{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreibnvzbjbs75rsy46ylf4uu3nwi5s4hj7gv2l5jx657fzbrkcyompq",
    "uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mime7zmlqjd2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreif5yfzaugtdhd27wvum4vopoq34ehnhja6xt5yitzzqa7buml54te"
    },
    "mimeType": "image/jpeg",
    "size": 504746
  },
  "path": "/2026/04/china-linked-ta416-targets-european.html",
  "publishedAt": "2026-04-03T17:34:00.000Z",
  "site": "https://thehackernews.com",
  "textContent": "A China-aligned threat actor has set its sights on European government and diplomatic organizations since mid-2025, following a two-year period of minimal targeting in the region. The campaign has been attributed to TA416, a cluster of activity that overlaps with DarkPeony, RedDelta, Red Lich, SmugX, UNC6384, and Vertigo Panda. \"This TA416 activity included multiple",
  "title": "China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing"
}