GraphWorm Malware Uses Microsoft OneDrive to Hide Its Command Traffic


Security researchers have uncovered a new backdoor called GraphWorm that uses Microsoft OneDrive as part of its command-and-control system. The malware belongs to Webworm, a China-aligned cyber-espionage group that has continued to refresh its toolkit and move toward stealthier cloud-based tactics.

The main concern is simple: GraphWorm does not rely on an obviously suspicious server for communication. Instead, it uses Microsoft Graph API and OneDrive endpoints to receive commands and send data from infected machines. That can make malicious traffic harder to separate from normal Microsoft 365 activity inside enterprise networks.

ESET researchers said Webworm used GraphWorm during its 2025 activity, alongside another new backdoor called EchoCreep. While GraphWorm relies on Microsoft OneDrive, EchoCreep uses Discord for command-and-control communication.

Webworm shifts from old RATs to cloud-based backdoors

Webworm has been linked to cyber-espionage activity for years. Earlier reporting tied the group to modified versions of older remote access tools, including Trochilus, Gh0st RAT, and 9002 RAT.

ESET’s newer findings show a more modern approach. The group has moved away from some traditional malware families and started using custom backdoors, cloud services, GitHub staging, proxy tools, and compromised storage services to support its operations.

The group’s recent targeting also appears to have shifted. Webworm originally focused heavily on Asian targets, but researchers observed recent activity against government organizations in Belgium, Italy, Serbia, and Poland. A university in South Africa was also compromised.

How GraphWorm uses OneDrive for command and control

GraphWorm uses Microsoft Graph API to communicate with a OneDrive instance controlled by the attackers. After it runs on a compromised computer, it creates a unique victim ID using system details such as the network adapter IP, processor ID, and device serial number.

The malware then uses that ID to create or rename a OneDrive folder for the victim. Each compromised machine gets its own folder structure, which helps the attackers organize commands, files, and results.

OneDrive folderPurpose
/filesStores files used by the attackers or malware workflow.
/jobHolds commands queued by the operators.
/resultStores output from commands executed on the victim machine.

This design lets the malware blend into cloud traffic that many organizations already allow. It also gives the operators a familiar cloud file structure for controlling infected systems.

What GraphWorm can do on infected machines

GraphWorm supports several commands that give attackers control over a compromised Windows system. It can start a cmd.exe shell, run new processes, move files between the victim and OneDrive, change sleep timing, and update its configuration.

The malware encrypts its communication data before encoding it, which adds another layer of protection for the attacker. It can also use proxy settings, allowing its traffic to pass through another configured route.

When GraphWorm completes a shell command, the output is written to a temporary file before being uploaded back through OneDrive. Researchers noted that the malware likely uses Microsoft Graph’s createUploadSession feature to handle larger uploads.

  • Runs shell commands on compromised systems.
  • Uploads command results to OneDrive.
  • Downloads files from OneDrive to the victim machine.
  • Changes sleep and polling intervals.
  • Updates configuration values stored on disk.
  • Uses cloud-hosted infrastructure to reduce obvious warning signs.

EchoCreep and proxy tools expand Webworm’s toolkit

GraphWorm is only one part of the updated Webworm toolkit. ESET also analyzed EchoCreep, a Go-based backdoor that uses Discord for command-and-control communication. Researchers decrypted more than 400 Discord messages tied to the operation.

The group also uses several proxy and tunneling tools. These include WormFrp, ChainWorm, SmuxProxy, and WormSocket. Some are based on open-source tools, while others add custom features for chaining traffic across multiple hosts.

This proxy infrastructure can help Webworm hide where commands come from and where stolen data goes. It also gives the attackers more flexibility after they gain access to a network.

ToolRole in Webworm activity
GraphWormBackdoor using Microsoft Graph API and OneDrive for command and control.
EchoCreepBackdoor using Discord for command and control.
WormFrpCustom proxy tool inspired by the fast reverse proxy utility.
ChainWormProxy chaining tool used to route traffic across multiple systems.
SmuxProxyCustom tool based on the iox port-forwarding utility.
WormSocketProxy tool that uses websocket-based communication.

How Webworm may be finding targets

Researchers also found evidence that Webworm operators used open-source scanning tools to examine possible targets. These included Nuclei, a vulnerability scanner, and dirsearch, a web path scanning tool.

