Firewall integrations

Fortinet

Elevate the power of your Fortinet Fortigate Firewall using by adding our Intelligence.

Palo Alto

Palo Alto Firewalls can be hardened with our threat intelligence as well.

Sophos XGS

Enhance the Sophos XGS Firewall with our threat intelligence.

OPNsense

Enhance your OPNsense Firewall with our threat intelligence using the native plugin.

SIEM integrations

Splunk

Splunk is a great platform, but without the right Threat Intelligence it's just a log server. Try our threat intelligence today. 

Microsoft Sentinel

One of the most used SIEM solutions should be enriched with the right Intelligence. At Q-Feeds you're at the right place!

Other

Luckily there are many other SIEM vendors whom support 3rd party threat intelligence.

Threat Intelligence Portal

Darkweb Monitoring

Darkweb monitoring is one of our services, not only for threat intelligence but also for you most important assets.

Threat Lookup

With Threat Lookup you get full insights in our IOC database, including full MITRE ATT&K mapping.

External Attack Surface Management

A toolset to check your external facing assets exposed on the internet

Vulnerability Scanner

A comprehensive vulnerability scanner which can scan your infrastructure and web applications

Brand Protection

Protect your brand for look-a-likes and potential phishing attempts

Services

TAXII Feeds & Server Software

TAXII/STIX2.1 standard. Both in form of feeds and server software available

Implementation

Need help with implementations? No worries, we have a strong network of partners who are able to help you.

Solutions

Enrich my SIEM

Elevate the power of your SIEM solution using by adding our Intelligence.

Enrich my Firewall

Firewalls can be hardened with our threat intelligence as well.

Prevent phishing

Enhance your protection against phishing

Achieve compliancy

Achieve compliancy by correlating the best threat intelligence to your logs

Futuristic eye design with circuits and geometric shapes.

Company

About

Read here all about Q-Feeds

News and Updates

Cybersecurity news and updates about us

Publications

All of our media coverage in one place

Become a reseller

Strengthen your portfolio with our comprehensive reseller program

Partner locator

Find our certified partners here

Contact

For all your questions or inquiries

Neural network representation of a human brain

Support

My Account

Access your account and manage your licenses

Downloads & Manuals

On this page you find white papers and manuals

Knowledge base

Our knowledge base full of implementation instructions

Start for free

Start your cyber security intelligence journey here

Abstract geometric wireframe human head

Webworm evolution: Uncovering innovative burrowing techniques in cybersecurity

May 21, 2026 | Threat Intelligence Research

Webworm APT Group’s Evolving Techniques in 2025

TL;DR

ESET researchers detail the ongoing activities of the China-aligned APT group Webworm, which has shifted focus from Asian targets to Europe in 2025. The group has adopted new tactics, including the use of Discord and Microsoft Graph API for command-and-control communications.

Main Analysis

Webworm, actively monitored by ESET researchers, has evolved significantly since its discovery in 2022. Initially targeting organizations in Asia, the group has now set its sights on Europe, compromising governmental organizations in countries such as Belgium, Italy, and Poland, as well as institutions in South Africa. This change reflects their adaptability and desire to pursue new victims in different geographic regions.

In the latest campaigns, Webworm has introduced two new backdoors, EchoCreep and GraphWorm, which enable command-and-control operations via unconventional channels such as Discord and Microsoft Graph API. For instance, EchoCreep leverages Discord to send commands and upload files, with ESET decrypting over 400 messages that detail the group’s operations and targeted victims. GraphWorm, on the other hand, operates exclusively through OneDrive, allowing for secure data uploads and job executions within Microsoft’s cloud infrastructure. This method is particularly noteworthy, as it facilitates exfiltration while leveraging legitimate services to obscure their activities.

The group continues to rely on custom and open-source proxy tools to enhance its stealth, notably transitioning from traditional remote access tools such as McRat to lightweight proxy utilities. Their proxy solutions, including WormFrp and SmuxProxy, provide capabilities such as encrypted communications and multi-hop routing, effectively creating larger covert networks. The staging of malicious tools in publicly accessible repositories, such as GitHub, further illustrates their audacious approach to operational security and delivery method.

Defensive Context

Organizations, especially governmental and educational entities within Europe and Southern Africa, should be aware of Webworm’s evolving tactics and operational methods. The group’s inclination to use widely accepted services for their command-and-control communications poses unique challenges for detection. Targets using Discord and Microsoft Graph API could particularly be at risk, especially if these platforms are integrated into their workflows.

Potential victims realistically exposed include sectors dealing with sensitive data or governmental operations that utilize cloud services like OneDrive. Conversely, organizations that do not rely heavily on these services might find themselves less vulnerable to this specific threat.

Why This Matters

Webworm’s shift toward stealthier tools and cloud-based communication reflects a strategic pivot in the APT landscape, warranting increased vigilance from organizations likely to be targeted. As the group continues to refine its methods, understanding their tactics will be crucial for anticipating future activities and implementing appropriate defenses.

Indicators of Compromise (IOCs)

  • Backdoors:
    • EchoCreep (based on SHA-1: CB4E5043333670738142…F59C3CBE8D497D98)
    • GraphWorm (based on SHA-1: 77F1970D620216C5FFF4E14A…)
  • Compromised Amazon S3 Bucket: wamanharipethe.s3.ap-south-1.amazonaws.com
  • IP Addresses of Interest:
    • 64.176.85[.]158 – SmuxProxy server
    • 45.77.13[.]67 – WormSocket web socket server
    • 104.243.23[.]43 – WormFrp proxy server

Click here for the full article

Try our Intelligence today!

Streamline your security operations with a free Q-Feeds trial and see the difference.

Other articles