Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Operation CamelClone: Multi-Region Espionage Campaign Targets Government and Defense Entities Amidst Regional Tensions

0
Medium
Published: Mon Mar 16 2026 (03/16/2026, 10:27:41 UTC)
Source: AlienVault OTX General

Description

Operation CamelClone is a multi-region espionage campaign targeting government and defense entities in Algeria, Mongolia, Ukraine, and Kuwait. The attackers use spear-phishing emails with malicious ZIP archives containing lure documents and shortcuts. The infection chain involves a JavaScript loader called HOPPINGANT, which downloads additional payloads from public file-sharing websites. The campaign abuses legitimate tools like Rclone for data exfiltration to MEGA cloud storage. Targeting patterns suggest intelligence gathering objectives, focusing on foreign policy, defense capabilities, and diplomatic alignments of countries navigating major-power rivalries. The operation's use of public services for payload hosting and data exfiltration makes network-based detection challenging.

AI-Powered Analysis

AILast updated: 03/16/2026, 11:05:58 UTC

Technical Analysis

Operation CamelClone is a multi-region espionage campaign identified by AlienVault targeting government and defense sectors in Algeria, Mongolia, Ukraine, and Kuwait. The attack vector begins with spear-phishing emails that contain malicious ZIP archives. These archives include lure documents and shortcut files designed to trick users into executing them. Execution triggers a JavaScript loader called HOPPINGANT, which subsequently downloads additional payloads from public file-sharing websites, such as MEGA or similar platforms. This tactic leverages the trust and ubiquity of public cloud services to evade traditional network detection mechanisms. The campaign abuses legitimate administrative and file transfer tools, notably Rclone, to exfiltrate stolen data covertly to MEGA cloud storage, blending malicious traffic with legitimate cloud service communications. The campaign's targeting pattern indicates a focus on intelligence collection related to foreign policy, defense capabilities, and diplomatic alignments, particularly in countries involved in major-power geopolitical tensions. The infection chain involves multiple MITRE ATT&CK techniques including spear-phishing (T1566.001), command and scripting interpreter usage (T1059.007, T1059.001), obfuscated files or information (T1027), use of legitimate tools (T1218), data exfiltration over alternative protocols (T1041), and use of public file-sharing services (T1105). The campaign does not currently have known exploits in the wild but relies heavily on social engineering and user interaction. The use of public cloud services for payload hosting and data exfiltration complicates detection and mitigation efforts, requiring defenders to focus on behavioral analytics and endpoint monitoring.

Potential Impact

The primary impact of Operation CamelClone is the compromise of sensitive government and defense information, including intelligence on foreign policy, military capabilities, and diplomatic strategies. Successful infiltration can lead to significant confidentiality breaches, undermining national security and diplomatic positions. The use of legitimate tools and public cloud services for data exfiltration reduces the likelihood of detection, increasing the risk of prolonged undetected espionage. Organizations may face operational disruptions if infected systems are manipulated or if sensitive data is leaked. The campaign's focus on countries involved in major-power rivalries elevates the geopolitical risk and potential for escalated tensions. While the campaign does not appear to cause direct destruction or availability impacts, the loss of confidential information can have long-term strategic consequences. The medium severity rating reflects the targeted nature, requirement for user interaction, and absence of zero-day exploits, but the sophisticated evasion techniques and sensitive targets amplify the threat's seriousness.

