Ink Dragon’s European Espionage Escapade: How Chinese Spies Are Turning Servers into Secret Relay Stations
Ink Dragon, the Chinese espionage crew, has expanded its snooping spree into European government networks. By setting up sneaky relay nodes with compromised servers, they’re infiltrating without a hitch. With a knack for blending in like a chameleon, they scoop up credentials and infiltrate targets, making it look as easy as ordering takeout.

Hot Take:
Ink Dragon is playing the long game in the world of cyber cat and mouse, and it looks like they’ve just earned themselves a PhD in “How to Sneakily Infiltrate European Government Networks 101.” With their stealthy tactics and ingenious use of victims’ own infrastructure, it’s no wonder they’re becoming the cyber ninjas of espionage. Let’s just hope they don’t decide to open an online school for aspiring hackers!
Key Points:
- Chinese espionage group Ink Dragon targets European government networks using compromised servers.
- They exploit misconfigured Microsoft IIS and SharePoint servers rather than high-profile vulnerabilities.
- Ink Dragon uses stolen credentials to infiltrate and blend in with normal network traffic.
- The crew updates their malware to disguise it as common Microsoft cloud activity.
- Investigations revealed similar tactics by another China-linked group, RudePanda.
