CyberWire Daily

The spy who logged me in. [Research Saturday]

6 snips
May 9, 2026
Mark Kelly, Staff Threat Researcher at Proofpoint who tracks China-aligned espionage, discusses TA416's resurgence against European diplomatic and government targets. He covers tracking-pixel reconnaissance, phishing from compromised diplomatic mailboxes, evolving infection chains like fake CAPTCHA and OAuth abuse, Pivot to Middle East targets, and persistent PlugX backdoor use.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Diplomatic Networks Are Primary Targets

  • TA416 focuses on diplomatic intelligence gathering rather than broad disruption.
  • Mark Kelly notes targeting embassies and Ministries of Foreign Affairs across Europe to map foreign-policy and diplomatic networks.
ANECDOTE

Tracking Pixels Flag High-Value Targets

  • TA416 uses tracking pixels for reconnaissance before deploying malware.
  • Kelly describes tiny email-embedded images that signal when a target opens mail, flagging promising victims for follow-up spearphishing.
INSIGHT

Compromised Diplomatic Mailboxes Amplify Credibility

  • TA416 frequently reuses previously compromised diplomatic mailboxes to launch new campaigns.
  • Mark Kelly explains this makes phishing far more convincing because targets trust government senders they've previously engaged with.
Get the Snipd Podcast app to discover more snips from this episode
Get the app