Operation CamelClone: Multi-Region Espionage Campaign Targets Government and Defense Entities Amidst Regional Tensions
Operation CamelClone is a multi-region espionage campaign targeting government and defense entities in Algeria, Mongolia, Ukraine, and Kuwait. The attackers use spear-phishing emails with malicious ZIP archives containing lure documents and shortcuts. The infection chain involves a JavaScript loader called HOPPINGANT, which downloads additional payloads from public file-sharing websites. The campaign abuses legitimate tools like Rclone for data exfiltration to MEGA cloud storage. Targeting patterns suggest intelligence gathering objectives, focusing on foreign policy, defense capabilities, and diplomatic alignments of countries navigating major-power rivalries. The operation's use of public services for payload hosting and data exfiltration makes network-based detection challenging.
AI Analysis
Technical Summary
Operation CamelClone is a multi-region espionage campaign identified by AlienVault targeting government and defense sectors in Algeria, Mongolia, Ukraine, and Kuwait. The attack vector begins with spear-phishing emails that contain malicious ZIP archives. These archives include lure documents and shortcut files designed to trick users into executing them. Execution triggers a JavaScript loader called HOPPINGANT, which subsequently downloads additional payloads from public file-sharing websites, such as MEGA or similar platforms. This tactic leverages the trust and ubiquity of public cloud services to evade traditional network detection mechanisms. The campaign abuses legitimate administrative and file transfer tools, notably Rclone, to exfiltrate stolen data covertly to MEGA cloud storage, blending malicious traffic with legitimate cloud service communications. The campaign's targeting pattern indicates a focus on intelligence collection related to foreign policy, defense capabilities, and diplomatic alignments, particularly in countries involved in major-power geopolitical tensions. The infection chain involves multiple MITRE ATT&CK techniques including spear-phishing (T1566.001), command and scripting interpreter usage (T1059.007, T1059.001), obfuscated files or information (T1027), use of legitimate tools (T1218), data exfiltration over alternative protocols (T1041), and use of public file-sharing services (T1105). The campaign does not currently have known exploits in the wild but relies heavily on social engineering and user interaction. The use of public cloud services for payload hosting and data exfiltration complicates detection and mitigation efforts, requiring defenders to focus on behavioral analytics and endpoint monitoring.
Potential Impact
The primary impact of Operation CamelClone is the compromise of sensitive government and defense information, including intelligence on foreign policy, military capabilities, and diplomatic strategies. Successful infiltration can lead to significant confidentiality breaches, undermining national security and diplomatic positions. The use of legitimate tools and public cloud services for data exfiltration reduces the likelihood of detection, increasing the risk of prolonged undetected espionage. Organizations may face operational disruptions if infected systems are manipulated or if sensitive data is leaked. The campaign's focus on countries involved in major-power rivalries elevates the geopolitical risk and potential for escalated tensions. While the campaign does not appear to cause direct destruction or availability impacts, the loss of confidential information can have long-term strategic consequences. The medium severity rating reflects the targeted nature, requirement for user interaction, and absence of zero-day exploits, but the sophisticated evasion techniques and sensitive targets amplify the threat's seriousness.
Mitigation Recommendations
To mitigate Operation CamelClone, organizations should implement advanced email filtering solutions capable of detecting and quarantining spear-phishing attempts, especially those containing ZIP archives and shortcut files. User awareness training should emphasize the risks of opening unsolicited attachments and executing unknown files. Endpoint detection and response (EDR) tools must be configured to monitor for suspicious JavaScript execution and unusual use of legitimate tools like Rclone. Network monitoring should focus on detecting anomalous traffic to public file-sharing services such as MEGA, including unusual data transfer volumes or patterns inconsistent with normal business operations. Implement strict application control policies to restrict unauthorized use of command-line tools and scripting interpreters. Data loss prevention (DLP) solutions should be deployed to monitor and block unauthorized data exfiltration attempts, particularly to cloud storage services. Regular threat hunting exercises focusing on the indicators of compromise related to HOPPINGANT and Rclone usage can help identify early signs of compromise. Finally, maintaining up-to-date threat intelligence feeds and sharing information with relevant government and industry partners will improve detection and response capabilities.
