{"id":493,"date":"2026-04-03T18:28:35","date_gmt":"2026-04-03T18:28:35","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=493"},"modified":"2026-04-03T18:28:35","modified_gmt":"2026-04-03T18:28:35","slug":"china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phishing","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=493","title":{"rendered":"China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing"},"content":{"rendered":"<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgi-dKCldJqtZI1CocMVxHNKusU5tcnMKjx7mzG9EfehvGacnTy4tsTfZLMfhyphenhyphenC5W210OxrxijBNAP8UumXAZH15ZSOM4x8xb9VTIHxN1HCouzROU0pn7sCJki9zJOkk9_8SRns73KxO1KvxUY4YgKGbbme6ZcKdbt4cqSHUkG5WQQPgDDTx_OLRbms35Dv\/s1700-e365\/chinese-hackers.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>A China-aligned threat actor has set its sights on European government and diplomatic organizations since mid-2025,\u00a0following a two-year\u00a0period of minimal targeting in the\u00a0region.<\/p>\n<p>The campaign has been attributed\u00a0to <strong>TA416<\/strong>, a cluster of activity that overlaps with DarkPeony, RedDelta, Red Lich, SmugX, UNC6384, and Vertigo\u00a0Panda.<\/p>\n<p>\u00abThis TA416 activity included multiple waves of web bug and malware delivery campaigns against diplomatic missions to the European Union and NATO across a range of European countries,\u00bb Proofpoint researchers Mark Kelly and Georgi\u00a0Mladenov <a href=\"https:\/\/www.proofpoint.com\/us\/blog\/threat-insight\/id-come-running-back-eu-again-ta416-resumes-european-government-espionage\">said<\/a>.<\/p>\n<p>\u00abThroughout this period, TA416 regularly altered its infection chain, including abusing Cloudflare Turnstile challenge pages, abusing OAuth redirects, and using C# project files, as well as frequently updating its custom PlugX\u00a0payload.\u00bb<\/p>\n<p>TA416 has also been observed orchestrating multiple campaigns aimed at diplomatic and government entities in the Middle East following the outbreak of the U.S.-Israel-Iran conflict in late February 2026. The\u00a0effort is likely an attempt to gather regional intelligence pertaining\u00a0to the conflict, the enterprise security company\u00a0added.<\/p>\n<p>It&#8217;s worth mentioning here that TA416 also shares historical technical overlaps with another cluster known\u00a0as Mustang\u00a0Panda (aka CerenaKeeper, Red Ishtar, and UNK_SteadySplit). The\u00a0two activity groups are collectively tracked under the monikers Earth Preta, Hive0154, HoneyMyte, Stately\u00a0Taurus, Temp.HEX, and Twill\u00a0Typhoon.\u00a0<\/p>\n<p>While\u00a0TA416&#8217;s attacks are characterized by the use of bespoke PlugX variants, the Mustang Panda cluster has repeatedly deployed tools like TONESHELL, PUBLOAD, and COOLCLIENT in recent attacks. What&#8217;s common to both of them is the use of DLL side-loading to launch the\u00a0malware.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/vpn-risk-report-inside-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWajeG0cdaapf1GKTZRUZUB7BzuYGegyw5k0eAorJXlmkFdYCCeLXXhXYJuXU9lWD33rV6rRnIyly3czoNfYifpxk1eGA5slItPmim3HkubXoQMgC4J7hdQPywxGbWq7Eqeff_o6s2Fq-WmSFd5guwdLn7IqpveMqULqtVnd-ndnljWYGj45EkMFB7m0qm\/s728-e100\/z-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>TA416&#8217;s renewed focus on European entities is\u00a0driven\u00a0a mix of web bug and malware delivery campaigns, with the threat actors using freemail sender accounts to conduct reconnaissance and deploy the PlugX backdoor via malicious archives hosted on Microsoft Azure Blob Storage, Google Drive, domains under their control, and compromised SharePoint instances. The\u00a0PlugX malware campaigns were previously documented\u00a0by StrikeReady\u00a0and Arctic\u00a0Wolf in October\u00a02025.<\/p>\n<p><a name=\"more\"\/><\/p>\n<p>\u00abA web bug (or tracking pixel) is a tiny invisible object embedded in an email that triggers an HTTP request to a remote server when opened, revealing the recipient&#8217;s IP address, user agent, and time of access, allowing the threat actor to assess whether the email was opened by the intended target,\u00bb Proofpoint\u00a0said.<\/p>\n<p>Attacks carried out by TA416 in December 2025 have been found to leverage third-party Microsoft Entra ID cloud applications to initiate redirects that lead to the download of malicious archives. Phishing emails used as part of this attack wave contain a link to Microsoft&#8217;s legitimate <a href=\"https:\/\/www.wiz.io\/blog\/detecting-malicious-oauth-applications\">OAuth<\/a> authorization endpoint that, when clicked, redirects the user to the attacker-controlled domain and ultimately deploys\u00a0PlugX.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh8WUad_W3hN7-F9zcLmhAA3PyWa1DzcPEQUiREMVI2hYG4YY1vS32SlatDnFBBhV2UckTMlU9UzQ9nkiagFFRYLOsLNthz22QDLPEsbiM35Bdxq5JZDkSQ_Pxga46Uxn0ok_EXo-j5kY2bbmIOrvVom-E-ZEfqf9Zx3b6S0eEzEz97wFqPKEgKHjjCn-RR\/s1700-e365\/map.png\" style=\"display: block;  text-align: center; clear: left; float: left;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh8WUad_W3hN7-F9zcLmhAA3PyWa1DzcPEQUiREMVI2hYG4YY1vS32SlatDnFBBhV2UckTMlU9UzQ9nkiagFFRYLOsLNthz22QDLPEsbiM35Bdxq5JZDkSQ_Pxga46Uxn0ok_EXo-j5kY2bbmIOrvVom-E-ZEfqf9Zx3b6S0eEzEz97wFqPKEgKHjjCn-RR\/s1700-e365\/map.png\" alt=\"\" border=\"0\" data-original-height=\"686\" data-original-width=\"1288\"\/><\/a><\/div>\n<p>The\u00a0use of this technique has not escaped Microsoft&#8217;s notice, which last\u00a0month warned of phishing campaigns targeting government and public-sector organizations that employ OAuth URL redirection mechanisms to bypass conventional phishing defenses implemented in email and\u00a0browsers.