CyberWire Daily
CyberWire Daily
N2K Networks
The spy who logged me in. [Research Saturday]
2 minutes Posted May 9, 2026 at 7:00 am.
0:00
2:45
Download MP3
Show notes
Mark Kelly, Staff Threat Researcher at Proofpoint, is discussing their work on "I’d come running back to EU again: TA416 resumes European government espionage campaigns." China-linked threat group TA416 has resumed large-scale phishing and malware campaigns targeting European governments, diplomatic missions tied to the EU and NATO, and more recently Middle Eastern entities following the outbreak of conflict in Iran.
The group has continually evolved its tactics between mid-2025 and early 2026, using techniques like fake Cloudflare verification pages, Microsoft OAuth redirect abuse, and malicious C# project files to deliver customized PlugX malware through spearphishing campaigns. Researchers say the renewed activity reflects shifting geopolitical priorities tied to EU-China tensions, the Russia-Ukraine war, and instability in the Middle East, while highlighting TA416’s ongoing focus on intelligence gathering against diplomatic networks.
The research and executive brief can be found here:
I’d come running back to EU again: TA416 resumes European government espionage campaigns
Learn more about your ad choices. Visit megaphone.fm/adchoices