Affected Countries
Algeria, Mongolia, Ukraine, Kuwait
Indicators of Compromise
- hash: 0fd9562521b49138fcebcea494f4ed74
- hash: 12bf882a8fb8f16edccbe87adbbc3c59
- hash: 32f747c1a4a9aff1b4cea7f35f2f5111
- hash: 376884baaa4b9505792afc81cdedda42
- hash: 3f25c60d96f9cbbca7fd19278545207b
- hash: 4ad8d263065e46d0e2fd4183f89258ac
- hash: 8cecabbb0f7555afaa302e89e5fcbf5e
- hash: a494d88d211743076b87c71ff26b9fb9
- hash: c73c308a137ff7805577042cc9e923e1
- hash: db5a302fa7255a3b88873e7979555f32
- hash: f40d601a48a96e70bae87c76c8969c45
- hash: 5939ac61b4d9d4430ffaa0cf24df21588ffce88b
- hash: 6bfcddd912e6d87311eed5ae77fb53e1fdb5b184
- hash: 713224a83b1b752eff75cddb2ebea540098d2745
- hash: 80157e0a596b111519c3146fada535ed4304917f
- hash: 8cc3fabb8c8783cb38ac26e6c3137ef8af6901ed
- hash: 9964aab054509de11b1101c04c67d0ac84a25f1e
- hash: 9a9944ee1c996875f5fac74b999034a53488a047
- hash: ae96ac92263c8e7d5e93e97de2664c21fecdfe75
- hash: b14b6e374e04af4ec98f003cae40b5ee6c42913f
- hash: b9729934cc92f0b1ff9a87f70637e6adfaf416b2
- hash: de32d402e6e883a86bee83911d00e4307a4c26e7
- hash: 1d0ea66d347325902e20a12e1f2f084be45d3d6045264e513dcc420b9928013c
- hash: 230a22a1f1800f11718b43a7ce9390d2ef0fa9dc212d954c8fafbfbe997bbbef
- hash: 2671e1f43b2e5911310c5b3f124c076055eec5dee4e596854332ffcf791fd740
- hash: 27d7a398a58c12093bc49f7144dac2f079232768096d0558c226ea5c53782e29
- hash: 2902cdee050a60c3129b4bb84e74ddda7b129c3473556f689d83609d9a5981a7
- hash: 2dcaaedfad798dad87f27aef39885d2879825c4c8bed1dcd9e863aba0d463103
- hash: 31f1a97c72f596162f0946df74838d3bef89289ce630adba8791c0f3220980ee
- hash: 3e36b396c4cb71b8eaae2300c21bec26700b27ce5f6be83ef6b86d214e294c8b
- hash: 4a0e2649f89e11121ffe55546ee081ac07472db650d094314414ebf26fcb7a8e
- hash: 51af876b0f7fde362c69219f7dec39f7fb667fb53dc5fe2cbdf841d6c5951460
- hash: 62c477c0827752ffeb8ea243497eef1c666fc41025d287909d021bceb5b8e699
- hash: 630ac67d8db777ae0b93e066bd13b21908e79f23a41a64448f0a4ea38c063a44
- hash: 92962bfa6df48ec0f13713c437af021f4138dc5a419bc92bc8a376d625a6519a
- url: https://filebulldogs.com/uploads/82WX5GP8CI/a.zip
- url: https://filebulldogs.com/uploads/82WX5GP8CI/document.pdf
- url: https://filebulldogs.com/uploads/82WX5GP8CI/f.js
- url: https://filebulldogs.com/uploads/AVQB61TVOX/a.zip
- url: https://filebulldogs.com/uploads/AVQB61TVOX/document.pdf
- url: https://filebulldogs.com/uploads/AVQB61TVOX/f.js
- url: https://filebulldogs.com/uploads/F1OQY9GU84/a.zip
- url: https://filebulldogs.com/uploads/F1OQY9GU84/document.pdf
- url: https://filebulldogs.com/uploads/F1OQY9GU84/f.js
- url: https://filebulldogs.com/uploads/OKW5RN48ZJ/a.zip
- url: https://filebulldogs.com/uploads/OKW5RN48ZJ/document.pdf
- url: https://filebulldogs.com/uploads/OKW5RN48ZJ/f.js
- domain: filebulldogs.com
- email: coreyroberson@onionmail.org
- email: keatonwalls@onionmail.org
- email: oliwiagibbons@onionmail.org
- email: theresaunderwood@onionmail.org
Operation CamelClone: Multi-Region Espionage Campaign Targets Government and Defense Entities Amidst Regional Tensions
Description
Operation CamelClone is a multi-region espionage campaign targeting government and defense entities in Algeria, Mongolia, Ukraine, and Kuwait. The attackers use spear-phishing emails with malicious ZIP archives containing lure documents and shortcuts. The infection chain involves a JavaScript loader called HOPPINGANT, which downloads additional payloads from public file-sharing websites. The campaign abuses legitimate tools like Rclone for data exfiltration to MEGA cloud storage. Targeting patterns suggest intelligence gathering objectives, focusing on foreign policy, defense capabilities, and diplomatic alignments of countries navigating major-power rivalries. The operation's use of public services for payload hosting and data exfiltration makes network-based detection challenging.
