I’d come running back to EU again: TA416 resumes European government espionage campaigns | Proofpoint US

Key findings From mid-2025 onwards, the China-aligned threat actor TA416 resumed observed targeting of European government and diplomatic organizations following a period of reduced EU-

Proofpoint
TA416 APT Rebounds With New PlugX Malware Variant - The TA416 APT has returned in spear phishing attacks against a range of victims - from the Vatican... https://threatpost.com/ta416-apt-plugx-malware-variant/161505/ #advancedpersistentthreatgroup #china-holyseedeal #socialengineering #malwareanalysis #phishingattack #spearphishing #websecurity #proofpoint #diplomats #malware #vatican #golang #loader #hacks #china #plugx #ta416 #apt
TA416 APT Rebounds With New PlugX Malware Variant

The TA416 APT has returned in spear phishing attacks against a range of victims – from the Vatican to diplomats in Africa – with a new Golang version of its PlugX malware loader.

Threatpost - English - Global - threatpost.com