Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

New Phishing Platform Used in Credential Theft Campaigns

April 3, 2026

WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites

April 3, 2026

GitHub Used as Covert Channel in Multi-Stage Malware Campaign

April 3, 2026
Facebook X (Twitter) Instagram
Friday, April 3
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Chinese Hackers Target European Governments in Espionage Campaigns
News

Chinese Hackers Target European Governments in Espionage Campaigns

Team-CWDBy Team-CWDApril 1, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


After a quiet period since 2023, Chinese state-backed group TA416 has reemerged with a vengeance, launching a fresh wave of cyber espionage campaigns against European governments.

Proofpoint researchers detected the group’s renewed activity in mid-2025, with multiple malware delivery campaigns targeting EU and NATO diplomatic missions across a range of European countries.

TA416 regularly altered its infection chain, including abusing Cloudflare Turnstile challenge pages, abusing OAuth redirects and using C# project files, as well as frequently updating its custom PlugX payload, noted the Proofpoint researchers in an April 1 report.

In March 2026, Proofpoint also observed in the weeks following the outbreak of conflict in Iran TA416 expand its targets to include diplomatic and government entities in the Middle East.

TA416 in 2025-2026: Europe-Focused Espionage Campaigns

From mid-2025 to early 2026, Proofpoint researchers said TA416 conducted both “broad web bug” and malware delivery campaigns.

According to the researchers, web bugs, also known as ‘tracking pixel,’ refer to tiny invisible objects embedded in an email that triggers an HTTP request to a remote server when opened, revealing the recipient’s IP address, user agent. and time of access. This allows the threat actor to assess whether the email was opened by the intended target.

The TA416 web bug campaigns used freemail sender accounts and a range of thematic lures, such as Europe sending troops to Greenland to perform delivery and engagement reconnaissance.

Malware delivery campaigns used both attacker-controlled freemail accounts and compromised government and diplomatic mailboxes to send links to malicious archives hosted on Microsoft Azure Blob Storage, actor-controlled domains, Google Drive and compromised SharePoint instances.

TA416 repeatedly altered its initial infection chains while maintaining a consistent goal of loading the group’s customized PlugX backdoor via DLL sideloading triads.

Initial access techniques changed over the course of the campaign, with several distinct approaches observed across different time periods:

  • September 2025 – January 2026: The group used spoofed Cloudflare Turnstile challenge pages that gated access to ZIP archives
  • December 2025 – January 2026: TA416 abused Microsoft Entra ID third‑party applications that redirected users to attacker-controlled malware delivery domains
  • From February 2026: Campaigns shifted to using archives containing a renamed Microsoft MSBuild executable and malicious C# project files

In each case, TA416 relied on either ZIP smuggling using Microsoft shortcut (LNK) files or CSPROJ-based downloaders to deliver a signed executable, malicious DLL and encrypted payload triad that ultimately loaded PlugX into memory.

TA416 or Mustang Panda?

TA416 is the codename attributed to a Chinese-backed advance persistent threat (APT) group also know by many names, the most common is Mustang Panda.

According to MITRE ATT&CK, Mustang Panda was first discovered in 2012 and has been targeting government, diplomatic and non-governmental organizations, including think tanks, religious institutions and research entities, across the US, Europe and Asia, with notable activity in Russia, Mongolia, Myanmar, Pakistan and Vietnam.

However, Proofpoint researchers track Mustang Panda under two primary clusters: TA416 (aka Vertigo Panda, RedDelta, Red Lich, UNC6384, SmugX, DarkPeony) and a second group tracked under the temporary designator UNK_SteadySplit (aka CerenaKeeper, Red Ishtar).

Prior research by Trend Micro had identified technical overlaps between TA416 and UNK_SteadySplit, most notably through a UNK_SteadySplit TONESHELL command-and-control (C2) IP address embedded in a filepath within two LNK files used in TA416 campaigns.

The latest Proofpoint report suggested that these connections imply some form of organizational, personnel or hierarchical link between the two groups.

However, Proofpoint clarified that while such overlaps were documented in earlier operations, the nature of the relationship remains unclear and no similar connections have been observed in recent campaigns.

Proofpoint also highlighted those other aliases for Mustang Panda, including Twill Typhoon, Temp.HEX, Earth Preta, Stately Taurus, HoneyMyte and Hive0154, likely refer to campaigns where TA416 and UNK_SteadySplit were working together.

TA416’s Infrastructure

TA416 uses a steady supply of re-registered, formerly legitimate domains for C2, malware delivery and web bugs, often first using domains within days after re-registering them, a tactic that allows the group to evade domain reputation-based security controls.

Proofpoint noted that the 2025 and 2026 TA416 campaigns were leveraging virtual private server (VPS) providers Evoxt Enterprise (AS149440), XNNET LLC (AS6134) and Kaopu Cloud HK Limited (AS138915).

The group typically also uses the Cloudflare Content Delivery Network (CDN) to obscure backend hosting IP addresses used for malware delivery and C2 and deploys minimal fake websites on its C2 domains, likely to hinder signaturing and tracking efforts and to make these domains appear legitimate.

In October 2025, Arctic Wolf reported about a cyber espionage campaign targeting Belgian and Hungarian diplomats that it attributed to Mustang Panda.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleThe Hidden Cost of Cybersecurity Specialization: Losing Foundational Skills
Next Article Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner
Team-CWD
  • Website

Related Posts

News

New Phishing Platform Used in Credential Theft Campaigns

April 3, 2026
News

WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites

April 3, 2026
News

GitHub Used as Covert Channel in Multi-Stage Malware Campaign

April 3, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views

Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials

September 5, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

Look out for phony verification pages spreading malware

September 14, 2025

How cybercriminals are targeting content creators

November 26, 2025

Watch out for SVG files booby-trapped with malware

September 22, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.