Mitigation Recommendations

To mitigate Operation CamelClone, organizations should implement advanced email filtering solutions capable of detecting and quarantining spear-phishing attempts, especially those containing ZIP archives and shortcut files. User awareness training should emphasize the risks of opening unsolicited attachments and executing unknown files. Endpoint detection and response (EDR) tools must be configured to monitor for suspicious JavaScript execution and unusual use of legitimate tools like Rclone. Network monitoring should focus on detecting anomalous traffic to public file-sharing services such as MEGA, including unusual data transfer volumes or patterns inconsistent with normal business operations. Implement strict application control policies to restrict unauthorized use of command-line tools and scripting interpreters. Data loss prevention (DLP) solutions should be deployed to monitor and block unauthorized data exfiltration attempts, particularly to cloud storage services. Regular threat hunting exercises focusing on the indicators of compromise related to HOPPINGANT and Rclone usage can help identify early signs of compromise. Finally, maintaining up-to-date threat intelligence feeds and sharing information with relevant government and industry partners will improve detection and response capabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.seqrite.com/blog/operation-camelclone-multi-region-espionage-campaign-targets-government-and-defense-entities-amidst-regional-tensions"]
Adversary
null
Pulse Id
69b7db1d163d9323dbb20827
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash0fd9562521b49138fcebcea494f4ed74
hash12bf882a8fb8f16edccbe87adbbc3c59
hash32f747c1a4a9aff1b4cea7f35f2f5111
hash376884baaa4b9505792afc81cdedda42
hash3f25c60d96f9cbbca7fd19278545207b
hash4ad8d263065e46d0e2fd4183f89258ac
hash8cecabbb0f7555afaa302e89e5fcbf5e
hasha494d88d211743076b87c71ff26b9fb9
hashc73c308a137ff7805577042cc9e923e1
hashdb5a302fa7255a3b88873e7979555f32
hashf40d601a48a96e70bae87c76c8969c45
hash5939ac61b4d9d4430ffaa0cf24df21588ffce88b
hash6bfcddd912e6d87311eed5ae77fb53e1fdb5b184
hash713224a83b1b752eff75cddb2ebea540098d2745
hash80157e0a596b111519c3146fada535ed4304917f
hash8cc3fabb8c8783cb38ac26e6c3137ef8af6901ed
hash9964aab054509de11b1101c04c67d0ac84a25f1e
hash9a9944ee1c996875f5fac74b999034a53488a047
hashae96ac92263c8e7d5e93e97de2664c21fecdfe75
hashb14b6e374e04af4ec98f003cae40b5ee6c42913f
hashb9729934cc92f0b1ff9a87f70637e6adfaf416b2
hashde32d402e6e883a86bee83911d00e4307a4c26e7
hash1d0ea66d347325902e20a12e1f2f084be45d3d6045264e513dcc420b9928013c
hash230a22a1f1800f11718b43a7ce9390d2ef0fa9dc212d954c8fafbfbe997bbbef
hash2671e1f43b2e5911310c5b3f124c076055eec5dee4e596854332ffcf791fd740
hash27d7a398a58c12093bc49f7144dac2f079232768096d0558c226ea5c53782e29
hash2902cdee050a60c3129b4bb84e74ddda7b129c3473556f689d83609d9a5981a7
hash2dcaaedfad798dad87f27aef39885d2879825c4c8bed1dcd9e863aba0d463103
hash31f1a97c72f596162f0946df74838d3bef89289ce630adba8791c0f3220980ee
hash3e36b396c4cb71b8eaae2300c21bec26700b27ce5f6be83ef6b86d214e294c8b
hash4a0e2649f89e11121ffe55546ee081ac07472db650d094314414ebf26fcb7a8e
hash51af876b0f7fde362c69219f7dec39f7fb667fb53dc5fe2cbdf841d6c5951460
hash62c477c0827752ffeb8ea243497eef1c666fc41025d287909d021bceb5b8e699
hash630ac67d8db777ae0b93e066bd13b21908e79f23a41a64448f0a4ea38c063a44
hash92962bfa6df48ec0f13713c437af021f4138dc5a419bc92bc8a376d625a6519a

Url

ValueDescriptionCopy
urlhttps://filebulldogs.com/uploads/82WX5GP8CI/a.zip
urlhttps://filebulldogs.com/uploads/82WX5GP8CI/document.pdf
urlhttps://filebulldogs.com/uploads/82WX5GP8CI/f.js
urlhttps://filebulldogs.com/uploads/AVQB61TVOX/a.zip
urlhttps://filebulldogs.com/uploads/AVQB61TVOX/document.pdf
urlhttps://filebulldogs.com/uploads/AVQB61TVOX/f.js
urlhttps://filebulldogs.com/uploads/F1OQY9GU84/a.zip
urlhttps://filebulldogs.com/uploads/F1OQY9GU84/document.pdf
urlhttps://filebulldogs.com/uploads/F1OQY9GU84/f.js
urlhttps://filebulldogs.com/uploads/OKW5RN48ZJ/a.zip
urlhttps://filebulldogs.com/uploads/OKW5RN48ZJ/document.pdf
urlhttps://filebulldogs.com/uploads/OKW5RN48ZJ/f.js

Domain

ValueDescriptionCopy
domainfilebulldogs.com

Email

ValueDescriptionCopy
emailcoreyroberson@onionmail.org
emailkeatonwalls@onionmail.org
emailoliwiagibbons@onionmail.org
emailtheresaunderwood@onionmail.org

Threat ID: 69b7e05e9d4df451834e770f

Added to database: 3/16/2026, 10:50:06 AM

Last enriched: 3/16/2026, 11:05:58 AM

Last updated: 3/16/2026, 9:37:25 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses