Cyberwarfare / Nation-State Attacks
,
Fraud Management & Cybercrime
Xu Zewei, Suspected Silk Typhoon Hacker, to Remain in Italian Prison

Prosecutors at a Milan court on Friday rejected a house arrest request by lawyers of a Chinese national awaiting possible extradition to the United States in Italy, citing flight risk.
See Also: OnDemand | North Korea’s Secret IT Army and How to Combat It
Italian authorities arrested Xu Zewei, 33, of Shanghai, in July after his arrival at Milan’s Malpensa Airport. Xu, a suspected member of the China-based advanced persistent threat group Silk Typhoon, is wanted by the FBI for cyberespionage targeting U.S. researchers developing novel coronavirus vaccines in 2020 (see: Italian Police Arrest Alleged Chinese Hacker Wanted by FBI).
The Milan Court of Appeals rejected a motion from Xu’s defense requesting house arrest amid extradition proceedings, reported public news outlet Rai. The court cited “serious indications of guilt” contained in U.S. investigative material, as well as a “high danger of escape.” Xu is currently being held at a pre-trial detention facility near Milan.
Xu, along with alleged co-conspirator Zhang Yu, faces a nine-count federal indictment in the United States, which was unsealed following his July arrest. The charges include conspiracy, wire fraud, unauthorized access to protected systems and intentional damage to a protected computer. If convicted, Xu could face up to 60 years in prison. Zhang Yu remains at large.
The U.S. now has two weeks to formally submit its extradition documents to Italian authorities.
U.S. prosecutors say Xu and Yu worked for the Shanghai branch of the Ministry of State Security, where they were tasked with hacking U.S. vaccine research between February 2020 and June 2021. The indictment identified Xu as the manager of Shanghai Powerock Network Technology Co., a front company linked to Silk Typhoon, also known as APT27, Emissary Panda and UNC522. The hacking group primarily focuses on exploiting zero-days, as well as infecting victims with the China Chopper backdoor for remote access to the infiltrated network.
Xu’s technical background and suspected links to Chinese intelligence likely influenced the court’s decision to deny house arrest, said Stefan Soesanto, a senior security researcher at ETH Zurich. Soesanto said that Beijing is likely to file a competing extradition request for Xu. “If this does not happen, chances are very high that Xu is either a replaceable asset or is being temporarily punished for travelling to Italy in the first place.”
An investigation by threat intelligence experts at Natto Thoughts found that Xu also served as director of security technology at Chaitin Tech, a company known for vulnerability research and scanning tools. Chaitin also contributes to the China National Vulnerability Database and other state-linked cybersecurity programs.
Xu’s lawyer Enrico Giarda maintains the defendant’s innocence, arguing he is a victim of mistaken identity. Giarda did not immediately respond to a request for comment.