BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
NERF
The Vault
Threat Actors
Privacy Threats
Malware IoC
Dashboard
CVEs
Tags
Intel
NERFThe VaultThreat ActorsPrivacy ThreatsMalware IoCDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Weekly Intel Roundup: State-Sponsored Campaigns Target European Governments Amid Ongoing Supply Chain Crisis

Weekly Intel Roundup: State-Sponsored Campaigns Target European Governments Amid Ongoing Supply Chain Crisis

criticalVulnerabilities & Exploits|April 4, 20263 min read

Originally reported by The Hacker News, SANS ISC

#ta416#china-apt#supply-chain#teamPCP#web-shells#european-government#oauth-phishing#saas-compromise
Share

TL;DR

State-sponsored threat actors are escalating operations against European targets through sophisticated phishing campaigns and web shell persistence. The ongoing TeamPCP supply chain compromise has reached unprecedented scale with confirmed government breaches.

Why critical?

The TeamPCP supply chain campaign has compromised over 1,000 SaaS environments including the European Commission's cloud infrastructure, representing a critical threat to government and enterprise security.

Weekly Intelligence Brief: April 3, 2026

The threat landscape this week showcases the persistent evolution of state-sponsored operations and supply chain compromises. From renewed Chinese government targeting to sophisticated persistence mechanisms and unprecedented SaaS breaches, defenders face multi-vector challenges requiring immediate attention.

China-Linked TA416 Resumes European Government Operations

Proofpoint researchers have identified renewed targeting of European government and diplomatic organizations by TA416, a China-aligned threat actor with multiple overlapping designations including DarkPeony, RedDelta, and Vertigo Panda. The campaign marks a significant shift after a two-year period of minimal European targeting activity.

The operation leverages PlugX malware alongside OAuth-based phishing techniques to compromise government networks. TA416's return to European targeting suggests strategic realignment in Chinese cyber operations, potentially coordinated with broader geopolitical objectives.

The threat actor's use of OAuth-based phishing represents an evolution in technique, exploiting legitimate authentication protocols to bypass traditional email security controls. Organizations should review OAuth application permissions and implement enhanced monitoring for suspicious authentication flows.

Microsoft Exposes Cookie-Controlled Web Shell Persistence

Microsoft Defender Security Research Team has documented a sophisticated web shell technique where threat actors use HTTP cookies as command and control channels on Linux servers. The approach represents a significant departure from traditional web shell implementations that rely on URL parameters or request bodies.

These PHP-based web shells achieve persistence through cron job scheduling, allowing attackers to maintain access even after initial compromise vectors are discovered. The cookie-controlled mechanism provides operational security benefits for threat actors by obscuring command execution within seemingly benign HTTP traffic.

The technique highlights the need for enhanced web application monitoring that includes cookie analysis and cron job auditing. Traditional web application firewalls may not detect these attacks without specific rules targeting cookie-based command channels.

TeamPCP Supply Chain Campaign Reaches Critical Scale

SANS ISC's sixth intelligence update on the TeamPCP supply chain campaign reveals unprecedented scope, with Mandiant quantifying impact at over 1,000 SaaS environments. CERT-EU has confirmed the European Commission's cloud infrastructure as a verified victim, marking the campaign's expansion into critical government systems.

The campaign, dubbed "When the Security Scanner Became the Weapon," exploits compromised security scanning tools to establish persistent access across cloud environments. Recent developments include detailed post-compromise enumeration findings from Wiz and attribution of the axios package compromise to North Korean threat actors.

Sportradar has joined the growing list of confirmed victims, while LiteLLM has resumed operations following Mandiant's forensic audit. The scale and sophistication of the campaign underscore supply chain security as a critical vulnerability in modern cloud architectures.

Organizations should immediately audit their SaaS integrations, security scanning tool deployments, and third-party package dependencies. The campaign's impact on government infrastructure demands elevated threat modeling for cloud-first organizations.

Sources

  • https://thehackernews.com/2026/04/china-linked-ta416-targets-european.html
  • https://thehackernews.com/2026/04/microsoft-details-cookie-controlled-php.html
  • https://isc.sans.edu/diary/rss/32864

Originally reported by The Hacker News, SANS ISC

Tags

#ta416#china-apt#supply-chain#teamPCP#web-shells#european-government#oauth-phishing#saas-compromise

Related Intelligence

  • CISA KEV Additions, TeamPCP Supply Chain Attacks, and Critical Infrastructure Under Fire

    criticalMar 28, 2026
  • Supply Chain Attacks and Malware Campaigns Dominate Weekly Threat Landscape

    highApr 2, 2026
  • Zero-Day Exploitation Surges: TrueConf Attack, North Korean Supply Chain Hit, and Living-Off-The-Land Tactics

    highApr 1, 2026

Related Knowledge

  • NERF Training: Vulnerability Research Deep Dive

    offensive
  • NERF Web Security Deep Dive — Training Knowledge Base

    offensive
  • NERF Offensive Security Deep Reference

    offensive

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Weekly Threat Intel: Ransomware Strikes Politics, Supply Chain Attacks Target NPM, LinkedIn's Browser Surveillance

Next Article

Threat Actors Weaponize Claude Code Leak with Bundled Malware→