Italian authorities have extradited Xu Zewei, a Chinese national accused of being a member of the state-backed HAFNIUM (Silk Typhoon) hacking group, to the United States. Xu is now held at the Houston Federal Detention Center and faces a nine-count indictment tied to intrusions that compromised over 12,700 U.S. entities and targeted COVID-19 vaccine research.

What Happened

Xu Zewei was arrested in July 2025 in Milan, Italy, while traveling with his wife, following a U.S. arrest warrant first filed in the Southern District of Texas in November 2023. His lawyer, Simona Candido, confirmed the extradition took place on Saturday, with Xu transferred to U.S. custody in Houston. The Chinese Foreign Ministry, through spokesman Lin Jian, publicly criticized the Italian government's decision to honor the U.S. extradition request. Xu has consistently denied involvement in Chinese state hacking operations, claiming mistaken identity. U.S. prosecutors allege he and co-defendant Zhang Yu, who remains at large, conducted computer intrusions between February 2020 and June 2021 at the direction of China's Ministry of State Security (MSS) and the Shanghai State Security Bureau (SSSB). Xu faces charges of wire fraud, aggravated identity theft, and unauthorized access to protected computers, carrying a maximum sentence of 77 years if convicted on all counts.

What Was Taken

The HAFNIUM campaign, attributed to Xu and his co-conspirators, compromised more than 12,700 U.S. entities out of over 60,000 targeted, according to FBI Cyber Division Assistant Director Brett Leatherman. Stolen data included sensitive COVID-19 vaccine, treatment, and testing research from U.S. universities, immunologists, and virologists. Court documents specifically reference Xu confirming to SSSB handlers that he "had compromised the network of a research university located in the Southern District of Texas." Beyond pandemic-related intellectual property, the broader 2021 Microsoft Exchange Server attacks attributed to HAFNIUM exposed email content, credentials, and sensitive correspondence across thousands of government, enterprise, and small-business mailboxes worldwide.

Why It Matters

This extradition is a rare and consequential enforcement action against an alleged Chinese state-sponsored operator, signaling that allied jurisdictions are increasingly willing to detain and transfer Chinese cyber operatives. HAFNIUM, also tracked as Silk Typhoon, is one of the most prolific Chinese state-aligned intrusion sets, with a multi-year track record of targeting U.S. government agencies, academic institutions, and large enterprises. The case also reinforces public attribution linking commercial-looking intrusion activity directly to the MSS and SSSB, narrowing the plausible deniability Beijing has historically relied on. For defenders, the indictment provides a documented operational pattern: state-tasked targeting of strategically valuable verticals (biomedical research during COVID-19) followed by indiscriminate, mass-exploitation campaigns when zero-day access becomes available.

The Attack Technique

HAFNIUM is best known for the early-2021 Microsoft Exchange Server intrusion campaign, which chained four zero-day vulnerabilities (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, collectively "ProxyLogon") to achieve unauthenticated remote code execution on internet-facing Exchange servers. The group deployed web shells such as China Chopper for persistence, harvested mailbox contents, dumped credentials, and pivoted laterally into Active Directory environments. Earlier 2020 to 2021 operations against vaccine-research targets relied on spear-phishing, credential theft, exploitation of public-facing applications, and abuse of legitimate remote access tooling. The group operated under tasking from SSSB officers and reported intrusion outcomes back through formal handler relationships, indicating a structured, intelligence-driven targeting cycle rather than opportunistic crime.

What Organizations Should Do

Sources: Italy extradites alleged Chinese state hacker to US - The Record