AI-Powered Analysis
Technical Analysis
Operation CamelClone is a multi-region espionage campaign identified by AlienVault targeting government and defense sectors in Algeria, Mongolia, Ukraine, and Kuwait. The attack vector begins with spear-phishing emails that contain malicious ZIP archives. These archives include lure documents and shortcut files designed to trick users into executing them. Execution triggers a JavaScript loader called HOPPINGANT, which subsequently downloads additional payloads from public file-sharing websites, such as MEGA or similar platforms. This tactic leverages the trust and ubiquity of public cloud services to evade traditional network detection mechanisms. The campaign abuses legitimate administrative and file transfer tools, notably Rclone, to exfiltrate stolen data covertly to MEGA cloud storage, blending malicious traffic with legitimate cloud service communications. The campaign's targeting pattern indicates a focus on intelligence collection related to foreign policy, defense capabilities, and diplomatic alignments, particularly in countries involved in major-power geopolitical tensions. The infection chain involves multiple MITRE ATT&CK techniques including spear-phishing (T1566.001), command and scripting interpreter usage (T1059.007, T1059.001), obfuscated files or information (T1027), use of legitimate tools (T1218), data exfiltration over alternative protocols (T1041), and use of public file-sharing services (T1105). The campaign does not currently have known exploits in the wild but relies heavily on social engineering and user interaction. The use of public cloud services for payload hosting and data exfiltration complicates detection and mitigation efforts, requiring defenders to focus on behavioral analytics and endpoint monitoring.
Potential Impact
The primary impact of Operation CamelClone is the compromise of sensitive government and defense information, including intelligence on foreign policy, military capabilities, and diplomatic strategies. Successful infiltration can lead to significant confidentiality breaches, undermining national security and diplomatic positions. The use of legitimate tools and public cloud services for data exfiltration reduces the likelihood of detection, increasing the risk of prolonged undetected espionage. Organizations may face operational disruptions if infected systems are manipulated or if sensitive data is leaked. The campaign's focus on countries involved in major-power rivalries elevates the geopolitical risk and potential for escalated tensions. While the campaign does not appear to cause direct destruction or availability impacts, the loss of confidential information can have long-term strategic consequences. The medium severity rating reflects the targeted nature, requirement for user interaction, and absence of zero-day exploits, but the sophisticated evasion techniques and sensitive targets amplify the threat's seriousness.
Mitigation Recommendations
To mitigate Operation CamelClone, organizations should implement advanced email filtering solutions capable of detecting and quarantining spear-phishing attempts, especially those containing ZIP archives and shortcut files. User awareness training should emphasize the risks of opening unsolicited attachments and executing unknown files. Endpoint detection and response (EDR) tools must be configured to monitor for suspicious JavaScript execution and unusual use of legitimate tools like Rclone. Network monitoring should focus on detecting anomalous traffic to public file-sharing services such as MEGA, including unusual data transfer volumes or patterns inconsistent with normal business operations. Implement strict application control policies to restrict unauthorized use of command-line tools and scripting interpreters. Data loss prevention (DLP) solutions should be deployed to monitor and block unauthorized data exfiltration attempts, particularly to cloud storage services. Regular threat hunting exercises focusing on the indicators of compromise related to HOPPINGANT and Rclone usage can help identify early signs of compromise. Finally, maintaining up-to-date threat intelligence feeds and sharing information with relevant government and industry partners will improve detection and response capabilities.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.seqrite.com/blog/operation-camelclone-multi-region-espionage-campaign-targets-government-and-defense-entities-amidst-regional-tensions"]
