Experts warn Chinese ‘Ink Dragon’ hackers extend reach to European governments



  • Ink Dragon campaign violates European governments by exploiting misconfigured IIS and SharePoint servers
  • The group uses its FinalDraft backdoor to combine C2 traffic with normal activity in Microsoft’s cloud.
  • Dozens of government and telecommunications entities around the world became relay nodes for future operations.

Ink Dragon, a known Chinese state-sponsored threat actor, has extended its reach to European governments, using misconfigured devices for initial entry and establishing persistence by blending in with regular traffic, experts warned.

A report from cybersecurity researchers Check Point Software claims that attackers are using Microsoft IIS and SharePoint servers as relay nodes for future operations.



Leave a Comment

Your email address will not be published. Required fields are marked *