Chinese hacker extradited from Italy to face federal charges over COVID-era cyber theft campaign

A Chinese national accused of stealing American COVID-19 research on behalf of Beijing's intelligence services appeared before a federal judge in Houston on Monday after his extradition from Italy, capping a years-long effort to hold him accountable for one of the most brazen state-sponsored hacking campaigns in recent memory.

Xu Zewei faces a nine-count federal indictment for his alleged role in the HAFNIUM computer intrusion campaign, a sweeping operation that the Office of the U.S. Attorney for the Southern District of Texas says compromised thousands of computers worldwide by exploiting vulnerabilities in Microsoft Exchange Server software.

The charges include wire fraud, identity theft, and unauthorized access to protected computer systems. If convicted, Xu faces decades in prison.

A hacking campaign born in the pandemic's earliest days

The indictment lays out a timeline that should unsettle anyone who remembers the chaos of early 2020. Beginning in February of that year, just as the virus that originated in China was spreading across the globe, Xu and co-defendant Zhang Yu allegedly launched a hacking campaign directed by the People's Republic of China's Ministry of State Security, operating through its Shanghai State Security Bureau. The MSS is China's intelligence arm responsible for domestic counterintelligence and foreign intelligence operations.

Their targets were not military installations or defense contractors. They went after American universities, immunologists, and virologists conducting COVID-19 vaccine, treatment, and testing research. The scheme ran through June 2021, federal prosecutors say.

That timing matters. As former U.S. Attorney Nicholas Ganjei noted when the indictments were unsealed:

"It is notable that the Chinese government directed theft of COVID-19 research beginning in February 2020 after the outbreak of the virus in mainland China and at a time when PRC officials were withholding information about the virus and its origin."

In other words, while Beijing was stonewalling the world about what it knew and when it knew it, Chinese intelligence operatives were allegedly ransacking the email accounts of American scientists racing to develop vaccines. The charges allege this included hacking into emails of virologists and immunologists at a university in the Southern District of Texas.

The broader scope of China's espionage efforts against American research institutions has drawn increasing scrutiny. Data revealed earlier this year showed that nearly 30,000 Chinese nationals visited Department of Energy labs during the Biden administration, raising persistent questions about access to sensitive U.S. facilities.

The HAFNIUM campaign's staggering reach

The individual university hacks were only part of a much larger operation. The FBI's Cyber Division has said the HAFNIUM campaign compromised more than 12,700 U.S. organizations. Fox News reported that FBI Director Kash Patel confirmed Xu's extradition, stating that "during 2020 and 2021, at the height of the COVID-19 pandemic, Xu and his co-conspirators allegedly targeted and hacked U.S.-based universities, immunologists, and virologists conducting COVID-19 research."

Microsoft confirmed in March 2021 that its Exchange Server had been targeted by PRC-sponsored hackers. By July 2021, U.S. and foreign governments publicly attributed the HAFNIUM operation to the Chinese MSS.

Brett Leatherman, assistant director of the FBI's Cyber Division, put the scale in sharper terms. The Washington Times reported Leatherman saying that "through HAFNIUM, the CCP targeted over 60,000 U.S. entities, successfully victimizing more than 12,700 in order to steal sensitive information."

Sixty thousand targets. More than twelve thousand victims. And the FBI says Xu and Zhang were among the private contractors Beijing used "to obscure its hand in cyber operations."

A front company and a fugitive co-defendant

The indictment describes Xu's employer, Shanghai Powerock Network Co. Ltd., as "one of many 'enabling' companies in the PRC that conducted hacking for the PRC government." That detail reveals a model American officials have long warned about: Beijing outsourcing its espionage to nominally private firms, giving the state plausible deniability while reaping the intelligence.

The threat posed by Chinese intelligence operations extends well beyond cyber intrusions. The FBI has been investigating alleged Chinese intelligence activity across multiple domains, from technology theft to political influence campaigns.

Zhang Yu, the co-defendant indicted alongside Xu in 2023, remains at large. The FBI is asking anyone with information about Zhang's whereabouts to call 1-800-CALL-FBI. That an alleged Chinese state-sponsored hacker can simply disappear speaks to the difficulty of holding Beijing's operatives accountable, and makes Xu's arrest all the more significant.

Ganjei, the former U.S. Attorney, framed the stakes broadly when the indictments were unsealed:

"The hacking of these American universities is not just a violation of intellectual property rights, it's an attack on American scientific innovation. The hacking of a U.S. law firm is not just about computer crime. It's about an attack on the American system of justice, which depends on the legal ability of clients to seek and obtain frank and confidential advice from their local counsel."

That reference to a law firm indicates the HAFNIUM campaign reached beyond research institutions into the legal sector, another vector of sensitive American information exposed to Chinese intelligence.

From Milan to Houston

Italian authorities arrested Xu in Milan last July at the request of U.S. authorities. The New York Post reported that Xu, described as 33 years old, had arrived in Milan on a flight from China when he was taken into custody. FBI Houston Special Agent in Charge Douglas Williams said at the time that the "landmark arrest by FBI Houston agents in Italy proves that we will scour the ends of the Earth to hold criminal foreign adversaries accountable."

Xu spent months in Italian custody before his extradition to the United States over the weekend. He appeared before a federal judge in Houston on Monday. The FBI's Houston Field Office is conducting the ongoing investigation.

Strengthening America's cyber defenses has been a bipartisan priority, at least in principle. The recent confirmation of new leadership at NSA and U.S. Cyber Command reflects the growing recognition that state-sponsored cyber threats from adversaries like China demand sustained attention at the highest levels.

Acting U.S. Attorney John Marck struck a pointed tone about what the case represents. He said Xu is finally answering "for crimes that struck at the heart of American science and security, allegedly stealing COVID-19 research from our universities when the world needed it most."

What this case reveals about Beijing's playbook

The Xu Zewei case is not an isolated incident. It is a window into how the Chinese Communist Party conducts intelligence operations, through front companies, contracted hackers, and relentless targeting of American institutions during moments of national vulnerability. The handling of espionage cases on American soil continues to raise questions about whether the U.S. government's response has been proportional to the threat.

Consider the sequence: a deadly virus emerges in China. Beijing withholds information. American scientists scramble to develop vaccines. And Chinese intelligence operatives hack those same scientists to steal their work, work funded by American taxpayers, conducted at American universities, and desperately needed by American citizens.

The HAFNIUM campaign compromised more than 12,700 U.S. organizations. One defendant now sits in a Houston courtroom. The other remains free. And the government apparatus that directed them, the Ministry of State Security, the Shanghai State Security Bureau, the network of "enabling" front companies, continues to operate.

Xu Zewei's extradition is a step toward accountability. But one arrest, years after the fact, is a reminder of how far behind the curve America has been, and how much ground remains to cover.

Privacy Policy