- Adversary
- null
- Pulse Id
- 69b7db1d163d9323dbb20827
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash0fd9562521b49138fcebcea494f4ed74 | — | |
hash12bf882a8fb8f16edccbe87adbbc3c59 | — | |
hash32f747c1a4a9aff1b4cea7f35f2f5111 | — | |
hash376884baaa4b9505792afc81cdedda42 | — | |
hash3f25c60d96f9cbbca7fd19278545207b | — | |
hash4ad8d263065e46d0e2fd4183f89258ac | — | |
hash8cecabbb0f7555afaa302e89e5fcbf5e | — | |
hasha494d88d211743076b87c71ff26b9fb9 | — | |
hashc73c308a137ff7805577042cc9e923e1 | — | |
hashdb5a302fa7255a3b88873e7979555f32 | — | |
hashf40d601a48a96e70bae87c76c8969c45 | — | |
hash5939ac61b4d9d4430ffaa0cf24df21588ffce88b | — | |
hash6bfcddd912e6d87311eed5ae77fb53e1fdb5b184 | — | |
hash713224a83b1b752eff75cddb2ebea540098d2745 | — | |
hash80157e0a596b111519c3146fada535ed4304917f | — | |
hash8cc3fabb8c8783cb38ac26e6c3137ef8af6901ed | — | |
hash9964aab054509de11b1101c04c67d0ac84a25f1e | — | |
hash9a9944ee1c996875f5fac74b999034a53488a047 | — | |
hashae96ac92263c8e7d5e93e97de2664c21fecdfe75 | — | |
hashb14b6e374e04af4ec98f003cae40b5ee6c42913f | — | |
hashb9729934cc92f0b1ff9a87f70637e6adfaf416b2 | — | |
hashde32d402e6e883a86bee83911d00e4307a4c26e7 | — | |
hash1d0ea66d347325902e20a12e1f2f084be45d3d6045264e513dcc420b9928013c | — | |
hash230a22a1f1800f11718b43a7ce9390d2ef0fa9dc212d954c8fafbfbe997bbbef | — | |
hash2671e1f43b2e5911310c5b3f124c076055eec5dee4e596854332ffcf791fd740 | — | |
hash27d7a398a58c12093bc49f7144dac2f079232768096d0558c226ea5c53782e29 | — | |
hash2902cdee050a60c3129b4bb84e74ddda7b129c3473556f689d83609d9a5981a7 | — | |
hash2dcaaedfad798dad87f27aef39885d2879825c4c8bed1dcd9e863aba0d463103 | — | |
hash31f1a97c72f596162f0946df74838d3bef89289ce630adba8791c0f3220980ee | — | |
hash3e36b396c4cb71b8eaae2300c21bec26700b27ce5f6be83ef6b86d214e294c8b | — | |
hash4a0e2649f89e11121ffe55546ee081ac07472db650d094314414ebf26fcb7a8e | — | |
hash51af876b0f7fde362c69219f7dec39f7fb667fb53dc5fe2cbdf841d6c5951460 | — | |
hash62c477c0827752ffeb8ea243497eef1c666fc41025d287909d021bceb5b8e699 | — | |
hash630ac67d8db777ae0b93e066bd13b21908e79f23a41a64448f0a4ea38c063a44 | — | |
hash92962bfa6df48ec0f13713c437af021f4138dc5a419bc92bc8a376d625a6519a | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://filebulldogs.com/uploads/82WX5GP8CI/a.zip | — | |
urlhttps://filebulldogs.com/uploads/82WX5GP8CI/document.pdf | — | |
urlhttps://filebulldogs.com/uploads/82WX5GP8CI/f.js | — | |
urlhttps://filebulldogs.com/uploads/AVQB61TVOX/a.zip | — | |
urlhttps://filebulldogs.com/uploads/AVQB61TVOX/document.pdf | — | |
urlhttps://filebulldogs.com/uploads/AVQB61TVOX/f.js | — | |
urlhttps://filebulldogs.com/uploads/F1OQY9GU84/a.zip | — | |
urlhttps://filebulldogs.com/uploads/F1OQY9GU84/document.pdf | — | |
urlhttps://filebulldogs.com/uploads/F1OQY9GU84/f.js | — | |
urlhttps://filebulldogs.com/uploads/OKW5RN48ZJ/a.zip | — | |
urlhttps://filebulldogs.com/uploads/OKW5RN48ZJ/document.pdf | — | |
urlhttps://filebulldogs.com/uploads/OKW5RN48ZJ/f.js | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainfilebulldogs.com | — |
| Value | Description | Copy |
|---|---|---|
emailcoreyroberson@onionmail.org | — | |
emailkeatonwalls@onionmail.org | — | |
emailoliwiagibbons@onionmail.org | — | |
emailtheresaunderwood@onionmail.org | — |
Threat ID: 69b7e05e9d4df451834e770f
Added to database: 3/16/2026, 10:50:06 AM
Last enriched: 3/16/2026, 11:05:58 AM
Last updated: 3/16/2026, 9:37:25 PM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.