Chinese Silk Typhoon Hacker Extradited to U.S. Over COVID Research Cyberattacks
嗯,用户让我总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”之类的开头,直接写描述。好的,我先看看文章讲了什么。 文章主要讲的是一个叫徐泽炜的中国公民被指控参与了黑客组织Silk Typhoon,并且被意大利引渡到美国。他涉嫌在2020年到2021年间攻击美国组织和政府机构,包括入侵德克萨斯州的一所大学,窃取新冠疫苗信息。他还被指控利用微软Exchange Server的零日漏洞进行攻击。 徐泽炜否认所有指控,称自己是被误抓。他的律师也表示他在法庭上不认罪。同时,他的同谋张羽仍然在逃。 好的,现在要总结这些内容。控制在100字以内,所以需要简明扼要。可能的结构是:谁、做了什么、结果如何。 首先提到徐泽炜被引渡到美国,指控他参与网络攻击和窃取疫苗信息。然后提到他利用微软漏洞,并且否认指控。最后提到他的同谋在逃。 这样大概可以控制在100字左右。 </think> 一名中国公民徐泽炜被指控参与网络间谍活动并窃取新冠疫苗信息,从意大利引渡至美国受审。他涉嫌利用微软Exchange漏洞攻击美国机构,并否认所有指控。 2026-4-28 07:57:0 Author: thehackernews.com(查看原文) 阅读量:12 收藏

Cyber Espionage / Vulnerability

A Chinese national accused of being a member of the Silk Typhoon hacking group has been extradited to the U.S. from Italy. 

Xu Zewei, 34, was arrested in July 2025 by Italian authorities for his alleged links to the Chinese state-sponsored threat group and for orchestrating cyber attacks against American organizations and government agencies between February 2020 and June 2021, including breaking into systems at a Texas university to steal COVID-19 vaccine information.

He was charged with nine counts of wire fraud and conspiracy to cause damage to and obtain information by unauthorized access to protected computers, as well as committing aggravated identity theft.

Xu, along with co-defendant and Chinese national Zhang Yu, is said to have undertaken the attacks under directions issued by the Ministry of State Security's (MSS) Shanghai State Security Bureau (SSSB). Some of these attacks weaponized then zero-days in Microsoft Exchange Server, a threat activity cluster that Microsoft tracked as Hafnium, to breach targets and deploy web shells for remote administration.

Xu worked for a company named Shanghai Powerock Network Co. Ltd. when the attacks were carried out, per the indictment. The U.S. Department of Justice (DoJ) said Powerock was one of many "enabling" companies in China that conducted hacking operations for the government.

"In early 2020, Xu and his co-conspirators hacked and otherwise targeted U.S.-based universities, immunologists, and virologists conducting research into COVID‑19 vaccines, treatment, and testing," the DoJ added. "The charges further allege that beginning in late 2020, Xu and his co-conspirators exploited certain vulnerabilities in Microsoft Exchange Server, a widely-used Microsoft product for sending, receiving, and storing email messages."

However, the defendant has repeatedly denied any involvement in Chinese government hacking operations, claiming his arrest was a case of mistaken identity. He was in Milan with his wife on vacation when he was apprehended. Speaking to TechCrunch, Xu's lawyer said he pleaded not guilty to all charges during a court hearing on Monday. Zhang Yu remains at large.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/chinese-silk-typhoon-hacker-extradited.html
如有侵权请联系:admin#unsafe.sh