Inside Ink Dragon: Revealing the Relay Network and Inner Workings of a Stealthy Offensive Operation
Key Findings Introduction Check Point Research tracks a sustained, highly capable espionage cluster, which we refer to as Ink Dragon, and is referenced in other reports as CL-STA-0049, Earth Alux, or REF7707. This cluster is assessed by several vendors to be PRC-aligned. Since at least early 2023, Ink Dragon has repeatedly targeted government, telecom, and […] The post Inside Ink Dragon: Revealing the Relay Network and Inner Workings of a Stealthy Offensive Operation appeared first on Check Point Research .
AI Analysis
Technical Summary
Ink Dragon is a highly capable espionage cluster tracked by Check Point Research and other cybersecurity vendors, linked to PRC-aligned threat actors. Active since at least early 2023, Ink Dragon targets government entities, telecommunications providers, and other critical sectors. The operation is characterized by a stealthy relay network infrastructure that enables the attackers to obfuscate command and control (C2) communications and evade detection. This relay network acts as an intermediary layer, complicating attribution and forensic analysis. The attackers employ advanced operational security measures, including multi-stage payload delivery, encrypted communications, and persistent footholds within victim environments. Although no specific software vulnerabilities or CVEs are publicly disclosed, the threat leverages a combination of social engineering, supply chain compromises, and possibly zero-day exploits to gain initial access. The campaign's sophistication suggests a well-resourced actor with strategic intelligence objectives. The lack of known exploits in the wild indicates the operation is either highly targeted or still under active development. The detailed technical report from Check Point Research (5993 words) provides in-depth analysis of the relay network architecture, attack vectors, and indicators of compromise, which are critical for detection and response. The threat's persistence and targeting of sensitive sectors highlight the need for continuous monitoring and threat intelligence integration.
Potential Impact
For European organizations, Ink Dragon poses a significant risk to the confidentiality and integrity of sensitive government and telecom data. Successful intrusions could lead to espionage, intellectual property theft, disruption of critical communications infrastructure, and erosion of national security. The stealthy nature of the relay network complicates detection and response, increasing the likelihood of prolonged undetected access. Given the targeting of telecom providers, there is potential for interception or manipulation of communications affecting millions of users. Government agencies could face exposure of classified information, undermining diplomatic and defense operations. The operation's persistence and advanced tactics could also impact supply chain security, affecting European technology providers and service vendors. The geopolitical context, including tensions involving PRC-aligned actors, raises the stakes for European states engaged in strategic partnerships or with critical infrastructure dependencies. Overall, the threat could disrupt trust in digital services and necessitate costly incident response and remediation efforts.
Mitigation Recommendations
European organizations should implement advanced network traffic analysis to detect anomalous relay patterns indicative of Ink Dragon's stealthy infrastructure. Deploying endpoint detection and response (EDR) solutions with behavioral analytics can help identify multi-stage payload execution and lateral movement. Organizations must enhance threat intelligence sharing within sectors and across national CERTs to rapidly disseminate indicators of compromise and TTPs. Strict access controls, including zero-trust network architectures, can limit attacker lateral movement and persistence. Regular security audits of supply chain vendors and software integrity verification are critical to prevent initial compromise vectors. Multi-factor authentication (MFA) and robust phishing resistance training reduce social engineering risks. Incident response plans should be updated to address advanced persistent threat scenarios with relay network obfuscation. Finally, collaboration with law enforcement and international cybersecurity alliances can improve attribution and coordinated defense efforts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium
Inside Ink Dragon: Revealing the Relay Network and Inner Workings of a Stealthy Offensive Operation
Description
Key Findings Introduction Check Point Research tracks a sustained, highly capable espionage cluster, which we refer to as Ink Dragon, and is referenced in other reports as CL-STA-0049, Earth Alux, or REF7707. This cluster is assessed by several vendors to be PRC-aligned. Since at least early 2023, Ink Dragon has repeatedly targeted government, telecom, and […] The post Inside Ink Dragon: Revealing the Relay Network and Inner Workings of a Stealthy Offensive Operation appeared first on Check Point Research .
AI-Powered Analysis
Technical Analysis
Ink Dragon is a highly capable espionage cluster tracked by Check Point Research and other cybersecurity vendors, linked to PRC-aligned threat actors. Active since at least early 2023, Ink Dragon targets government entities, telecommunications providers, and other critical sectors. The operation is characterized by a stealthy relay network infrastructure that enables the attackers to obfuscate command and control (C2) communications and evade detection. This relay network acts as an intermediary layer, complicating attribution and forensic analysis. The attackers employ advanced operational security measures, including multi-stage payload delivery, encrypted communications, and persistent footholds within victim environments. Although no specific software vulnerabilities or CVEs are publicly disclosed, the threat leverages a combination of social engineering, supply chain compromises, and possibly zero-day exploits to gain initial access. The campaign's sophistication suggests a well-resourced actor with strategic intelligence objectives. The lack of known exploits in the wild indicates the operation is either highly targeted or still under active development. The detailed technical report from Check Point Research (5993 words) provides in-depth analysis of the relay network architecture, attack vectors, and indicators of compromise, which are critical for detection and response. The threat's persistence and targeting of sensitive sectors highlight the need for continuous monitoring and threat intelligence integration.
Potential Impact
For European organizations, Ink Dragon poses a significant risk to the confidentiality and integrity of sensitive government and telecom data. Successful intrusions could lead to espionage, intellectual property theft, disruption of critical communications infrastructure, and erosion of national security. The stealthy nature of the relay network complicates detection and response, increasing the likelihood of prolonged undetected access. Given the targeting of telecom providers, there is potential for interception or manipulation of communications affecting millions of users. Government agencies could face exposure of classified information, undermining diplomatic and defense operations. The operation's persistence and advanced tactics could also impact supply chain security, affecting European technology providers and service vendors. The geopolitical context, including tensions involving PRC-aligned actors, raises the stakes for European states engaged in strategic partnerships or with critical infrastructure dependencies. Overall, the threat could disrupt trust in digital services and necessitate costly incident response and remediation efforts.
Mitigation Recommendations
European organizations should implement advanced network traffic analysis to detect anomalous relay patterns indicative of Ink Dragon's stealthy infrastructure. Deploying endpoint detection and response (EDR) solutions with behavioral analytics can help identify multi-stage payload execution and lateral movement. Organizations must enhance threat intelligence sharing within sectors and across national CERTs to rapidly disseminate indicators of compromise and TTPs. Strict access controls, including zero-trust network architectures, can limit attacker lateral movement and persistence. Regular security audits of supply chain vendors and software integrity verification are critical to prevent initial compromise vectors. Multi-factor authentication (MFA) and robust phishing resistance training reduce social engineering risks. Incident response plans should be updated to address advanced persistent threat scenarios with relay network obfuscation. Finally, collaboration with law enforcement and international cybersecurity alliances can improve attribution and coordinated defense efforts.
Affected Countries
Technical Details
- Article Source
- {"url":"https://research.checkpoint.com/2025/ink-dragons-relay-network-and-offensive-operation/","fetched":true,"fetchedAt":"2025-12-16T13:09:30.355Z","wordCount":5993}
Threat ID: 69415a0a83e5b48efc0390b3
Added to database: 12/16/2025, 1:09:30 PM
Last enriched: 1/5/2026, 4:18:01 PM
Last updated: 2/7/2026, 7:39:50 AM
Views: 596
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.