Inside Ink Dragon: Revealing the Relay Network and Inner Workings of a Stealthy Offensive Operation
Ink Dragon is a sophisticated espionage cluster, attributed to PRC-aligned actors, that has been active since early 2023 targeting government, telecom, and other strategic sectors. The operation uses a stealthy relay network to conduct offensive cyber operations, enabling persistent and covert access to victim networks. While no known exploits are currently in the wild, the threat is assessed as high severity due to its advanced capabilities and targeted nature. European organizations in critical infrastructure and government sectors are at risk, particularly those with strategic importance or existing geopolitical tensions with PRC interests. The operation’s relay network complicates detection and attribution, increasing the risk of prolonged data exfiltration and espionage. Mitigation requires enhanced network monitoring focused on detecting relay behaviors, strict segmentation, and threat intelligence sharing. Countries with significant telecom infrastructure and government digital assets, such as Germany, France, the UK, Italy, and the Netherlands, are most likely to be targeted. Given the threat’s sophistication, stealth, and potential impact on confidentiality and integrity without requiring user interaction, the suggested severity is high. Defenders should prioritize visibility into lateral movement and relay traffic patterns to disrupt this operation.
AI Analysis
Technical Summary
Ink Dragon is a highly capable espionage cluster tracked by Check Point Research and other vendors, linked to PRC-aligned threat actors. Active since at least early 2023, Ink Dragon targets government entities, telecommunications providers, and other strategic sectors. The operation employs a sophisticated relay network infrastructure that enables the attackers to conduct stealthy offensive operations, including persistent access, lateral movement, and data exfiltration. This relay network acts as a multi-hop proxy system, obfuscating the attackers’ true origin and complicating incident response and attribution efforts. The threat actors leverage advanced malware and custom tooling tailored to evade detection and maintain long-term presence within victim environments. Although no specific CVEs or vulnerabilities are disclosed, the cluster’s tactics, techniques, and procedures (TTPs) indicate a high level of operational security and technical sophistication. The absence of known exploits in the wild suggests the operation is targeted and controlled rather than opportunistic. The technical details highlight the use of encrypted communications, multi-stage payloads, and relay nodes distributed globally to mask command and control (C2) infrastructure. This approach allows Ink Dragon to bypass traditional network defenses and maintain stealthy command channels. The operation’s focus on telecom and government sectors underscores its strategic espionage objectives, likely aiming to gather sensitive intelligence and disrupt critical communications. The relay network’s complexity requires defenders to adopt advanced detection methods, including behavioral analytics and network traffic correlation, to identify anomalous relay patterns and lateral movement indicative of Ink Dragon activity.
Potential Impact
For European organizations, Ink Dragon poses a significant espionage threat, particularly to government agencies, telecom providers, and critical infrastructure operators. The operation’s stealthy relay network enables prolonged undetected access, risking large-scale data breaches involving sensitive governmental and strategic communications. Compromise could lead to loss of confidentiality of classified information, disruption of telecom services, and undermining of national security. The advanced evasion techniques complicate detection and remediation, potentially allowing attackers to maintain footholds for extended periods. This could also facilitate further attacks on supply chains or critical infrastructure, amplifying the operational impact. The geopolitical context, including tensions involving PRC interests and European strategic assets, increases the likelihood of targeted campaigns against high-value European targets. The threat could also erode trust in digital communications and complicate international cooperation on cybersecurity. Overall, the impact includes compromised data integrity, operational disruption, and strategic intelligence losses.
Mitigation Recommendations
European organizations should implement network segmentation to limit lateral movement and isolate critical assets. Deploy advanced network monitoring solutions capable of detecting multi-hop relay traffic and anomalous encrypted communications. Utilize threat intelligence feeds specific to Ink Dragon indicators and share findings within trusted cybersecurity communities. Conduct regular threat hunting exercises focusing on stealthy relay behaviors and unusual proxy patterns. Harden endpoint detection by deploying behavior-based detection tools that can identify multi-stage payload execution and command and control activity. Enforce strict access controls and multi-factor authentication to reduce the risk of initial compromise. Regularly update and patch systems, even though no specific CVEs are disclosed, to minimize attack surface. Engage in red teaming and simulation exercises to test detection and response capabilities against relay network tactics. Collaborate with national cybersecurity agencies for timely alerts and coordinated responses. Finally, maintain comprehensive logging and forensic readiness to support incident investigation and attribution.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Belgium, Sweden
Inside Ink Dragon: Revealing the Relay Network and Inner Workings of a Stealthy Offensive Operation
Description
Ink Dragon is a sophisticated espionage cluster, attributed to PRC-aligned actors, that has been active since early 2023 targeting government, telecom, and other strategic sectors. The operation uses a stealthy relay network to conduct offensive cyber operations, enabling persistent and covert access to victim networks. While no known exploits are currently in the wild, the threat is assessed as high severity due to its advanced capabilities and targeted nature. European organizations in critical infrastructure and government sectors are at risk, particularly those with strategic importance or existing geopolitical tensions with PRC interests. The operation’s relay network complicates detection and attribution, increasing the risk of prolonged data exfiltration and espionage. Mitigation requires enhanced network monitoring focused on detecting relay behaviors, strict segmentation, and threat intelligence sharing. Countries with significant telecom infrastructure and government digital assets, such as Germany, France, the UK, Italy, and the Netherlands, are most likely to be targeted. Given the threat’s sophistication, stealth, and potential impact on confidentiality and integrity without requiring user interaction, the suggested severity is high. Defenders should prioritize visibility into lateral movement and relay traffic patterns to disrupt this operation.