Forked WordPress repository (Source – Welivesecurity)

The tools were used against targets in several countries, including Spain, Hungary, Belgium, Nigeria, Czechia, and Serbia. This suggests the attackers were looking for exposed web paths and known weaknesses before moving deeper into victim environments.

ESET also found a script for CVE-2017-7692, a SquirrelMail vulnerability that can allow post-authentication remote code execution. The presence of that script suggests Webworm may use exposed or poorly secured webmail systems as one possible access route when credentials are already available.

Why OneDrive-based malware is hard to detect

Cloud-based command-and-control activity creates a difficult problem for defenders. Blocking OneDrive is not realistic for many businesses, especially those that rely on Microsoft 365 for file storage and collaboration.

That means security teams need to focus less on whether traffic goes to Microsoft services and more on whether the behavior around that traffic looks unusual. A trusted domain does not always mean trusted activity.

GraphWorm also shows how attackers can abuse legitimate developer APIs. Microsoft Graph API has valid business uses, including file access and upload workflows. Attackers can use those same capabilities to hide command channels inside expected cloud activity.

What security teams should monitor

Organizations should review Microsoft 365 activity for unusual OneDrive folder creation, suspicious upload patterns, and accounts that interact with files in ways that do not match normal user behavior.

Endpoint monitoring also matters. GraphWorm can run shell commands, execute processes, and move files, so defenders should look for unexpected cmd.exe or PowerShell activity tied to cloud file operations.

Area to monitorWhy it matters
OneDrive folder activityUnusual folder names or repeated job/result style folders may indicate automated abuse.
Microsoft Graph API activityUnexpected file uploads or upload sessions can reveal suspicious automation.
Command-line activityUnexpected cmd.exe or PowerShell execution may point to post-compromise behavior.
New startup entriesPersistence mechanisms can help malware run again after login.
Proxy toolsUnknown tunneling or port-forwarding tools can help attackers hide movement inside networks.

GraphWorm shows a wider cloud abuse problem

GraphWorm is not dangerous because OneDrive has a flaw. It is dangerous because attackers can abuse legitimate cloud services to make their operations look ordinary.

For enterprises, the lesson is clear. Cloud service visibility has become part of malware detection. Security teams need logs from Microsoft 365, endpoint telemetry, identity monitoring, and network inspection to understand how trusted platforms are being used.

Forked WordPress repository (Source – Welivesecurity)

Webworm’s latest activity also shows that espionage groups are not standing still. They are mixing cloud APIs, encrypted traffic, proxy chains, public code repositories, and compromised storage services to stay harder to trace.

Summary

  • GraphWorm is a new Webworm backdoor that uses Microsoft Graph API and OneDrive for command and control.
  • The malware creates victim-specific OneDrive folders to store jobs, files, and command results.
  • Webworm also uses EchoCreep, a Discord-based backdoor, plus several custom proxy tools.
  • The group has recently targeted European government organizations and a South African university.
  • Defenders should monitor OneDrive, Microsoft Graph API usage, endpoint commands, and proxy tooling for unusual behavior.

FAQ

What is GraphWorm malware?

GraphWorm is a backdoor used by the China-aligned Webworm APT group. It uses Microsoft Graph API and OneDrive to receive commands and send data from compromised systems.

Why does GraphWorm use Microsoft OneDrive?

GraphWorm uses OneDrive to make its command-and-control traffic look like normal cloud activity. This can help the malware avoid simple detection rules that focus only on suspicious domains or unknown servers.

What can GraphWorm do on an infected computer?

GraphWorm can run shell commands, execute files, upload and download files, change sleep timing, update configuration settings, and send command results back through OneDrive.

Who is behind GraphWorm?

ESET attributes GraphWorm to Webworm, a China-aligned APT group known for cyber-espionage activity and an evolving toolkit of backdoors, proxy tools, and cloud-based command channels.

How can organizations detect GraphWorm-like activity?

Security teams should monitor unusual OneDrive folder creation, unexpected Microsoft Graph API upload activity, suspicious cmd.exe or PowerShell execution, new startup entries, and unknown proxy or tunneling tools on endpoints.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages