Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026

Here’s what you should know

February 6, 2026
Facebook X (Twitter) Instagram
Friday, February 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Chinese Ink Dragon Group Hides in European Government Networks
Cyber Security

Chinese Ink Dragon Group Hides in European Government Networks

Team-CWDBy Team-CWDDecember 18, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A prolific China-linked threat group is turning misconfigured servers in European government networks into relay nodes, in order to hide its cyber-espionage activity, according to Check Point.

The security vendor claimed Ink Dragon had expanded similar operations in Asia and South America to the Old World, “through a series of quiet but disciplined campaigns.”

The group initially probes public-facing websites for weaknesses, looking for configuration issues in Microsoft’s IIS web server, SharePoint and other servers.

Once it has established a foothold, it moves quietly through the environment, collecting credentials from the compromised server, identifying active administrator sessions, and reusing shared or replicated service accounts to reach nearby systems. The group uses Remote Desktop to blend into normal traffic while moving laterally, Check Point explained.

Read more on Chinese relay node campaigns: Chinese Hackers Rely on Covert Proxy Networks to Evade Detection

Once the threat actors find an account with domain-level rights they “map the environment in detail, control policy settings, and deploy long-term access tools across high-value systems,” according to Check Point.

To establish persistence, they install a backdoor, deploy implants which store credentials and data, and look for new paths for remote access.

The Bigger Picture

The broader plan is to create a network of relay nodes to obfuscate the group’s cyber-espionage activity.

“One of Ink Dragon’s defining traits is how they use compromised organizations to support operations elsewhere. The group deploys a customized IIS based module that turns public-facing servers into quiet relay points. These servers forward commands and data between different victims, creating a communication mesh that hides the true origin of the attack traffic,” the report explained.

“Across incidents, the same story repeats. A small web facing issue becomes the first step. A series of quiet pivots leads to domain level control. The environment is then repurposed as part of a larger network that powers operations against additional targets. This measured approach shows how Ink Dragon combines discipline, consistency, and evolving tools to expand its reach over time.”

To achieve its goals, Ink Dragon continues to update its tooling, including a new version of the FinalDraft backdoor built for long-term access and to blend into Microsoft cloud activity, said Check Point.

The report also claimed that a second China-linked group, RudePanda, had entered some of the same European government networks and even exploited the same exposed server vulnerability.

“This overlap does not suggest cooperation,” Check Point concluded.

“However, it shows how a single unpatched weakness can become an open door for multiple advanced actors, each running its own campaign inside the same organization.”

It’s not just China using these tactics to build out covert, resilient networks for staging new attack campaigns. This week, AWS warned of a new Russian military intelligence campaign using misconfigured network edge devices for initial access.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleHow to Streamline Zero Trust Using the Shared Signals Framework
Next Article Storm-0249 Escalates Ransomware Attacks with ClickFix, Fileless PowerShell, and DLL Sideloading
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Drowning in spam or scam emails lately? Here’s why

January 27, 2026

The WhatsApp screen-sharing scam you didn’t see coming

November 6, 2025

How chatbots can help spread scams

October 14, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.