AI-Powered Analysis
Technical Analysis
Ink Dragon is a highly capable espionage cluster tracked by Check Point Research and other vendors, linked to PRC-aligned threat actors. Active since at least early 2023, Ink Dragon targets government entities, telecommunications providers, and other strategic sectors. The operation employs a sophisticated relay network infrastructure that enables the attackers to conduct stealthy offensive operations, including persistent access, lateral movement, and data exfiltration. This relay network acts as a multi-hop proxy system, obfuscating the attackers’ true origin and complicating incident response and attribution efforts. The threat actors leverage advanced malware and custom tooling tailored to evade detection and maintain long-term presence within victim environments. Although no specific CVEs or vulnerabilities are disclosed, the cluster’s tactics, techniques, and procedures (TTPs) indicate a high level of operational security and technical sophistication. The absence of known exploits in the wild suggests the operation is targeted and controlled rather than opportunistic. The technical details highlight the use of encrypted communications, multi-stage payloads, and relay nodes distributed globally to mask command and control (C2) infrastructure. This approach allows Ink Dragon to bypass traditional network defenses and maintain stealthy command channels. The operation’s focus on telecom and government sectors underscores its strategic espionage objectives, likely aiming to gather sensitive intelligence and disrupt critical communications. The relay network’s complexity requires defenders to adopt advanced detection methods, including behavioral analytics and network traffic correlation, to identify anomalous relay patterns and lateral movement indicative of Ink Dragon activity.
Potential Impact
For European organizations, Ink Dragon poses a significant espionage threat, particularly to government agencies, telecom providers, and critical infrastructure operators. The operation’s stealthy relay network enables prolonged undetected access, risking large-scale data breaches involving sensitive governmental and strategic communications. Compromise could lead to loss of confidentiality of classified information, disruption of telecom services, and undermining of national security. The advanced evasion techniques complicate detection and remediation, potentially allowing attackers to maintain footholds for extended periods. This could also facilitate further attacks on supply chains or critical infrastructure, amplifying the operational impact. The geopolitical context, including tensions involving PRC interests and European strategic assets, increases the likelihood of targeted campaigns against high-value European targets. The threat could also erode trust in digital communications and complicate international cooperation on cybersecurity. Overall, the impact includes compromised data integrity, operational disruption, and strategic intelligence losses.
Mitigation Recommendations
European organizations should implement network segmentation to limit lateral movement and isolate critical assets. Deploy advanced network monitoring solutions capable of detecting multi-hop relay traffic and anomalous encrypted communications. Utilize threat intelligence feeds specific to Ink Dragon indicators and share findings within trusted cybersecurity communities. Conduct regular threat hunting exercises focusing on stealthy relay behaviors and unusual proxy patterns. Harden endpoint detection by deploying behavior-based detection tools that can identify multi-stage payload execution and command and control activity. Enforce strict access controls and multi-factor authentication to reduce the risk of initial compromise. Regularly update and patch systems, even though no specific CVEs are disclosed, to minimize attack surface. Engage in red teaming and simulation exercises to test detection and response capabilities against relay network tactics. Collaborate with national cybersecurity agencies for timely alerts and coordinated responses. Finally, maintain comprehensive logging and forensic readiness to support incident investigation and attribution.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://research.checkpoint.com/2025/ink-dragons-relay-network-and-offensive-operation/","fetched":true,"fetchedAt":"2025-12-16T13:09:30.355Z","wordCount":5993}
Threat ID: 69415a0a83e5b48efc0390b3
Added to database: 12/16/2025, 1:09:30 PM
Last enriched: 12/16/2025, 1:09:45 PM
Last updated: 12/16/2025, 4:59:05 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-30274: Out-of-bounds Write (CWE-787) in Adobe Substance3D - Painter
HighCVE-2024-29945: Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information. in Splunk Splunk Enterprise
HighCVE-2024-29011: CWE-259 Use of Hard-coded Password in SonicWall GMS
HighCVE-2024-28165: CWE-79: Improper Neutralization of Input During Web Page Generation in SAP_SE SAP BusinessObjects Business Intelligence Platform
HighCVE-2024-27976: Vulnerability in Ivanti Avalanche
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.