Webworm Leverages Discord and MS Graph API for C2
The China-aligned threat actor Webworm has resurfaced, employing custom backdoors that utilize Discord and Microsoft Graph API for command-and-control (C2) communications. The Hacker News reports that this activity, observed in early 2025, involves novel malware families dubbed EchoCreep and GraphWorm. Webworm, known since at least 2022, has a history of targeting government agencies, suggesting a continued focus on sensitive entities.
This reliance on legitimate, widely-used services like Discord and Microsoft Graph API for C2 is a well-worn tactic, but its continued effectiveness highlights a persistent challenge for defenders. These platforms are often whitelisted or have less stringent network traffic monitoring, making it harder to detect malicious C2 channels. The use of custom backdoors indicates a sophisticated actor investing in evasion techniques.
Defenders should prioritize scrutinizing network traffic for anomalous API calls to Microsoft Graph and unusual Discord activity, especially from government-related endpoints. Implementing stricter egress filtering and enhancing endpoint detection and response (EDR) capabilities to identify suspicious process behaviors associated with these C2 channels are critical steps.
What This Means For You
- If your organization, particularly a government agency, uses Microsoft 365 or has employees active on Discord, audit your network logs for unusual API activity or Discord traffic patterns. Escalate alerts for any processes attempting to communicate via these channels without explicit business justification.
Related ATT&CK Techniques
๐ก๏ธ Detection Rules
3 rules ยท 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free โ export to any SIEM format via the Intel Bot.
Webworm EchoCreep/GraphWorm C2 via Discord API
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| Webworm-2025-Activity | Backdoor | EchoCreep backdoor |
| Webworm-2025-Activity | Backdoor | GraphWorm backdoor |
| Webworm-2025-Activity | Command and Control | Discord API for C2 communications |
| Webworm-2025-Activity | Command and Control | Microsoft Graph API for C2 communications |
| Webworm-2025-Activity | Threat Actor | China-aligned threat actor Webworm |