Monday, May 4, 2026

CamelClone Uses Public File-Sharing Sites in Government Cyberattacks

A new cyber espionage campaign dubbed Operation CamelClone, targeting government and strategic sectors across several geopolitically significant regions.

The campaign abuses legitimate tools and public file‑sharing platforms to deliver malware and steal sensitive data, making it harder for defenders to detect.

The operation primarily targets organizations linked to government and national security interests. Industries affected include:

  • Government agencies.
  • Defense and military organizations.
  • Foreign affairs and diplomatic institutions.
  • Policy and international cooperation departments.
  • Energy and strategic resource sectors.

Researchers observed activity targeting Algeria, Mongolia, Ukraine, and Kuwait. Although these countries appear unrelated, each plays a key role in current geopolitical dynamics.

Ukraine remains at the center of the ongoing conflict with Russia, while Algeria’s role as a major energy exporter places it at the intersection of European, Russian, and Chinese interests.

Seqrite Labs APT Team has been monitoring threats across the globe and recently identified a campaign targeting multiple countries.

Mongolia’s diplomatic balancing between Western nations and its neighbors China and Russia makes it an attractive intelligence target.


Infection Chain (Source : Seqrite Labs).
Infection Chain (Source : Seqrite Labs).

Meanwhile, Kuwait remains an important defense and security partner in the Gulf region. The lure themes used in the attacks closely mirror these geopolitical tensions.

Spear‑Phishing Lures

The campaign begins with malicious ZIP archives distributed via spear‑phishing. These archives contain a shortcut (LNK) file and a decoy image designed to appear legitimate.

Researchers first identified the campaign after discovering a file uploaded to VirusTotal named وزارة_السكن_والعمران_والمدينة png.zip, submitted from Algeria.


Timeline of Activity (Source : Seqrite Labs).
Timeline of Activity (Source : Seqrite Labs).

The Arabic filename translates to “Ministry of Housing, Urban Development, and the City,” suggesting the attackers attempted to impersonate an Algerian government entity.

Further analysis revealed additional lures targeting different regions:

  • “Expanding cooperation with China.zip” aimed at Mongolian government institutions.
  • “Algerian Ukrainian proposals for cooperation.zip” referencing diplomatic collaboration.
  • “Weapons requirements for the Kuwait Air Force.zip” targeting defense procurement personnel.

Each archive contained a decoy image featuring official logos from real organizations, such as Algeria’s Ministry of Housing, Mongolia’s state‑owned nuclear energy company MonAtom LLC, and the Kuwaiti Armed Forces.

The attack chain begins when a victim opens the malicious LNK shortcut file inside the ZIP archive. The shortcut executes a hidden PowerShell command that downloads additional payloads from the anonymous file‑sharing site filebulldogs[.]com.

The threat actor also deploys another lure document from the remote C2 server, which is part of the later stage of the infection chain.

Lure document from the remote C2 server (Source : Seqrite Labs).
Lure document from the remote C2 server (Source : Seqrite Labs).

The downloaded payload is a JavaScript loader tracked by researchers as HOPPINGANT. The script runs using Windows Script Host and executes Base64‑encoded PowerShell commands to fetch additional components and prepare the system for data theft.

During the next stage, the loader downloads:

  • A decoy PDF document padded with null bytes to distract victims.
  • A secondary archive containing an executable file named l.exe.

Analysis revealed that l.exe is a legitimate version of Rclone (v1.70.3), a widely used command‑line tool designed to synchronize files with cloud storage services.

Data Exfiltration via Rclone and MEGA

Once executed, the script configures Rclone to connect to MEGA cloud storage using credentials hidden within the malware through a simple XOR‑encoded password.


 Rclone configuration (Source : Seqrite Labs).
 Rclone configuration (Source : Seqrite Labs).

The attackers create remote storage profiles using anonymous onionmail[.]org email addresses, including:

  • coreyroberson@onionmail[.]org.
  • keatonwalls@onionmail[.]org.
  • oliwiagibbons@onionmail[.]org.
  • theresaunderwood@onionmail[.]org.

The malware then collects documents from the victim’s system, focusing on files located in the Desktop directory such as .doc, .docx, .pdf, and .txt formats.

It also attempts to steal Telegram Desktop session data, which could allow attackers to access private communications.

All collected files are uploaded to MEGA using Rclone with identical configuration settings across all observed samples.

Instead of deploying traditional command‑and‑control servers, the threat actors rely on public services.

