A new cyber espionage campaign dubbed Operation CamelClone, targeting government and strategic sectors across several geopolitically significant regions.
The campaign abuses legitimate tools and public file‑sharing platforms to deliver malware and steal sensitive data, making it harder for defenders to detect.
The operation primarily targets organizations linked to government and national security interests. Industries affected include:
- Government agencies.
- Defense and military organizations.
- Foreign affairs and diplomatic institutions.
- Policy and international cooperation departments.
- Energy and strategic resource sectors.
Researchers observed activity targeting Algeria, Mongolia, Ukraine, and Kuwait. Although these countries appear unrelated, each plays a key role in current geopolitical dynamics.
Ukraine remains at the center of the ongoing conflict with Russia, while Algeria’s role as a major energy exporter places it at the intersection of European, Russian, and Chinese interests.
Seqrite Labs APT Team has been monitoring threats across the globe and recently identified a campaign targeting multiple countries.
Mongolia’s diplomatic balancing between Western nations and its neighbors China and Russia makes it an attractive intelligence target.

Meanwhile, Kuwait remains an important defense and security partner in the Gulf region. The lure themes used in the attacks closely mirror these geopolitical tensions.
Spear‑Phishing Lures
The campaign begins with malicious ZIP archives distributed via spear‑phishing. These archives contain a shortcut (LNK) file and a decoy image designed to appear legitimate.
Researchers first identified the campaign after discovering a file uploaded to VirusTotal named وزارة_السكن_والعمران_والمدينة png.zip, submitted from Algeria.

The Arabic filename translates to “Ministry of Housing, Urban Development, and the City,” suggesting the attackers attempted to impersonate an Algerian government entity.
Further analysis revealed additional lures targeting different regions:
- “Expanding cooperation with China.zip” aimed at Mongolian government institutions.
- “Algerian Ukrainian proposals for cooperation.zip” referencing diplomatic collaboration.
- “Weapons requirements for the Kuwait Air Force.zip” targeting defense procurement personnel.
Each archive contained a decoy image featuring official logos from real organizations, such as Algeria’s Ministry of Housing, Mongolia’s state‑owned nuclear energy company MonAtom LLC, and the Kuwaiti Armed Forces.
The attack chain begins when a victim opens the malicious LNK shortcut file inside the ZIP archive. The shortcut executes a hidden PowerShell command that downloads additional payloads from the anonymous file‑sharing site filebulldogs[.]com.
The threat actor also deploys another lure document from the remote C2 server, which is part of the later stage of the infection chain.

The downloaded payload is a JavaScript loader tracked by researchers as HOPPINGANT. The script runs using Windows Script Host and executes Base64‑encoded PowerShell commands to fetch additional components and prepare the system for data theft.
During the next stage, the loader downloads:
- A decoy PDF document padded with null bytes to distract victims.
- A secondary archive containing an executable file named l.exe.
Analysis revealed that l.exe is a legitimate version of Rclone (v1.70.3), a widely used command‑line tool designed to synchronize files with cloud storage services.
Data Exfiltration via Rclone and MEGA
Once executed, the script configures Rclone to connect to MEGA cloud storage using credentials hidden within the malware through a simple XOR‑encoded password.

The attackers create remote storage profiles using anonymous onionmail[.]org email addresses, including:
- coreyroberson@onionmail[.]org.
- keatonwalls@onionmail[.]org.
- oliwiagibbons@onionmail[.]org.
- theresaunderwood@onionmail[.]org.
The malware then collects documents from the victim’s system, focusing on files located in the Desktop directory such as .doc, .docx, .pdf, and .txt formats.
It also attempts to steal Telegram Desktop session data, which could allow attackers to access private communications.
All collected files are uploaded to MEGA using Rclone with identical configuration settings across all observed samples.
Instead of deploying traditional command‑and‑control servers, the threat actors rely on public services.
The filebulldogs[.]com platform hosts the malware loader, payload archives, and decoy files. Different upload paths are used for each campaign instance, allowing attackers to operate multiple operations simultaneously while reducing the risk of disruption.
Researchers have not attributed Operation CamelClone to any known threat group. However, the campaign’s focus on government, defense, diplomatic, and energy organizations suggests a cyber‑espionage objective rather than financial gain.
Seqrite Labs continues to monitor the activity and believes the campaign reflects an intelligence‑gathering effort aimed at understanding the foreign policy positions, defense capabilities, and diplomatic alignments of countries navigating global geopolitical rivalries.
IOCs
| SHA-256 Hash | File Name |
|---|---|
| 31f1a97c72f596162f0946df74838d3bef89289ce630adba8791c0f3220980ee | وزارة_السكن_والعمران_والمدينة.png.zip |
| 51af876b0f7fde362c69219f7dec39f7fb667fb53dc5fe2cbdf841d6c5951460 | Weapons requirements for the Kuwait Air Force.zip |
| 27d7a398a58c12093bc49f7144dac2f079232768096d0558c226ea5c53782e29 | Algerian Ukrainian proposals for cooperation.zip |
| 4a0e2649f89e11121ffe55546ee081ac07472db650d094314414ebf26fcb7a8e | Хятад улстай хамтын ажиллагаагаа өргөжүүлж байна.zip |
| 92962bfa6df48ec0f13713c437af021f4138dc5a419bc92bc8a376d625a6519a | دعوة للمشاركة.lnk |
| 1d0ea66d347325902e20a12e1f2f084be45d3d6045264e513dcc420b9928013c | Weapons requirements for the Kuwait Air Force.lnk |
| 2671e1f43b2e5911310c5b3f124c076055eec5dee4e596854332ffcf791fd740 | Algerian Ukrainian proposals for cooperation.lnk |
| 2902cdee050a60c3129b4bb84e74ddda7b129c3473556f689d83609d9a5981a7 | Хятад улстай хамтын ажиллагаагаа өргөжүүлж байна.lnk |
| 630ac67d8db777ae0b93e066bd13b21908e79f23a41a64448f0a4ea38c063a44 | f.js |
| 230a22a1f1800f11718b43a7ce9390d2ef0fa9dc212d954c8fafbfbe997bbbef | f.js |
| 62c477c0827752ffeb8ea243497eef1c666fc41025d287909d021bceb5b8e699 | f.js |
| 2dcaaedfad798dad87f27aef39885d2879825c4c8bed1dcd9e863aba0d463103 | f.js |
| 3e36b396c4cb71b8eaae2300c21bec26700b27ce5f6be83ef6b86d214e294c8b | l.exe |
Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.





