{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreibnvzbjbs75rsy46ylf4uu3nwi5s4hj7gv2l5jx657fzbrkcyompq",
"uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mime7zmlqjd2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreif5yfzaugtdhd27wvum4vopoq34ehnhja6xt5yitzzqa7buml54te"
},
"mimeType": "image/jpeg",
"size": 504746
},
"path": "/2026/04/china-linked-ta416-targets-european.html",
"publishedAt": "2026-04-03T17:34:00.000Z",
"site": "https://thehackernews.com",
"textContent": "A China-aligned threat actor has set its sights on European government and diplomatic organizations since mid-2025, following a two-year period of minimal targeting in the region. The campaign has been attributed to TA416, a cluster of activity that overlaps with DarkPeony, RedDelta, Red Lich, SmugX, UNC6384, and Vertigo Panda. \"This TA416 activity included multiple",
"title": "China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing"
}