The filebulldogs[.]com platform hosts the malware loader, payload archives, and decoy files. Different upload paths are used for each campaign instance, allowing attackers to operate multiple operations simultaneously while reducing the risk of disruption.

Researchers have not attributed Operation CamelClone to any known threat group. However, the campaign’s focus on government, defense, diplomatic, and energy organizations suggests a cyber‑espionage objective rather than financial gain.

Seqrite Labs continues to monitor the activity and believes the campaign reflects an intelligence‑gathering effort aimed at understanding the foreign policy positions, defense capabilities, and diplomatic alignments of countries navigating global geopolitical rivalries.

IOCs

SHA-256 HashFile Name
31f1a97c72f596162f0946df74838d3bef89289ce630adba8791c0f3220980eeوزارة_السكن_والعمران_والمدينة.png.zip
51af876b0f7fde362c69219f7dec39f7fb667fb53dc5fe2cbdf841d6c5951460Weapons requirements for the Kuwait Air Force.zip
27d7a398a58c12093bc49f7144dac2f079232768096d0558c226ea5c53782e29Algerian Ukrainian proposals for cooperation.zip
4a0e2649f89e11121ffe55546ee081ac07472db650d094314414ebf26fcb7a8eХятад улстай хамтын ажиллагаагаа өргөжүүлж байна.zip
92962bfa6df48ec0f13713c437af021f4138dc5a419bc92bc8a376d625a6519aدعوة للمشاركة.lnk
1d0ea66d347325902e20a12e1f2f084be45d3d6045264e513dcc420b9928013cWeapons requirements for the Kuwait Air Force.lnk
2671e1f43b2e5911310c5b3f124c076055eec5dee4e596854332ffcf791fd740Algerian Ukrainian proposals for cooperation.lnk
2902cdee050a60c3129b4bb84e74ddda7b129c3473556f689d83609d9a5981a7Хятад улстай хамтын ажиллагаагаа өргөжүүлж байна.lnk
630ac67d8db777ae0b93e066bd13b21908e79f23a41a64448f0a4ea38c063a44f.js
230a22a1f1800f11718b43a7ce9390d2ef0fa9dc212d954c8fafbfbe997bbbeff.js
62c477c0827752ffeb8ea243497eef1c666fc41025d287909d021bceb5b8e699f.js
2dcaaedfad798dad87f27aef39885d2879825c4c8bed1dcd9e863aba0d463103f.js
3e36b396c4cb71b8eaae2300c21bec26700b27ce5f6be83ef6b86d214e294c8bl.exe

Follow us on Google NewsLinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.

Mayura Kathir
Mayura Kathirhttps://gbhackers.com/
Mayura Kathir is a cybersecurity reporter at GBHackers News, covering daily incidents including data breaches, malware attacks, cybercrime, vulnerabilities, zero-day exploits, and more.

Hot this week

How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities

What is Deep Web The deep web, invisible web, or...

How to Build and Run a Security Operations Center (SOC Guide) – 2023

Today’s Cyber security operations center (CSOC) should have everything...

Network Penetration Testing Checklist – 2025

Network penetration testing is a cybersecurity practice that simulates...

Russian Hackers Bypass EDR to Deliver a Weaponized TeamViewer Component

TeamViewer's popularity and remote access capabilities make it an...

Web Server Penetration Testing Checklist – 2026

Web server pentesting is performed under three significant categories: identity,...

AI-Powered Threat Actors Accelerate 0-Day Discovery at Machine Speed

Threat actors are already using AI models as autonomous...

Email Bombing, Fake IT Support Calls Drive Microsoft Teams Phishing Surge

Email bombing campaigns combined with fake IT support outreach...

MOVEit Authentication Bypass Vulnerability Sparks Security Concerns

Progress Software has issued a critical security alert for...

FreeBSD Systems at Risk From DHCP Client RCE Vulnerability

The FreeBSD Project has issued a critical security advisory...

Trellix Source Code Breach Exposes Repository to Unauthorized Access

Leading cybersecurity firm Trellix has announced a security incident...

Massive Facebook Phishing Operation Leverages AppSheet, Netlify, and Telegram

Cybersecurity researchers at Guardio Labs have uncovered a massive...

cPanelSniper PoC Exploit Disclosed as 44,000 Servers Reportedly Compromised

A critical zero-day vulnerability in cPanel and WebHost Manager...

Related Articles

Recent News