China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing
嗯,用户让我帮忙总结这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写描述就行。 首先,我需要通读整篇文章,抓住主要信息。文章讲的是一个与中国相关的威胁行为者TA416,从2025年中开始针对欧洲政府和外交组织展开网络攻击。他们使用了多种技术手段,比如网络陷阱、恶意软件分发,以及利用OAuth重定向和微软的云服务来绕过安全防御。 接下来,TA416还转向中东地区,在2026年2月美国、以色列和伊朗冲突爆发后,对那里的政府机构发动攻击。这可能是因为他们想收集与冲突相关的地区情报。 文章还提到TA416和其他集群如Mustang Panda有技术重叠,都使用DLL侧加载来部署恶意软件。PlugX后门程序是他们常用的工具,并且不断更新以逃避检测。 最后,Darktrace的报告指出中国关联的网络行动已经从战略对齐转向更具适应性的身份中心入侵,目的是在关键基础设施中建立长期存在。 现在,我需要把这些要点浓缩到100字以内。要包括时间、目标地区、攻击手段、涉及的其他集群以及PlugX的作用。 可能的结构是:时间范围、目标区域、攻击方法、技术手段、涉及的其他集群以及PlugX的作用。 检查一下是否符合要求:不超过100字,直接描述内容,不使用特定开头。 好的,现在试着组织语言: “自2025年中起,TA416针对欧洲政府和外交机构展开网络攻击,并于2026年扩展至中东地区。攻击利用Cloudflare陷阱、OAuth重定向及恶意档案分发PlugX后门。该组织与Mustang Panda共享技术,并通过DLL侧加载部署恶意软件。” 这样大约80字左右,符合要求。 </think> 自2025年中起,TA416针对欧洲政府和外交机构展开网络攻击,并利用Cloudflare陷阱、OAuth重定向及恶意档案分发PlugX后门。该组织于2026年扩展至中东地区,并与其他集群共享技术,通过DLL侧加载部署恶意软件。 2026-4-3 17:34:0 Author: thehackernews.com(查看原文) 阅读量:3 收藏

A China-aligned threat actor has set its sights on European government and diplomatic organizations since mid-2025, following a two-year period of minimal targeting in the region.

The campaign has been attributed to TA416, a cluster of activity that overlaps with DarkPeony, RedDelta, Red Lich, SmugX, UNC6384, and Vertigo Panda.

"This TA416 activity included multiple waves of web bug and malware delivery campaigns against diplomatic missions to the European Union and NATO across a range of European countries," Proofpoint researchers Mark Kelly and Georgi Mladenov said.

"Throughout this period, TA416 regularly altered its infection chain, including abusing Cloudflare Turnstile challenge pages, abusing OAuth redirects, and using C# project files, as well as frequently updating its custom PlugX payload."

TA416 has also been observed orchestrating multiple campaigns aimed at diplomatic and government entities in the Middle East following the outbreak of the U.S.-Israel-Iran conflict in late February 2026. The effort is likely an attempt to gather regional intelligence pertaining to the conflict, the enterprise security company added.

It's worth mentioning here that TA416 also shares historical technical overlaps with another cluster known as Mustang Panda (aka CerenaKeeper, Red Ishtar, and UNK_SteadySplit). The two activity groups are collectively tracked under the monikers Earth Preta, Hive0154, HoneyMyte, Stately Taurus, Temp.HEX, and Twill Typhoon. 

While TA416's attacks are characterized by the use of bespoke PlugX variants, the Mustang Panda cluster has repeatedly deployed tools like TONESHELL, PUBLOAD, and COOLCLIENT in recent attacks. What's common to both of them is the use of DLL side-loading to launch the malware.

TA416's renewed focus on European entities is driven a mix of web bug and malware delivery campaigns, with the threat actors using freemail sender accounts to conduct reconnaissance and deploy the PlugX backdoor via malicious archives hosted on Microsoft Azure Blob Storage, Google Drive, domains under their control, and compromised SharePoint instances. The PlugX malware campaigns were previously documented by StrikeReady and Arctic Wolf in October 2025.

"A web bug (or tracking pixel) is a tiny invisible object embedded in an email that triggers an HTTP request to a remote server when opened, revealing the recipient's IP address, user agent, and time of access, allowing the threat actor to assess whether the email was opened by the intended target," Proofpoint said.

Attacks carried out by TA416 in December 2025 have been found to leverage third-party Microsoft Entra ID cloud applications to initiate redirects that lead to the download of malicious archives. Phishing emails used as part of this attack wave contain a link to Microsoft's legitimate OAuth authorization endpoint that, when clicked, redirects the user to the attacker-controlled domain and ultimately deploys PlugX.

The use of this technique has not escaped Microsoft's notice, which last month warned of phishing campaigns targeting government and public-sector organizations that employ OAuth URL redirection mechanisms to bypass conventional phishing defenses implemented in email and browsers.

Further refinements to the attack chain were observed in February 2026, when TA416 began linking to archives hosted on Google Drive or a compromised SharePoint instance. The downloaded archives, in this case, include a legitimate Microsoft MSBuild executable and a malicious C# project file.

"When the MSBuild executable is run, it searches the current directory for a project file and automatically builds it," the researchers said. "In the observed TA416 activity, the CSPROJ file acts as a downloader, decoding three Base64-encoded URLs to fetch a DLL side-loading triad from a TA416-controlled domain, saving them to the user's temp directory, and executing a legitimate executable to load PlugX via the group's typical DLL side-loading chain."

The PlugX malware remains a consistent presence throughout TA416's intrusions, although the legitimate, signed executables abused for DLL side-loading have varied over time. The backdoor is also known to establish an encrypted communication channel with its command-and-control (C2) server, but not before performing anti-analysis checks to sidestep detection.

PlugX accepts five different commands -

  • 0x00000002, to capture system information
  • 0x00001005, to uninstall the malware
  • 0x00001007, to adjust beaconing interval and timeout parameter
  • 0x00003004, to download a new payload (EXE, DLL, or DAT) and execute it
  • 0x00007002, to open a reverse command shell

"TA416's shift back to European government targeting in mid-2025, following two years of focus on Southeast Asia and Mongolia, is consistent with a renewed intelligence-collection focus against EU and NATO-affiliated diplomacy entities," Proofpoint said.

"In addition, TA416's expansion to Middle Eastern government targeting in March 2026 further highlights how the group’s tasking prioritization is likely influenced by geopolitical flashpoints and escalations. Throughout this period, the group has shown a willingness to iterate on infection chains, cycling through using fake Cloudflare Turnstile pages, OAuth redirect abuse, and MSBuild-based delivery, while continuing to update its customized PlugX backdoor."

The disclosure comes as Darktrace revealed that Chinese‑nexus cyber operations have evolved from strategically-aligned activity in the 2010s to highly adaptive, identity-centric intrusions with an intent to establish long-term persistence within critical infrastructure networks.

Based on a review of attack campaigns between July 2022 and September 2025, U.S.-based organizations accounted for 22.5% of all global events, followed by Italy, Spain, Germany, Thailand, the U.K., Panama, Colombia, the Philippines, and Hong Kong. A majority of cases (63%) involved the exploitation of internet-facing infrastructure (e.g., CVE-2025-31324 and CVE-2025-0994) to obtain initial access.

"In one notable case, the actor had fully compromised the environment and established persistence, only to resurface in the environment more than 600 days after," Darktrace said. "The operational pause underscores both the depth of the intrusion and the actor’s long‑term strategic intent."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/china-linked-ta416-targets-european.html
如有侵权请联系:admin#unsafe.sh