Operation CamelClone: Multi-Region Espionage Campaign Targets Government and Defense Entities Amidst Regional Tensions
Operation CamelClone is a multi-region espionage campaign targeting government and defense entities in Algeria, Mongolia, Ukraine, and Kuwait. The attackers use spear-phishing emails with malicious ZIP archives containing lure documents and shortcuts. The infection chain involves a JavaScript loader called HOPPINGANT, which downloads additional payloads from public file-sharing websites. The campaign abuses legitimate tools like Rclone for data exfiltration to MEGA cloud storage. Targeting patterns suggest intelligence gathering objectives, focusing on foreign policy, defense capabilities, and diplomatic alignments of countries navigating major-power rivalries. The operation's use of public services for payload hosting and data exfiltration makes network-based detection challenging.
Pulse ID: 69b7db1d163d9323dbb20827
Pulse Link: https://otx.alienvault.com/pulse/69b7db1d163d9323dbb20827
Pulse Author: AlienVault
Created: 2026-03-16 10:27:41
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Cloud #CyberSecurity #Email #Espionage #FileSharing #Government #InfoSec #Java #JavaScript #OTX #OpenThreatExchange #Phishing #RAT #Rclone #SpearPhishing #UK #Ukr #Ukraine #ZIP #bot #AlienVault