<\/p>\n<p>Further refinements to the attack chain were observed in February 2026, when TA416 began linking to archives hosted on Google Drive or a compromised SharePoint instance. The\u00a0downloaded archives, in this case, include a legitimate Microsoft MSBuild executable and a malicious C# project\u00a0file.<\/p>\n<p>\u00abWhen the MSBuild executable is run, it searches the current directory for a project file and automatically builds it,\u00bb the researchers said. \u00abIn the observed TA416 activity, the CSPROJ file acts as a downloader, decoding three Base64-encoded URLs to fetch a DLL side-loading triad from a TA416-controlled domain, saving them to the user&#8217;s temp directory, and executing a legitimate executable to load PlugX via the group&#8217;s typical DLL side-loading\u00a0chain.\u00bb<\/p>\n<p>The\u00a0PlugX malware remains a consistent presence throughout TA416&#8217;s intrusions, although the legitimate, signed executables abused for DLL side-loading have varied over time. The\u00a0backdoor is also known to establish an encrypted communication channel with its command-and-control (C2) server, but not before performing anti-analysis checks to sidestep detection.<\/p>\n<p>PlugX\u00a0accepts five different commands\u00a0&#8211;<\/p>\n<ul>\n<li><strong>0x00000002<\/strong>, to capture system information<\/li>\n<li><strong>0x00001005<\/strong>, to uninstall the malware<\/li>\n<li><strong>0x00001007<\/strong>, to adjust beaconing interval and timeout parameter<\/li>\n<li><strong>0x00003004<\/strong>, to download a new payload (EXE, DLL, or DAT) and execute it<\/li>\n<li><strong>0x00007002<\/strong>, to open a reverse command shell<\/li>\n<\/ul>\n<p>\u00abTA416&#8217;s shift back to European government targeting in mid-2025, following two years of focus on Southeast Asia and Mongolia, is consistent with a renewed intelligence-collection focus against EU and NATO-affiliated diplomacy entities,\u00bb Proofpoint\u00a0said.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/fast-response-not-fast-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A\/s728-e100\/tl-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>\u00abIn addition, TA416&#8217;s expansion to Middle Eastern government targeting in March 2026 further highlights how the group\u2019s tasking prioritization is likely influenced by geopolitical flashpoints and escalations. Throughout this period, the group has shown a willingness to iterate on infection chains, cycling through using fake Cloudflare Turnstile pages, OAuth redirect abuse, and MSBuild-based delivery, while continuing to update its customized PlugX backdoor.\u00bb<\/p>\n<p>The\u00a0disclosure comes as Darktrace revealed that Chinese\u2011nexus cyber operations have evolved from strategically-aligned activity in the 2010s to highly adaptive, identity-centric intrusions with an intent to establish long-term persistence within critical infrastructure\u00a0networks.<\/p>\n<p>Based\u00a0on a review of attack campaigns between July 2022 and September 2025, U.S.-based organizations accounted for 22.5% of all global events, followed by Italy, Spain, Germany, Thailand, the U.K., Panama, Colombia, the Philippines, and Hong Kong. A\u00a0majority of cases (63%) involved the exploitation of internet-facing infrastructure\u00a0(e.g., CVE-2025-31324\u00a0and CVE-2025-0994) to obtain initial\u00a0access.<\/p>\n<p>\u00abIn one notable case, the actor had fully compromised the environment and established persistence, only to resurface in the environment more than 600\u00a0days after,\u00bb\u00a0Darktrace <a href=\"https:\/\/www.darktrace.com\/es\/blog\/how-chinese-nexus-cyber-operations-have-evolved-and-what-it-means-for-cyber-risk-and-resilience\">said<\/a>. \u00abThe operational pause underscores both the depth of the intrusion and the actor\u2019s long\u2011term strategic\u00a0intent.\u00bb<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A China-aligned threat actor has set its sights on European government and diplomatic organizations since mid-2025,\u00a0following a two-year\u00a0period of minimal targeting in the\u00a0region. The campaign has been attributed\u00a0to TA416, a&hellip;<\/p>\n","protected":false},"author":1,"featured_media":494,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[479,79,378,1072,390,1071,1070,78],"class_list":["post-493","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-chinalinked","tag-european","tag-governments","tag-oauthbased","tag-phishing","tag-plugx","tag-ta416","tag-targets"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/493","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=493"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/493\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/494"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=493"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=493"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}