A China-aligned threat actor, known as TA416, has been targeting European government and diplomatic organizations since mid-2025, marking a significant shift in its targeting strategy after a two-year period of minimal activity in the region.

The campaign, which has been attributed to TA416, overlaps with other known threat actor clusters, including DarkPeony, RedDelta, Red Lich, SmugX, UNC6384, and Vertigo Panda, highlighting the complex and evolving nature of China-linked cyber threats.

TA416’s tactics, techniques, and procedures (TTPs) involve the use of PlugX malware and OAuth-based phishing attacks, demonstrating the group’s ability to adapt and refine its methods to evade detection and exploit vulnerabilities in its targets’ defenses.

The targeting of European governments and diplomatic organizations by TA416 underscores the ongoing threat posed by China-linked cyber actors to global security and stability, and highlights the need for organizations to remain vigilant and proactive in their cybersecurity measures.

As the threat landscape continues to evolve, it is essential for organizations to stay informed about the latest TTPs and vulnerabilities, such as CVEs, and to implement robust security controls to prevent and respond to cyber attacks.

Source: Original Article