- Cyber Syrup
- Posts
- Chinese Hacker Arrested in Italy for U.S. Cyber Espionage Linked to Silk Typhoon
Chinese Hacker Arrested in Italy for U.S. Cyber Espionage Linked to Silk Typhoon
Italian authorities have arrested a Chinese national, Xu Zewei, in Milan over his alleged role in a wave of cyberattacks linked to Silk Typhoon

CYBER SYRUP
Delivering the sweetest insights on cybersecurity.
Not All AI Notetakers Are Secure. Here’s the Checklist to Prove It.
You wouldn’t let an unknown vendor record your executive meetings, so why trust just any AI?
Most AI notetakers offer convenience. Very few offer true security.
This free checklist from Fellow breaks down the key criteria CEOs, IT teams, and privacy-conscious leaders should consider before rolling out AI meeting tools across their org.
Chinese Hacker Arrested in Italy for U.S. Cyber Espionage Linked to Silk Typhoon

Italian authorities have arrested a Chinese national, Xu Zewei, in Milan over his alleged role in a wave of cyberattacks linked to Silk Typhoon—a state-sponsored hacking group also known as Hafnium or UNC5221. Xu, 33, is accused of participating in coordinated cyber intrusions that targeted American government agencies, universities, and private organizations.
The arrest stems from a U.S. indictment charging Xu with nine counts of wire fraud, aggravated identity theft, and unauthorized access to protected computers.
Details of the Cyber Campaign
According to the U.S. Department of Justice, Xu and his alleged co-conspirator, Zhang Yu, operated under the direction of China’s Ministry of State Security (MSS) via its Shanghai State Security Bureau (SSSB). Their primary objective: conducting cyber espionage against U.S. targets, especially during the height of the COVID-19 pandemic.
Between February 2020 and June 2021, Xu reportedly exploited zero-day vulnerabilities in Microsoft Exchange Server, launching a campaign that compromised thousands of systems globally. Microsoft attributed this activity to the Hafnium group, which targeted:
U.S. government agencies
Private-sector firms
Universities researching COVID-19 vaccines, including the University of Texas
The hackers allegedly stole sensitive information by exploiting these flaws before Microsoft issued patches.
The Role of Silk Typhoon
Silk Typhoon is a well-documented Chinese state-sponsored APT (Advanced Persistent Threat) group. Known for its supply chain attacks and use of undisclosed (zero-day) vulnerabilities, the group has targeted more than 60,000 U.S. entities, compromising over 12,700 systems in the Hafnium operation alone.
Xu was reportedly working for a front company, Shanghai Powerock Network Co. Ltd., a detail that supports long-standing allegations that China uses private contractors to conduct cyber espionage, thus providing the government plausible deniability.
Legal Proceedings and Response
Xu has denied the charges and is contesting extradition to the United States. His legal team claims a case of mistaken identity, citing the commonality of his surname and a stolen mobile phone in 2020 as possible sources of confusion.
Despite the arrest, experts warn the broader threat remains.
"Government sponsors are not going to be deterred. The arrest is unlikely to bring operations to a halt or even significantly slow them," said John Hultquist, Chief Analyst at Google Threat Intelligence Group. "But it may give some of these talented young hackers a reason to think twice."
Takeaway
While Xu's arrest marks a high-profile win in the global fight against cyber espionage, it highlights the persistent threat posed by nation-state hacking groups. As state actors continue to leverage private contractors and sophisticated toolkits, international cooperation and cybersecurity vigilance remain critical.