Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Inside Ink Dragon: Revealing the Relay Network and Inner Workings of a Stealthy Offensive Operation

0
High
Vulnerability
Published: Tue Dec 16 2025 (12/16/2025, 13:01:37 UTC)
Source: Check Point Research

Description

Key Findings Introduction Check Point Research tracks a sustained, highly capable espionage cluster, which we refer to as Ink Dragon, and is referenced in other reports as CL-STA-0049, Earth Alux, or REF7707. This cluster is assessed by several vendors to be PRC-aligned. Since at least early 2023, Ink Dragon has repeatedly targeted government, telecom, and […] The post Inside Ink Dragon: Revealing the Relay Network and Inner Workings of a Stealthy Offensive Operation appeared first on Check Point Research .

AI-Powered Analysis

AILast updated: 01/05/2026, 16:18:01 UTC

Technical Analysis

Ink Dragon is a highly capable espionage cluster tracked by Check Point Research and other cybersecurity vendors, linked to PRC-aligned threat actors. Active since at least early 2023, Ink Dragon targets government entities, telecommunications providers, and other critical sectors. The operation is characterized by a stealthy relay network infrastructure that enables the attackers to obfuscate command and control (C2) communications and evade detection. This relay network acts as an intermediary layer, complicating attribution and forensic analysis. The attackers employ advanced operational security measures, including multi-stage payload delivery, encrypted communications, and persistent footholds within victim environments. Although no specific software vulnerabilities or CVEs are publicly disclosed, the threat leverages a combination of social engineering, supply chain compromises, and possibly zero-day exploits to gain initial access. The campaign's sophistication suggests a well-resourced actor with strategic intelligence objectives. The lack of known exploits in the wild indicates the operation is either highly targeted or still under active development. The detailed technical report from Check Point Research (5993 words) provides in-depth analysis of the relay network architecture, attack vectors, and indicators of compromise, which are critical for detection and response. The threat's persistence and targeting of sensitive sectors highlight the need for continuous monitoring and threat intelligence integration.

Potential Impact

For European organizations, Ink Dragon poses a significant risk to the confidentiality and integrity of sensitive government and telecom data. Successful intrusions could lead to espionage, intellectual property theft, disruption of critical communications infrastructure, and erosion of national security. The stealthy nature of the relay network complicates detection and response, increasing the likelihood of prolonged undetected access. Given the targeting of telecom providers, there is potential for interception or manipulation of communications affecting millions of users. Government agencies could face exposure of classified information, undermining diplomatic and defense operations. The operation's persistence and advanced tactics could also impact supply chain security, affecting European technology providers and service vendors. The geopolitical context, including tensions involving PRC-aligned actors, raises the stakes for European states engaged in strategic partnerships or with critical infrastructure dependencies. Overall, the threat could disrupt trust in digital services and necessitate costly incident response and remediation efforts.

Mitigation Recommendations

European organizations should implement advanced network traffic analysis to detect anomalous relay patterns indicative of Ink Dragon's stealthy infrastructure. Deploying endpoint detection and response (EDR) solutions with behavioral analytics can help identify multi-stage payload execution and lateral movement. Organizations must enhance threat intelligence sharing within sectors and across national CERTs to rapidly disseminate indicators of compromise and TTPs. Strict access controls, including zero-trust network architectures, can limit attacker lateral movement and persistence. Regular security audits of supply chain vendors and software integrity verification are critical to prevent initial compromise vectors. Multi-factor authentication (MFA) and robust phishing resistance training reduce social engineering risks. Incident response plans should be updated to address advanced persistent threat scenarios with relay network obfuscation. Finally, collaboration with law enforcement and international cybersecurity alliances can improve attribution and coordinated defense efforts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://research.checkpoint.com/2025/ink-dragons-relay-network-and-offensive-operation/","fetched":true,"fetchedAt":"2025-12-16T13:09:30.355Z","wordCount":5993}

Threat ID: 69415a0a83e5b48efc0390b3

Added to database: 12/16/2025, 1:09:30 PM

Last enriched: 1/5/2026, 4:18:01 PM

Last updated: 2/7/2026, 12:35:37 AM

Views: 595

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats