensitive R&D from third‑party vendors and partners.
  • Supply‑chain reliance on unmanaged or opaque service providers (e.g., Shanghai Powerock Network) creates hidden exposure.
  • Successful exploitation of legacy Exchange servers demonstrates the ongoing risk of unpatched infrastructure in partner environments.

Who Is Affected – Higher‑education institutions, research labs, legal services, and any organization that hosted vulnerable Microsoft Exchange servers.

Recommended Actions

  • Verify that all third‑party vendors have applied the 2021 Exchange security patches and maintain a patch‑management audit.
  • Conduct a supply‑chain risk review of any contractors or service providers with ties to foreign state actors.
  • Implement continuous monitoring for web‑shell activity and anomalous remote‑admin sessions on email servers.

Technical Notes – The attackers exploited CVE‑2021‑26855 and related Exchange proxy‑logon flaws to install persistent web shells, then used stolen credentials to exfiltrate research data. The campaign is linked to the broader HAFNIUM espionage group directed by China’s Ministry of State Security. Source: Help Net Security

📰 Original Source
https://www.helpnetsecurity.com/2026/04/28/chinese-national-cyber-espionage-charges/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.