Yesterday's security developments from Thursday, April 02, 2026. We're covering 3 articles today. All attribution is by the article authors. All article analysis is automated.
Proofpoint reports that TA416, a China-aligned threat actor, resumed espionage operations in mid-2025 targeting European government and diplomatic entities including EU and NATO missions, later expanding to Middle Eastern targets. The campaigns employed sophisticated techniques including fake Cloudflare Turnstile pages, Microsoft Entra ID OAuth redirects, and MSBuild/CSPROJ delivery mechanisms to deploy customized PlugX backdoors via DLL sideloading.
The European Commission disclosed a supply-chain compromise on March 19, 2026, when threat actor TeamPCP exploited a compromised version of Trivy to steal AWS credentials. The attackers exfiltrated 91.7 gigabytes of data from 71 clients of the europa.eu hosting service, which was later published by ShinyHunters on the dark web, affecting 42 internal European Commission clients and 29 other Union entities.
Cisco Talos identified UAT-10608, a large-scale automated credential harvesting campaign exploiting CVE-2025-55182, known as React2Shell, in Next.js applications. The operation has compromised 766 hosts across multiple regions, deploying multi-phase scripts to steal SSH keys, cloud tokens, API credentials, and environment secrets, with attackers using a web-based GUI called NEXUS Listener to manage their command and control infrastructure.
That concludes today's briefing.