Threat IntelHIGH

CamelClone Spy Campaign - Targeting Governments Worldwide

🎯

Basically, a spy group is tricking government workers into downloading harmful files to steal sensitive information.

Quick Summary

A new spy campaign, Operation CamelClone, is targeting government agencies globally. Using spear-phishing tactics, attackers aim to steal sensitive data. Organizations must enhance their security measures to mitigate this threat.

The Threat

Operation CamelClone is a sophisticated espionage campaign that has emerged as a significant threat to government agencies and defense institutions across various countries. The campaign has been active since late February 2026, targeting nations like Algeria, Mongolia, Ukraine, and Kuwait. The attackers use spear-phishing emails that contain malicious ZIP files disguised as official government correspondence. This tactic is particularly concerning as it exploits the trust that individuals have in official communications.

The campaign's first notable incident involved a ZIP file mimicking Algeria’s Ministry of Housing, which was uploaded to VirusTotal. As the operation progressed, additional samples were identified, each cleverly themed to resonate with the targeted nation’s interests. For example, one email referenced cooperation with China, while another focused on defense procurement for Kuwait’s Air Force. This careful selection of targets indicates that the attackers are motivated by intelligence gathering rather than financial gain.

Who's Behind It

The attackers behind Operation CamelClone remain anonymous, but their methods reveal a high level of sophistication. They utilize a multi-stage infection chain that begins with a Windows shortcut file embedded in the malicious ZIP archive. Once the victim opens this file, a PowerShell command executes in the background, pulling additional malicious payloads from a public file-sharing platform. This technique allows them to avoid detection by traditional security measures, as they do not rely on dedicated command-and-control servers.

By hosting their malicious content on platforms like filebulldogs[.]com and routing stolen data through MEGA cloud storage, they effectively blend their activities with normal internet traffic. This makes it challenging for organizations to monitor and identify suspicious behavior, further complicating defense efforts.

Tactics & Techniques

The infection process initiated by the CamelClone campaign is intricate. After the initial PowerShell command runs, it downloads a JavaScript file named f.js, which executes further malicious actions. This includes downloading a decoy PDF to distract the victim while simultaneously uploading sensitive files from the victim’s system to the attacker’s MEGA account.

The use of Rclone, a legitimate cloud file transfer tool, is particularly alarming. The attackers leverage this tool to sweep the victim’s Desktop for documents and even target Telegram session data, potentially exposing private conversations. The attackers have registered multiple MEGA accounts to facilitate their operations, indicating a well-planned strategy to maintain anonymity.

Defensive Measures

Organizations, especially those in government and defense sectors, must take proactive measures against such sophisticated attacks. Caution is key when dealing with unsolicited ZIP files, particularly those that reference official institutions. Implementing strict access controls to anonymous file-sharing platforms can significantly reduce exposure.

Additionally, monitoring outbound traffic to cloud storage services like MEGA is crucial. Employing behavior-based endpoint detection tools can help identify and stop the execution of malicious scripts before they can complete their objectives. By remaining vigilant and informed, organizations can better protect themselves against the evolving landscape of cyber espionage.

🔒 Pro insight: The use of legitimate cloud tools like Rclone in espionage highlights the need for advanced detection mechanisms in endpoint security.

Original article from

Cyber Security News · Tushar Subhra Dutta

Read Full Article

Related Pings

HIGHThreat Intel

RondoDox Botnet - Expanding Exploits and Threats Revealed

The RondoDox botnet has expanded to 174 exploits, posing a serious threat to internet security. Its use of residential IPs complicates detection, making it a growing concern for organizations. Security teams must act quickly to safeguard against this evolving threat.

Cyber Security News·
HIGHThreat Intel

AppsFlyer SDK - Supply Chain Attack Exposed Cryptocurrency Users

A supply chain attack compromised the AppsFlyer SDK, diverting cryptocurrency funds from thousands of applications. Users are at risk of losing money. Organizations must act quickly to secure their systems.

SC Media·
HIGHThreat Intel

Storm-2561 Campaign - Fake VPN Clients Used for Theft

Microsoft has reported a new campaign by Storm-2561, using fake VPN clients to steal user credentials. This targets those seeking legitimate software, posing a significant risk. Awareness and caution are key to avoiding these threats.

SC Media·
HIGHThreat Intel

Boggy Serpens - Evolving Cyberespionage Tactics Revealed

Iranian threat group Boggy Serpens is evolving its cyberespionage tactics with AI-enhanced malware and refined social engineering. Their persistent targeting of critical infrastructure raises significant risks. Organizations must enhance their defenses to combat these sophisticated threats.

Palo Alto Unit 42·
HIGHThreat Intel

Threat Intel - Russia-linked APT Uses DRILLAPP Backdoor

A new cyber espionage campaign targets Ukrainian organizations using the DRILLAPP backdoor. Linked to the Laundry Bear APT group, this operation employs stealthy techniques to evade detection. The ongoing threat raises significant security concerns for affected entities.

Security Affairs·
HIGHThreat Intel

Threat Intel - Cybercrime Frequent Flyers Revealed

Cybercrime is on the rise with hackers targeting militaries and businesses. A massive breach at Telus raises alarms about data security. Stay informed to protect your assets.

CyberWire Daily·